SlideShare a Scribd company logo
1 of 9
Download to read offline
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
DOI:10.5121/ijcsit.2014.6608 113
IMPLEMENTATION OF A STREAM CIPHER BASED
ON BERNOULLI’S MAP
Ricardo Francisco Martinez-Gonzalez1
and Jose Alejandro Diaz-Mendez2
1
Electrics and Electronics Department, Veracruz Institute of Technology, Veracruz,
Mexico.
2
Electronics Department, National Institute of Astrophysics Optics and Electronics,
Tonantzintla, Mexico.
ABSTRACT
A stream cipher was implemented on a FPGA. The keystream, for some authors the most important
element, was developed using an algorithm based on Bernoulli’s chaotic map. When dynamic systems are
digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a
mechanism was needed. The proposed mechanism gives a solution for degradation issue and its
implementation is not complicated. Finally, the implemented cipher includes 8 stages and 2 pseudo-random
number generators (PRNG), such cipher was tested using NIST testes. Once its designing stage, it was
implemented using a developing FPGA board.
KEYWORDS
Chaotic Stream Ciphers, Digitally implemented Bernoulli’s map, NIST testes, FPGA Implementation.
I. INTRODUCTION
Cryptography is the science of using mathematics for encrypt and decrypt data. The cryptography
allows storing or transmitting important information, as it cannot be read for aliened entities [1].
Some of the most important cryptographic tools are ciphers, coders and water makers; however,
among them, the ciphers are probably the most commonly used.
By the way the ciphers process data, they can be classified as: stream ciphers, this ciphers work
over individual characters from plaintext at once, and block ciphers that take block by block from
plaintext to cipher.
According to Kohel [2], the block ciphers are memoryless, due they use the very same function in
order to cipher successive blocks; meanwhile, the stream ciphers must have memory, mostly
because keystream is a function of initial value and system current state.
Strength in stream ciphers relies on keystream generating function that is the main reason to study
and develop so many and various ones. One of used methods are chaotic functions, their
functioning is based in certain behavior presents at some dynamic systems to naturally produce
random sequences [3].
In table 1 from [4] is presented a similarity relationship between wanted features in cryptographic
systems and natural features in chaotic ones. Among chaotic system features are its high
sensibility to initial conditions, they have a pseudo-random behavior, and they are able to disperse
data around their working space [5]. For such features, this class of function was chosen as
keystream generating functions for present work.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
114
II. MATHEMATICAL DESCRIPTION FOR USED BERNOULLI’S MAP
The used function for generating keystream is a chaotic one. In the chaotic functions, one-
dimensional maps are the simplest ones in order to generate chaotic sequences, and the selected
one for this cryptographic system was Bernoulli’s, mostly because this map has a simple digital
implementation [7].
Tsuneda et al [8] presented a modification for Bernoulli’s map; the modified map has next
mathematical expression:
 
   











15.0
2
1
12
5.00
2
1
2
1
ii
ii
i
xx
xx
x



 Eq.1
Eq. 1 was originally presented to satisfy analog implementation, ergo to implement this
expression using a binary-representation digital system is needed some manipulations of it.
After some mathematical manipulations, Eq. 2 is obtained; this expression is adequate for
digitally implementing.
 
   
















bits
i
bits
bits
bits
i
bits
i
bits
i
i
xx
xx
x
22
2
12
22
20
2
12
2
1
1
1




Eq.2
Sequences obtained from mathematical expression defined in Eq. 2 exhibit some non-randomness
issues. The issues are a normal degradation caused by digital systems flooring [9]. Some authors
had proposed some partial solutions; one of them is implementing several stages [10] in order to
increase its randomness.
III. BIFURCATION DIAGRAMS
Baker and Gollup [11] define bifurcation as system behavior determination at control parameters
variations, its most useful representation takes place when in a system; its control parameters are
consequently varied, this representation is known as bifurcation diagram [12].
In a bifurcation diagram, horizontal axis represents μ parameter and vertical axis represents
higher iterations ( ) for a specific initial point ; in consequence, specified diagram depicts
orbit behavior. Figure 1 depicts obtained bifurcation diagram following Elaydi’s procedure
[13] for Bernoulli’s map.
The form of bifurcation diagram is representative of implemented function. As it was previously
discussed, discretely implemented dynamic systems have a degraded behavior; thus, a solution is
required. The solution jumped out after seeing bifurcation diagram for 4 symmetric portions of
obtained sequences from the original system.
In shown diagrams at Figure 2, first and most significant portion of bifurcation diagram, the most
significant, is quite similar as the presented one in Figure 1. In the other hand, the bifurcation
diagrams for other the three portions of the original sequence present very different diagrams.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
115
Figure 1. Bifurcation diagram for Bernoulli’s map.
The orbits in second, third and fourth portion of bifurcation diagrams are along entire space, with
such behavior the to-be-ciphered data might be equally dispersed along entire space as well.
Figure 2. Bifurcation diagrams for sections 2, 3 and 4 from Bernoulli’s map original sequence.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
116
Prior finding caused to design a structure that separates each original 32-bit sequence into four 8-
bit sequences. The keystream used by the cryptosystem is result of a XOR procedure with eight 8-
bit sequences, because the cryptosystem contents 2 PRNG.
IV. 8-BIT SEQUENCES GENERATING
In order to obtain 8-bit sequences, firstly is necessary to separate each original 32-bit sequence
into 16-bit sequences; the mathematical expressions that carry the task out, is defined in Eq. 3 and
Eq. 4.
( ) 	 =
( )
/ 		 Eq. 3
( ) 	 = ( ( ), 2 ) Eq. 4
Using Eq. 3 is obtained the most significant half of f(x). The procedure is based in the fact that in
binary representation, right-shifting is done dividing by 2n, where n represents desired places to
shift. The second half is obtained by same prior principle; even though in this occasion, division
residue is the required part; mathematical description for such task appears in Eq. 4.
Once both 16-bit sequences were obtained, each sequence is separated using again Eq. 3 and Eq.
4 in order to obtain four 8-bit sequences. In addition, to increase cipher complexity, two 32-bit
sequence generators are used, generating eight 8-bit sequences in total, with them the
cryptosystem reaches an acceptable security level.
V. VHDL IMPLEMENTATION FOR PROPOSED CIPHER
For FPGA implementation, an Altera’s Cyclone IV EP4C22F17C6N was selected. The
cryptosystem was firstly simulated in ModelSIM, and matching results using Matlab. Because of
cipher features, its design is separated in two. The first part const of 2 PRNG and a XOR-gate
array is second part. Both PRNG need an initial value to start generating their sequences. After
initial value is introduced, the PRNG feedback loop needs to be closed; on account of it, a
mechanism was figured out.
The mechanism utilizes a D-type flip-flop, its Q-output is definitively set to logical-one after
PRNG’s first operation. The feedback loop is controlled by a MUX, whereas the MUX is
controlled by the Q-output. MUX afterward, its output is multiplied by two, with a throwing 33-
bit overflow condition, then the multiplier result is multiplied by feedback factor (μ), as well as
initial value, μ is a control parameter.
Output of feedback factor multiplier has 40 bits; the least significant 8 bits are eliminated and the
remained ones go to an adder that adds it with generalization factor defined in Eq. 5.
 
2
12 bits
Eq. 5
Finally, the output adder is saved by a parallel input/parallel-output register; furthermore, the
register helps controlling out PRNG flow. Figure 3 depicts block diagram for the described
PRNG.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
117
The sequences obtained from the PRNG got separated in 4 equal-length sequences; using 2
PRNG, eight 8-bit sequences are obtained.
Next part to describe is a XOR-gate array, which is in charge to mix data up. The most significant
bit from each sequence passes through XOR gates in order to obtain keystream most significant
bit; the next significant bits pass through another XOR-gate group, and so on until the least
significant bits.
Figure 3. PRNG block diagram.
The whole array consists of 56 XOR-gates, 7 for each keystream bit, the array may be observed
on Figure 4. The XOR-gate array output is the keystream used by proposed stream cipher.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
118
Figure 4 Disposition of XOR-gates in-charge of obtaining keystream
VI. SIMULATION RESULTS
ModelSIM was used to realize simulations for the proposed stream cipher, and a Matlab script
was made to verify simulation result. Figure 5 shown results for PRNG ModelSIM simulation.
Figure 5. PRNG simulation using 2863311530 as initial value and 0.6640625 as μ factor
In figure 5, “32hAAAAAAAA” correspond to initial value, which starts PRNG up; the next value
“8hAA” is μ factor. Signal 4, from top to bottom, is clock system. Signal 3 is a pulse for the
closing feedback loop flip-flop. The last signal is output PRNG, only few data were chosen due
data presentation; nevertheless, data is exactly same as obtained one by Matlab; moreover, high
sensibility to initial conditions in chaotic systems [14] inspires reliability between obtained
Matlab data and FPGA one, even though only few data is presented.
Once PRNG function has been verified by simulation, next simulation is for separating sequences
mechanism, simulation result is shown at Figure 6. In Figure 6, the first two signals, from top to
bottom, are initial values; “32hAAAAAAAA” for first PRNG and “32hBBBBBBBB” for second
one.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
119
Figure 6. Simulation of keystream generating mechanism for proposed cipher.
The next pair of signals is μ factors, first PRNG receives “8hAA” and second one receives
“8hBB”. Signal 6 is system clock, and signal 5 is in charge of controlling feedback loop closure.
Finally, signal 7 is output stream cipher; in other words, the keystream for the proposed
cryptosystem.
Results obtained in FPGA were completely matched with simulation ones. Besides VHDL codes
just needed some minor modifications, FPGA implementation was successful and untroubled.
VII. NIST STS TESTING
The NIST Statistical Testing Suite (STS) is based on determining whether or not a specific
sequence of zeros and ones are random [15].
The NIST STS was developed to test the randomness of binary sequences produced either
hardware of software based cryptographic random or pseudorandom number generators [16]. In
NIST STS, testing results is P-value. It may have values between 0 and 1and the bigger P-value
is, the better pseudorandom property the tested sequence has [17]
The proposed implementation was tested in order to know how good it is. A random sequence
was elaborated using μ1=0.75 and μ2=0.8, and 1.2885x109
as initial value for first generator and
8.5899x108
for the second one. The random sequence had 4 million bits, and the obtained results
are presented in Table 1.
Table 1. NIST STS testing results.
Test Obtained P-
value
Status
Frequency test 0.988 OK
Block frequency test 0.986 OK
Run test 0.987 OK
Cumulative sum test
(forward)
0.988 OK
Cumulative sum test
(reverse)
0.988 OK
FFT test 0.998 OK
With Table 1 results, it is plausible to ensure that the proposed cipher works with a good chaotic
behavior, and in consequence, good cryptographic features.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
120
VIII. CONCLUSIONS
Current developing started trying to solve a chaotic function instauration in a stream cipher
design. The problem was solved adequately, but another problem showed up, a normal
degradation, it affects digitally-implemented dynamic systems. The new problem was solved
implementing a dividing sequence mechanism; and sequences were obtained by two PRNG. The
cryptosystem was verified using a NIST STS.
Using Matlab helps out to verify simulation results, the method makes easier to manage so many
and large data. In conclusion, cryptosystem implementation in a FPGA is easy once a
mathematical analysis and an adequate VHDL coding simulation were made.
REFERENCES
[1] Saranya K., Mohanapriya R. and Udhayan J., (2014) A Review on Symmetric Key Encryption
Techniques in Cryptography, International Journal of Science, Engineering and Technology
Research, Vol. 3, Issue 3 pp 539-544.
[2] David R. Kohel, (2008) Cryptography, Creative Commons Attribution-Noncommercial-Share Alike
3.0 Unported License. http://www.sagemath.org/files/kohel-book-2008.pdf
[3] Jyoti Chauhan and Anchal Jain , (2014) Survey on Encryption Algorithm Based On Chaos Theory
and DNA Cryptography, International Journal of Advanced Research in Computer and
Communication Engineering, Vol 3, Issue 8 pp 7801-7803.
[4] Gonzalo Alvarez & Shujun Li, (2006) Some Basic Cryptographic Requirements for Chaos-Based
Cryptosystems, International Journal of Bifurcation and Chaos.
[5] Mohammad Saleh Tavazoei & Mahammad Haeri, (2007) Comparison of different one-dimensional
maps as chaotic search pattern in chaos optimization algorithms, Applied Mathematics and
Computation.
[6] E. Ott, (2002) Chaos in Dinamical Systems, Cambridge University Press.
[7] Ricardo F. Martinez-Gonzalez, (2008) Design of Chaotic Noise Generators based on One-dimension
maps, M.Sc. Thesis, National Institute of Astrophysics, Optics and Electronics.
[8] A. Tsuneda, K. Eguchi & T. Inoue, (2005) Design of Chaotic Binary Sequences with Good Statistical
Properties based on Piecewise Linear into Maps, IEEE Transactions on Circuits and Systems 1:
Regular papers, Vol. 52, No 2 pp. 454-462.
[9] David Arroyo, Gonzalo Alvarez & Shujun Li, (2009) Some Hints for the Design of Digital Chaos-
Based Cryptosystems: Lessons Learned from Cryptoanalysis, Presented at CHAOS 09: Second IFAC
meeting on Analysis and Control of Chaos Systems.
[10] Shujun Li, Guanrong Chen & Xuanqin Mou, (2005) On the Dynamical Degradation of Digital
Piecewise Linear Chaotic Maps, International Journal of Bifurcation and Chaos in vol. 15, No. 10,
pp.3119-3151.
[11] Gregory L. Baker & Jerry P Gollub, (1990) Chaotic Dynamics an introduction, Cambridge University
Press.
[12] Hongli Xu, Xu Qian, Yong Liang and Qiulan Wu, (2014) The Study of a New Hyperchaotic and Its
Binarization Algorithm, Journal of Information & Computational Science Vol. 11, No 2 pp 473-480.
[13] Saber N. Elaydi, (2000) Discrete Chaos, Chapman & Hall/CRC.
[14] Narendra K. Pakeek, Vinod Patidar, & Krishan K. Sud, (2010) A Random Bit Generator Using
Chaotic Maps, International Journal of Network Security, Vol. 10, No 1, pp. 32.
[15] Muhammad Khurram Khan & Jiashu Zhang, (2006) Investigation on Pseudorandom Properties of
Chaotic Stream Ciphers” IEEE International Conference on Engineering of Intelligent Systems, vol.,
no., pp.1-5
[16] Andrew Rukhin, Juan Soto & James Nechvatal, (2010) A Statistical Test Suite for Random and
pseudorandom number generator for cryptographic applications, NIST Special Publication 800-22,
online http://csrc.nist.gov/rng/.
[17] Vinod Patidar ,K. K. Sud & N. K. Pareek (2009) A Pseudo Random Bit Generator Based on Chaotic
Logistic Map andits Statistical Testing, Informatica No 33 pp. 441–452.
International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014
121
Authors
Ricardo F. Martinez-Gonzalez, PhD.
He was born on Veracruz, Mexico. He received his Bachelor of sciences degree from
Veracruz Institute of Technology. Next on, He studied his M.Sc. degree at National
Institute for Astrophysics, Optics and Electronics, in this place He started to get
involved with Chaos issues. For obtaining his degree, He wrote how design pseudo
random number generators using one-dimensional chaotic maps. Once He obtained
the degree, He got into Veracruz University for a five month period; nevertheless, He
returned to continue his research in Chaos subject, and get it to the next level,
designing ciphers. He took several courses about digital communications and
communication protocols; such courses help him out to finish his research and finally
obtain his PhD degree. At this point, He took the choice of return to his basics; since then, He works at
Veracruz Institute of Technology, where he has been enrolled into a research crew.
J. Alejandro Diaz-Mendez, PhD.
Dr. J. Alejandro Díaz-Méndez is a Full Researcher in the Electronics Department at
INAOE. He received his BSc degree from Universidad Veracruzana, México;
followed by M.Sc and Ph.D. degrees from Instituto Nacional de Astrofísica, Óptica y
Electrónica (INAOE), México, in 1995 and 1999 respectively. In 1999 he was
appointed as professor-Researcher at Instituto Politécnico Nacional, México. He has
authored 30 Journal papers and around 80 conference papers. He has been a member
of technical committees in national and international conferences. He is an IEEE
Senior member and a member of national researcher´s system of México.

More Related Content

What's hot

Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyIAEME Publication
 
Combinational circuits
Combinational circuitsCombinational circuits
Combinational circuitsmarangburu42
 
Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Techglyphs
 
Matrix transposition
Matrix transpositionMatrix transposition
Matrix transposition동호 이
 
Efficient Implementation of Low Power 2-D DCT Architecture
Efficient Implementation of Low Power 2-D DCT ArchitectureEfficient Implementation of Low Power 2-D DCT Architecture
Efficient Implementation of Low Power 2-D DCT ArchitectureIJMER
 
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
	Single Channel Speech De-noising Using Kernel Independent Component Analysis...	Single Channel Speech De-noising Using Kernel Independent Component Analysis...
Single Channel Speech De-noising Using Kernel Independent Component Analysis...theijes
 
Trivium Cipher Design
Trivium Cipher DesignTrivium Cipher Design
Trivium Cipher DesignMohid Nabil
 
A hybrid bacterial foraging and modified particle swarm optimization for mode...
A hybrid bacterial foraging and modified particle swarm optimization for mode...A hybrid bacterial foraging and modified particle swarm optimization for mode...
A hybrid bacterial foraging and modified particle swarm optimization for mode...IJECEIAES
 
Introduction For seq2seq(sequence to sequence) and RNN
Introduction For seq2seq(sequence to sequence) and RNNIntroduction For seq2seq(sequence to sequence) and RNN
Introduction For seq2seq(sequence to sequence) and RNNHye-min Ahn
 
Implementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderImplementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderVLSICS Design
 
Introduction to Cache-Oblivious Algorithms
Introduction to Cache-Oblivious AlgorithmsIntroduction to Cache-Oblivious Algorithms
Introduction to Cache-Oblivious AlgorithmsChristopher Gilbert
 
FPGA Implementation with Digital Devices
FPGA Implementation with Digital Devices FPGA Implementation with Digital Devices
FPGA Implementation with Digital Devices Sachin Mehta
 
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...ijcsit
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard desVaibhav Khanna
 
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsIJERA Editor
 
Lecture 09 high level language
Lecture 09 high level languageLecture 09 high level language
Lecture 09 high level language鍾誠 陳鍾誠
 

What's hot (18)

Design of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technologyDesign of area optimized aes encryption core using pipelining technology
Design of area optimized aes encryption core using pipelining technology
 
Combinational circuits
Combinational circuitsCombinational circuits
Combinational circuits
 
Bt0068 computer organization and architecture
Bt0068 computer organization and architecture Bt0068 computer organization and architecture
Bt0068 computer organization and architecture
 
Matrix transposition
Matrix transpositionMatrix transposition
Matrix transposition
 
Efficient Implementation of Low Power 2-D DCT Architecture
Efficient Implementation of Low Power 2-D DCT ArchitectureEfficient Implementation of Low Power 2-D DCT Architecture
Efficient Implementation of Low Power 2-D DCT Architecture
 
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
	Single Channel Speech De-noising Using Kernel Independent Component Analysis...	Single Channel Speech De-noising Using Kernel Independent Component Analysis...
Single Channel Speech De-noising Using Kernel Independent Component Analysis...
 
Trivium Cipher Design
Trivium Cipher DesignTrivium Cipher Design
Trivium Cipher Design
 
MNN
MNNMNN
MNN
 
A hybrid bacterial foraging and modified particle swarm optimization for mode...
A hybrid bacterial foraging and modified particle swarm optimization for mode...A hybrid bacterial foraging and modified particle swarm optimization for mode...
A hybrid bacterial foraging and modified particle swarm optimization for mode...
 
Introduction For seq2seq(sequence to sequence) and RNN
Introduction For seq2seq(sequence to sequence) and RNNIntroduction For seq2seq(sequence to sequence) and RNN
Introduction For seq2seq(sequence to sequence) and RNN
 
Implementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adderImplementation of an arithmetic logic using area efficient carry lookahead adder
Implementation of an arithmetic logic using area efficient carry lookahead adder
 
Introduction to Cache-Oblivious Algorithms
Introduction to Cache-Oblivious AlgorithmsIntroduction to Cache-Oblivious Algorithms
Introduction to Cache-Oblivious Algorithms
 
FPGA Implementation with Digital Devices
FPGA Implementation with Digital Devices FPGA Implementation with Digital Devices
FPGA Implementation with Digital Devices
 
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
A NEW PARALLEL MATRIX MULTIPLICATION ALGORITHM ON HEX-CELL NETWORK (PMMHC) US...
 
Ijetr042170
Ijetr042170Ijetr042170
Ijetr042170
 
Information and network security 20 data encryption standard des
Information and network security 20 data encryption standard desInformation and network security 20 data encryption standard des
Information and network security 20 data encryption standard des
 
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
 
Lecture 09 high level language
Lecture 09 high level languageLecture 09 high level language
Lecture 09 high level language
 

Viewers also liked

Generating Chebychev Chaotic Sequence
Generating Chebychev Chaotic SequenceGenerating Chebychev Chaotic Sequence
Generating Chebychev Chaotic SequenceCheng-An Yang
 
マルコフ連鎖モンテカルロ法入門-1
マルコフ連鎖モンテカルロ法入門-1マルコフ連鎖モンテカルロ法入門-1
マルコフ連鎖モンテカルロ法入門-1Nagi Teramo
 
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONSSTRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONSijcsit
 
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...ijcsit
 
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONSYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONijcsit
 
Employee performance appraisal system
Employee performance appraisal systemEmployee performance appraisal system
Employee performance appraisal systemijcsit
 
Personalizace & automatizace 2014: Silverpop
Personalizace & automatizace 2014: SilverpopPersonalizace & automatizace 2014: Silverpop
Personalizace & automatizace 2014: SilverpopBESTETO
 
Nottingham love vintage powerpoint
Nottingham love vintage powerpointNottingham love vintage powerpoint
Nottingham love vintage powerpointaforrestersmith
 
St. augustine coffee table
St. augustine coffee tableSt. augustine coffee table
St. augustine coffee tablesasapa
 
State of the art of agile governance a systematic review
State of the art of agile governance a systematic reviewState of the art of agile governance a systematic review
State of the art of agile governance a systematic reviewijcsit
 
Authoring system of drill & practice elearning modules for hearing impaired s...
Authoring system of drill & practice elearning modules for hearing impaired s...Authoring system of drill & practice elearning modules for hearing impaired s...
Authoring system of drill & practice elearning modules for hearing impaired s...ijcsit
 
Căn hộ An gia garden Tân Phú, Giá chỉ 799tr/ căn 2PN. Hotline PKD: 0985 889 990
Căn hộ An gia garden Tân Phú, Giá chỉ 799tr/ căn 2PN. Hotline PKD: 0985 889 990Căn hộ An gia garden Tân Phú, Giá chỉ 799tr/ căn 2PN. Hotline PKD: 0985 889 990
Căn hộ An gia garden Tân Phú, Giá chỉ 799tr/ căn 2PN. Hotline PKD: 0985 889 990TTC Land
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmijcsit
 
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDS
T AXONOMY OF  O PTIMIZATION  A PPROACHES OF R ESOURCE B ROKERS IN  D ATA  G RIDST AXONOMY OF  O PTIMIZATION  A PPROACHES OF R ESOURCE B ROKERS IN  D ATA  G RIDS
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDSijcsit
 
A rule based approach towards detecting human temperament
A rule based approach towards detecting human temperamentA rule based approach towards detecting human temperament
A rule based approach towards detecting human temperamentijcsit
 
Handover management scheme in LTE FEMTOCELL networks
Handover management scheme in LTE FEMTOCELL networksHandover management scheme in LTE FEMTOCELL networks
Handover management scheme in LTE FEMTOCELL networksijcsit
 

Viewers also liked (19)

masters-presentation
masters-presentationmasters-presentation
masters-presentation
 
Generating Chebychev Chaotic Sequence
Generating Chebychev Chaotic SequenceGenerating Chebychev Chaotic Sequence
Generating Chebychev Chaotic Sequence
 
ASK,FSK and M-PSK using Matlab
ASK,FSK and M-PSK using MatlabASK,FSK and M-PSK using Matlab
ASK,FSK and M-PSK using Matlab
 
マルコフ連鎖モンテカルロ法入門-1
マルコフ連鎖モンテカルロ法入門-1マルコフ連鎖モンテカルロ法入門-1
マルコフ連鎖モンテカルロ法入門-1
 
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONSSTRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
STRUCTURAL COUPLING IN WEB 2.0 APPLICATIONS
 
Prenentation poster
Prenentation posterPrenentation poster
Prenentation poster
 
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
Validation Study of Dimensionality Reduction Impact on Breast Cancer Classifi...
 
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITIONSYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
SYMMETRICAL WEIGHTED SUBSPACE HOLISTIC APPROACH FOR EXPRESSION RECOGNITION
 
Employee performance appraisal system
Employee performance appraisal systemEmployee performance appraisal system
Employee performance appraisal system
 
Personalizace & automatizace 2014: Silverpop
Personalizace & automatizace 2014: SilverpopPersonalizace & automatizace 2014: Silverpop
Personalizace & automatizace 2014: Silverpop
 
Nottingham love vintage powerpoint
Nottingham love vintage powerpointNottingham love vintage powerpoint
Nottingham love vintage powerpoint
 
St. augustine coffee table
St. augustine coffee tableSt. augustine coffee table
St. augustine coffee table
 
State of the art of agile governance a systematic review
State of the art of agile governance a systematic reviewState of the art of agile governance a systematic review
State of the art of agile governance a systematic review
 
Authoring system of drill & practice elearning modules for hearing impaired s...
Authoring system of drill & practice elearning modules for hearing impaired s...Authoring system of drill & practice elearning modules for hearing impaired s...
Authoring system of drill & practice elearning modules for hearing impaired s...
 
Căn hộ An gia garden Tân Phú, Giá chỉ 799tr/ căn 2PN. Hotline PKD: 0985 889 990
Căn hộ An gia garden Tân Phú, Giá chỉ 799tr/ căn 2PN. Hotline PKD: 0985 889 990Căn hộ An gia garden Tân Phú, Giá chỉ 799tr/ căn 2PN. Hotline PKD: 0985 889 990
Căn hộ An gia garden Tân Phú, Giá chỉ 799tr/ căn 2PN. Hotline PKD: 0985 889 990
 
Biomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithmBiomedical image transmission based on Modified feistal algorithm
Biomedical image transmission based on Modified feistal algorithm
 
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDS
T AXONOMY OF  O PTIMIZATION  A PPROACHES OF R ESOURCE B ROKERS IN  D ATA  G RIDST AXONOMY OF  O PTIMIZATION  A PPROACHES OF R ESOURCE B ROKERS IN  D ATA  G RIDS
T AXONOMY OF O PTIMIZATION A PPROACHES OF R ESOURCE B ROKERS IN D ATA G RIDS
 
A rule based approach towards detecting human temperament
A rule based approach towards detecting human temperamentA rule based approach towards detecting human temperament
A rule based approach towards detecting human temperament
 
Handover management scheme in LTE FEMTOCELL networks
Handover management scheme in LTE FEMTOCELL networksHandover management scheme in LTE FEMTOCELL networks
Handover management scheme in LTE FEMTOCELL networks
 

Similar to Implementation of a stream cipher based on bernoulli's map

A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat maptayseer Karam alshekly
 
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreMixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreIJERA Editor
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryptiontayseer Karam alshekly
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...TELKOMNIKA JOURNAL
 
Bitonic sort97
Bitonic sort97Bitonic sort97
Bitonic sort97Shubh Sam
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosIOSR Journals
 
FPGA based Data Scrambler for Ultra-Wideband Communication Systems
FPGA based Data Scrambler for Ultra-Wideband Communication SystemsFPGA based Data Scrambler for Ultra-Wideband Communication Systems
FPGA based Data Scrambler for Ultra-Wideband Communication Systemsidescitation
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
High - Performance using Neural Networks in Direct Torque Control for Asynchr...
High - Performance using Neural Networks in Direct Torque Control for Asynchr...High - Performance using Neural Networks in Direct Torque Control for Asynchr...
High - Performance using Neural Networks in Direct Torque Control for Asynchr...IJECEIAES
 
An OpenCL Method of Parallel Sorting Algorithms for GPU Architecture
An OpenCL Method of Parallel Sorting Algorithms for GPU ArchitectureAn OpenCL Method of Parallel Sorting Algorithms for GPU Architecture
An OpenCL Method of Parallel Sorting Algorithms for GPU ArchitectureWaqas Tariq
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) ijceronline
 
New artificial neural network design for Chua chaotic system prediction usin...
New artificial neural network design for Chua chaotic system  prediction usin...New artificial neural network design for Chua chaotic system  prediction usin...
New artificial neural network design for Chua chaotic system prediction usin...IJECEIAES
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...ijmnct
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System IJECEIAES
 

Similar to Implementation of a stream cipher based on bernoulli's map (20)

Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
 
Mixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic CoreMixed Scanning and DFT Techniques for Arithmetic Core
Mixed Scanning and DFT Techniques for Arithmetic Core
 
New Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image EncryptionNew Chaotic Substation and Permutation Method for Image Encryption
New Chaotic Substation and Permutation Method for Image Encryption
 
Ca36464468
Ca36464468Ca36464468
Ca36464468
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Bitonic sort97
Bitonic sort97Bitonic sort97
Bitonic sort97
 
Text encryption
Text encryptionText encryption
Text encryption
 
Implementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using ChaosImplementation of Various Cryptosystem Using Chaos
Implementation of Various Cryptosystem Using Chaos
 
FPGA based Data Scrambler for Ultra-Wideband Communication Systems
FPGA based Data Scrambler for Ultra-Wideband Communication SystemsFPGA based Data Scrambler for Ultra-Wideband Communication Systems
FPGA based Data Scrambler for Ultra-Wideband Communication Systems
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
5 1-10
5 1-105 1-10
5 1-10
 
High - Performance using Neural Networks in Direct Torque Control for Asynchr...
High - Performance using Neural Networks in Direct Torque Control for Asynchr...High - Performance using Neural Networks in Direct Torque Control for Asynchr...
High - Performance using Neural Networks in Direct Torque Control for Asynchr...
 
An OpenCL Method of Parallel Sorting Algorithms for GPU Architecture
An OpenCL Method of Parallel Sorting Algorithms for GPU ArchitectureAn OpenCL Method of Parallel Sorting Algorithms for GPU Architecture
An OpenCL Method of Parallel Sorting Algorithms for GPU Architecture
 
icwet1097
icwet1097icwet1097
icwet1097
 
International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER) International Journal of Computational Engineering Research (IJCER)
International Journal of Computational Engineering Research (IJCER)
 
New artificial neural network design for Chua chaotic system prediction usin...
New artificial neural network design for Chua chaotic system  prediction usin...New artificial neural network design for Chua chaotic system  prediction usin...
New artificial neural network design for Chua chaotic system prediction usin...
 
Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...Secured transmission through multi layer perceptron in wireless communication...
Secured transmission through multi layer perceptron in wireless communication...
 
Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System Improving The Performance of Viterbi Decoder using Window System
Improving The Performance of Viterbi Decoder using Window System
 

Recently uploaded

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Dr.Costas Sachpazis
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 

Recently uploaded (20)

★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 

Implementation of a stream cipher based on bernoulli's map

  • 1. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 DOI:10.5121/ijcsit.2014.6608 113 IMPLEMENTATION OF A STREAM CIPHER BASED ON BERNOULLI’S MAP Ricardo Francisco Martinez-Gonzalez1 and Jose Alejandro Diaz-Mendez2 1 Electrics and Electronics Department, Veracruz Institute of Technology, Veracruz, Mexico. 2 Electronics Department, National Institute of Astrophysics Optics and Electronics, Tonantzintla, Mexico. ABSTRACT A stream cipher was implemented on a FPGA. The keystream, for some authors the most important element, was developed using an algorithm based on Bernoulli’s chaotic map. When dynamic systems are digitally implemented, a normal degradation appears and disturbs their behavior; for such reason, a mechanism was needed. The proposed mechanism gives a solution for degradation issue and its implementation is not complicated. Finally, the implemented cipher includes 8 stages and 2 pseudo-random number generators (PRNG), such cipher was tested using NIST testes. Once its designing stage, it was implemented using a developing FPGA board. KEYWORDS Chaotic Stream Ciphers, Digitally implemented Bernoulli’s map, NIST testes, FPGA Implementation. I. INTRODUCTION Cryptography is the science of using mathematics for encrypt and decrypt data. The cryptography allows storing or transmitting important information, as it cannot be read for aliened entities [1]. Some of the most important cryptographic tools are ciphers, coders and water makers; however, among them, the ciphers are probably the most commonly used. By the way the ciphers process data, they can be classified as: stream ciphers, this ciphers work over individual characters from plaintext at once, and block ciphers that take block by block from plaintext to cipher. According to Kohel [2], the block ciphers are memoryless, due they use the very same function in order to cipher successive blocks; meanwhile, the stream ciphers must have memory, mostly because keystream is a function of initial value and system current state. Strength in stream ciphers relies on keystream generating function that is the main reason to study and develop so many and various ones. One of used methods are chaotic functions, their functioning is based in certain behavior presents at some dynamic systems to naturally produce random sequences [3]. In table 1 from [4] is presented a similarity relationship between wanted features in cryptographic systems and natural features in chaotic ones. Among chaotic system features are its high sensibility to initial conditions, they have a pseudo-random behavior, and they are able to disperse data around their working space [5]. For such features, this class of function was chosen as keystream generating functions for present work.
  • 2. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 114 II. MATHEMATICAL DESCRIPTION FOR USED BERNOULLI’S MAP The used function for generating keystream is a chaotic one. In the chaotic functions, one- dimensional maps are the simplest ones in order to generate chaotic sequences, and the selected one for this cryptographic system was Bernoulli’s, mostly because this map has a simple digital implementation [7]. Tsuneda et al [8] presented a modification for Bernoulli’s map; the modified map has next mathematical expression:                  15.0 2 1 12 5.00 2 1 2 1 ii ii i xx xx x     Eq.1 Eq. 1 was originally presented to satisfy analog implementation, ergo to implement this expression using a binary-representation digital system is needed some manipulations of it. After some mathematical manipulations, Eq. 2 is obtained; this expression is adequate for digitally implementing.                       bits i bits bits bits i bits i bits i i xx xx x 22 2 12 22 20 2 12 2 1 1 1     Eq.2 Sequences obtained from mathematical expression defined in Eq. 2 exhibit some non-randomness issues. The issues are a normal degradation caused by digital systems flooring [9]. Some authors had proposed some partial solutions; one of them is implementing several stages [10] in order to increase its randomness. III. BIFURCATION DIAGRAMS Baker and Gollup [11] define bifurcation as system behavior determination at control parameters variations, its most useful representation takes place when in a system; its control parameters are consequently varied, this representation is known as bifurcation diagram [12]. In a bifurcation diagram, horizontal axis represents μ parameter and vertical axis represents higher iterations ( ) for a specific initial point ; in consequence, specified diagram depicts orbit behavior. Figure 1 depicts obtained bifurcation diagram following Elaydi’s procedure [13] for Bernoulli’s map. The form of bifurcation diagram is representative of implemented function. As it was previously discussed, discretely implemented dynamic systems have a degraded behavior; thus, a solution is required. The solution jumped out after seeing bifurcation diagram for 4 symmetric portions of obtained sequences from the original system. In shown diagrams at Figure 2, first and most significant portion of bifurcation diagram, the most significant, is quite similar as the presented one in Figure 1. In the other hand, the bifurcation diagrams for other the three portions of the original sequence present very different diagrams.
  • 3. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 115 Figure 1. Bifurcation diagram for Bernoulli’s map. The orbits in second, third and fourth portion of bifurcation diagrams are along entire space, with such behavior the to-be-ciphered data might be equally dispersed along entire space as well. Figure 2. Bifurcation diagrams for sections 2, 3 and 4 from Bernoulli’s map original sequence.
  • 4. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 116 Prior finding caused to design a structure that separates each original 32-bit sequence into four 8- bit sequences. The keystream used by the cryptosystem is result of a XOR procedure with eight 8- bit sequences, because the cryptosystem contents 2 PRNG. IV. 8-BIT SEQUENCES GENERATING In order to obtain 8-bit sequences, firstly is necessary to separate each original 32-bit sequence into 16-bit sequences; the mathematical expressions that carry the task out, is defined in Eq. 3 and Eq. 4. ( ) = ( ) / Eq. 3 ( ) = ( ( ), 2 ) Eq. 4 Using Eq. 3 is obtained the most significant half of f(x). The procedure is based in the fact that in binary representation, right-shifting is done dividing by 2n, where n represents desired places to shift. The second half is obtained by same prior principle; even though in this occasion, division residue is the required part; mathematical description for such task appears in Eq. 4. Once both 16-bit sequences were obtained, each sequence is separated using again Eq. 3 and Eq. 4 in order to obtain four 8-bit sequences. In addition, to increase cipher complexity, two 32-bit sequence generators are used, generating eight 8-bit sequences in total, with them the cryptosystem reaches an acceptable security level. V. VHDL IMPLEMENTATION FOR PROPOSED CIPHER For FPGA implementation, an Altera’s Cyclone IV EP4C22F17C6N was selected. The cryptosystem was firstly simulated in ModelSIM, and matching results using Matlab. Because of cipher features, its design is separated in two. The first part const of 2 PRNG and a XOR-gate array is second part. Both PRNG need an initial value to start generating their sequences. After initial value is introduced, the PRNG feedback loop needs to be closed; on account of it, a mechanism was figured out. The mechanism utilizes a D-type flip-flop, its Q-output is definitively set to logical-one after PRNG’s first operation. The feedback loop is controlled by a MUX, whereas the MUX is controlled by the Q-output. MUX afterward, its output is multiplied by two, with a throwing 33- bit overflow condition, then the multiplier result is multiplied by feedback factor (μ), as well as initial value, μ is a control parameter. Output of feedback factor multiplier has 40 bits; the least significant 8 bits are eliminated and the remained ones go to an adder that adds it with generalization factor defined in Eq. 5.   2 12 bits Eq. 5 Finally, the output adder is saved by a parallel input/parallel-output register; furthermore, the register helps controlling out PRNG flow. Figure 3 depicts block diagram for the described PRNG.
  • 5. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 117 The sequences obtained from the PRNG got separated in 4 equal-length sequences; using 2 PRNG, eight 8-bit sequences are obtained. Next part to describe is a XOR-gate array, which is in charge to mix data up. The most significant bit from each sequence passes through XOR gates in order to obtain keystream most significant bit; the next significant bits pass through another XOR-gate group, and so on until the least significant bits. Figure 3. PRNG block diagram. The whole array consists of 56 XOR-gates, 7 for each keystream bit, the array may be observed on Figure 4. The XOR-gate array output is the keystream used by proposed stream cipher.
  • 6. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 118 Figure 4 Disposition of XOR-gates in-charge of obtaining keystream VI. SIMULATION RESULTS ModelSIM was used to realize simulations for the proposed stream cipher, and a Matlab script was made to verify simulation result. Figure 5 shown results for PRNG ModelSIM simulation. Figure 5. PRNG simulation using 2863311530 as initial value and 0.6640625 as μ factor In figure 5, “32hAAAAAAAA” correspond to initial value, which starts PRNG up; the next value “8hAA” is μ factor. Signal 4, from top to bottom, is clock system. Signal 3 is a pulse for the closing feedback loop flip-flop. The last signal is output PRNG, only few data were chosen due data presentation; nevertheless, data is exactly same as obtained one by Matlab; moreover, high sensibility to initial conditions in chaotic systems [14] inspires reliability between obtained Matlab data and FPGA one, even though only few data is presented. Once PRNG function has been verified by simulation, next simulation is for separating sequences mechanism, simulation result is shown at Figure 6. In Figure 6, the first two signals, from top to bottom, are initial values; “32hAAAAAAAA” for first PRNG and “32hBBBBBBBB” for second one.
  • 7. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 119 Figure 6. Simulation of keystream generating mechanism for proposed cipher. The next pair of signals is μ factors, first PRNG receives “8hAA” and second one receives “8hBB”. Signal 6 is system clock, and signal 5 is in charge of controlling feedback loop closure. Finally, signal 7 is output stream cipher; in other words, the keystream for the proposed cryptosystem. Results obtained in FPGA were completely matched with simulation ones. Besides VHDL codes just needed some minor modifications, FPGA implementation was successful and untroubled. VII. NIST STS TESTING The NIST Statistical Testing Suite (STS) is based on determining whether or not a specific sequence of zeros and ones are random [15]. The NIST STS was developed to test the randomness of binary sequences produced either hardware of software based cryptographic random or pseudorandom number generators [16]. In NIST STS, testing results is P-value. It may have values between 0 and 1and the bigger P-value is, the better pseudorandom property the tested sequence has [17] The proposed implementation was tested in order to know how good it is. A random sequence was elaborated using μ1=0.75 and μ2=0.8, and 1.2885x109 as initial value for first generator and 8.5899x108 for the second one. The random sequence had 4 million bits, and the obtained results are presented in Table 1. Table 1. NIST STS testing results. Test Obtained P- value Status Frequency test 0.988 OK Block frequency test 0.986 OK Run test 0.987 OK Cumulative sum test (forward) 0.988 OK Cumulative sum test (reverse) 0.988 OK FFT test 0.998 OK With Table 1 results, it is plausible to ensure that the proposed cipher works with a good chaotic behavior, and in consequence, good cryptographic features.
  • 8. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 120 VIII. CONCLUSIONS Current developing started trying to solve a chaotic function instauration in a stream cipher design. The problem was solved adequately, but another problem showed up, a normal degradation, it affects digitally-implemented dynamic systems. The new problem was solved implementing a dividing sequence mechanism; and sequences were obtained by two PRNG. The cryptosystem was verified using a NIST STS. Using Matlab helps out to verify simulation results, the method makes easier to manage so many and large data. In conclusion, cryptosystem implementation in a FPGA is easy once a mathematical analysis and an adequate VHDL coding simulation were made. REFERENCES [1] Saranya K., Mohanapriya R. and Udhayan J., (2014) A Review on Symmetric Key Encryption Techniques in Cryptography, International Journal of Science, Engineering and Technology Research, Vol. 3, Issue 3 pp 539-544. [2] David R. Kohel, (2008) Cryptography, Creative Commons Attribution-Noncommercial-Share Alike 3.0 Unported License. http://www.sagemath.org/files/kohel-book-2008.pdf [3] Jyoti Chauhan and Anchal Jain , (2014) Survey on Encryption Algorithm Based On Chaos Theory and DNA Cryptography, International Journal of Advanced Research in Computer and Communication Engineering, Vol 3, Issue 8 pp 7801-7803. [4] Gonzalo Alvarez & Shujun Li, (2006) Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems, International Journal of Bifurcation and Chaos. [5] Mohammad Saleh Tavazoei & Mahammad Haeri, (2007) Comparison of different one-dimensional maps as chaotic search pattern in chaos optimization algorithms, Applied Mathematics and Computation. [6] E. Ott, (2002) Chaos in Dinamical Systems, Cambridge University Press. [7] Ricardo F. Martinez-Gonzalez, (2008) Design of Chaotic Noise Generators based on One-dimension maps, M.Sc. Thesis, National Institute of Astrophysics, Optics and Electronics. [8] A. Tsuneda, K. Eguchi & T. Inoue, (2005) Design of Chaotic Binary Sequences with Good Statistical Properties based on Piecewise Linear into Maps, IEEE Transactions on Circuits and Systems 1: Regular papers, Vol. 52, No 2 pp. 454-462. [9] David Arroyo, Gonzalo Alvarez & Shujun Li, (2009) Some Hints for the Design of Digital Chaos- Based Cryptosystems: Lessons Learned from Cryptoanalysis, Presented at CHAOS 09: Second IFAC meeting on Analysis and Control of Chaos Systems. [10] Shujun Li, Guanrong Chen & Xuanqin Mou, (2005) On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps, International Journal of Bifurcation and Chaos in vol. 15, No. 10, pp.3119-3151. [11] Gregory L. Baker & Jerry P Gollub, (1990) Chaotic Dynamics an introduction, Cambridge University Press. [12] Hongli Xu, Xu Qian, Yong Liang and Qiulan Wu, (2014) The Study of a New Hyperchaotic and Its Binarization Algorithm, Journal of Information & Computational Science Vol. 11, No 2 pp 473-480. [13] Saber N. Elaydi, (2000) Discrete Chaos, Chapman & Hall/CRC. [14] Narendra K. Pakeek, Vinod Patidar, & Krishan K. Sud, (2010) A Random Bit Generator Using Chaotic Maps, International Journal of Network Security, Vol. 10, No 1, pp. 32. [15] Muhammad Khurram Khan & Jiashu Zhang, (2006) Investigation on Pseudorandom Properties of Chaotic Stream Ciphers” IEEE International Conference on Engineering of Intelligent Systems, vol., no., pp.1-5 [16] Andrew Rukhin, Juan Soto & James Nechvatal, (2010) A Statistical Test Suite for Random and pseudorandom number generator for cryptographic applications, NIST Special Publication 800-22, online http://csrc.nist.gov/rng/. [17] Vinod Patidar ,K. K. Sud & N. K. Pareek (2009) A Pseudo Random Bit Generator Based on Chaotic Logistic Map andits Statistical Testing, Informatica No 33 pp. 441–452.
  • 9. International Journal of Computer Science & Information Technology (IJCSIT) Vol 6, No 6, December 2014 121 Authors Ricardo F. Martinez-Gonzalez, PhD. He was born on Veracruz, Mexico. He received his Bachelor of sciences degree from Veracruz Institute of Technology. Next on, He studied his M.Sc. degree at National Institute for Astrophysics, Optics and Electronics, in this place He started to get involved with Chaos issues. For obtaining his degree, He wrote how design pseudo random number generators using one-dimensional chaotic maps. Once He obtained the degree, He got into Veracruz University for a five month period; nevertheless, He returned to continue his research in Chaos subject, and get it to the next level, designing ciphers. He took several courses about digital communications and communication protocols; such courses help him out to finish his research and finally obtain his PhD degree. At this point, He took the choice of return to his basics; since then, He works at Veracruz Institute of Technology, where he has been enrolled into a research crew. J. Alejandro Diaz-Mendez, PhD. Dr. J. Alejandro Díaz-Méndez is a Full Researcher in the Electronics Department at INAOE. He received his BSc degree from Universidad Veracruzana, México; followed by M.Sc and Ph.D. degrees from Instituto Nacional de Astrofísica, Óptica y Electrónica (INAOE), México, in 1995 and 1999 respectively. In 1999 he was appointed as professor-Researcher at Instituto Politécnico Nacional, México. He has authored 30 Journal papers and around 80 conference papers. He has been a member of technical committees in national and international conferences. He is an IEEE Senior member and a member of national researcher´s system of México.