High-Level Design and Implementation of a Configurable Cryptosystem With a Novel Chaos-Enhanced Function

Research output: Contribution to journalArticlepeer-review

Abstract

The widespread availability of networks has significantly increased the exposure of data to security threats, necessitating robust encryption methods. While existing symmetric block ciphers offer varying levels of security, they are susceptible to advancements in cryptanalysis. From this perspective, in this article, we present an efficient approach to enhancing the security of these ciphers through the integration of chaos theory. The key to this enhancement is a newly developed adaptive chaotic map based on sine map and the dynamic interplay of two key parameters (rn,kn). Of course, the efficiency of the proposed chaotic map is demonstrated by the time evolution, the Bifurcation diagram, Permutation Entropy (PE), Fuzzy Correlation Dimension (FCD), and Lyapunov Exponent (LE) analyses and comparison with the existing reported maps. Thereafter, by applying chaos theory to address the limitations of default cipher parameters, and operating modes and to control S-boxes, permutation functions, key schedules, data masking, we introduce nonlinearity and diffusion, making the block ciphers more resistant to attacks. Through extensive simulations and evaluations, we demonstrate the effectiveness of our approach in strengthening the security of the enhanced ciphers against pattern, statistical, differential, key sensitivity, Linear, and Padding Oracle attacks. Additionally, we present a high-level design and implementation of a configurable cryptosystem using SystemC. The configurable design allows for flexibility in integrating different ciphers and adapting to evolving security needs.

Original languageEnglish
Pages (from-to)3823-3840
Number of pages18
JournalIEEE Access
Volume13
DOIs
StatePublished - 2025

Keywords

  • Adaptive
  • SystemC
  • chaos
  • chaos performance analysis
  • configurable
  • high-level design
  • security analysis
  • sine map
  • symmetric block cipher

Fingerprint

Dive into the research topics of 'High-Level Design and Implementation of a Configurable Cryptosystem With a Novel Chaos-Enhanced Function'. Together they form a unique fingerprint.

Cite this