Research Article  Open Access
Digital Implementation of an Improved LTE Stream Cipher Snow3G Based on Hyperchaotic PRNG
Abstract
SNOW3G is a stream cipher used by the 3GPP standards as the core part of the confidentiality and integrity algorithms for UMTS and LTE networks. This paper proposes an enhancement of the regular SNOW3G ciphering algorithm based on HCPRNG. The proposed cipher scheme is based on hyperchaotic generator which is used as an additional layer to the SNOW3G architecture to improve the randomness of its output keystream. The objective of this work is to achieve a high security strength of the regular SNOW3G algorithm while maintaining its standardized properties. The originality of this new scheme is that it provides a good tradeoff between good randomness properties, performance, and hardware resources. Numerical simulations, hardware digital implementation, and experimental results using Xilinx FPGA Virtex technology have demonstrated the feasibility and the efficiency of our secure solution while promising technique can be applied to secure the new generation mobile standards. Thorough analysis of statistical randomness is carried out demonstrating the improved statistical randomness properties of the new scheme compared to the standard SNOW3G, while preserving its resistance against cryptanalytic attacks.
1. Introduction
Nowadays, the security of communications becomes more and more important to meet the demand for realtime secure data transmission over the open networks [1]. Indeed, in our modern life, all our daily transactions and communications are more made over mobile networks. The Universal Mobile Telecommunications System (UMTS) [2], Long Term Evolution (LTE), and LTEadvanced standards are the 3rd and 4thgeneration mobile networks that enable mobile migrations of Internet applications like Voice over IP (VoIP), video streaming, music downloading, mobile TV, and so on. The security of these mobile standards is based principally on the SNOW3G stream cipher [3] which is considered as the kernel of the 128EEA1 confidentiality and 128EIA1 integrity algorithms of the 4G LTE security [4] replacing the f8 and f9 algorithms of UMTS security [5, 6]. Thereafter, the ThirdGeneration Partnership Project (3GPP) has already standardized two other kernel algorithms for LTE confidentiality and integrity protection [7]. These algorithms are the Advanced Encryption Standard (AES) in its CounTeR mode (CTR mode) [8] which is composed of 10 rounds processing essentially on the SubstitutionDiffusion Network (SDN) principle [9] and the ZUC stream cipher specifically designed for use in China [10, 11].
However, AES algorithm has a long computational time [12]; ZUC stream cipher is recently designed and requires more security analysis to prove its robustness and efficiency [13]. However, several analyses have proved that SNOW3G encryption algorithm is weak. In particular, improvements to guard against the following:(i)The short keystream data set attack: this attack discovers a weakness in the initialization process of SNOW3G stream cipher when 8 from the 15 NIST (National Institute of Standards and Technology) tests fail the short keystream data set test [14].(ii)The improved Heuristic Guess and Determine (IHGD) attack which reduces the complexity from to and the size of guessed basis from 10 to 5: this attack exploits the weakness of main linear feedback polynomials of the cipher [15].(iii)The fault attack which recovers the secret key with only 22 fault injections on the Linear Feedback Shift Register (LFSR): the attack model assumes that the attacker is able to modify a 32bit value of one state of the LFSR () during the keystream generation, where is chosen by the attacker, but he has no full control about [16].(iv)The cachetiming attack which is capable of recovering the full cipher state from empirical timing data in a matter of seconds: the attack exploits the cipher using the output from a box as input to another box [17].(v)The multiset collision attack on reducedround: this attack analyzes the resynchronization mechanism of SNOW3G using multiset collision attacks. This technique has proved itself useful against AES [18]. This technique can be applied to SNOW3G since its Finite State Machine (FSM) is essentially a 96bit AESlike cipher in which the LFSR plays a role of a keyschedule. This attack is complicated by the fact that there is a feedback from the FSM to the LFSR during the setup phase (a feature never present in block ciphers) and the attacker sees only 32 bits of output at a time, while the internal state keeps changing constantly [19].(vi)The sliding property attack of stream ciphers: this attack is used to find sets of related keys. This attack is applicable due to the nature of the initialization process of SNOW3G; such related keys do not generate slid keystreams, but only keystreams that have several equal words. However, this still allows distinguishing the produced keystream from random keystreams [20].
Consequently, we remark that the majority of the cited attacks exploit mainly the weakness of the initialization process based on the LFSR polynomials and the FSM box. Therefore, we can not improve all the cited weaknesses, but we focus in this paper on the improvement of the statistical properties analyzed in [14], and we propose updating the SNOW3G stream cipher in order to enhance its robustness and being able to resist against new cryptanalysis attacks based on the considered weaknesses.
During the last decade, the use of chaos to design digital chaotic stream ciphers has become a part of cryptography and very important topic of research [21]. With regard to the characteristics of a chaotic dynamical system these are as follows: a deterministic system, ergodic, sensitive to initial conditions and control parameters, and having a randomlike behaviour. In addition, these characteristics are related to confusion and diffusion concepts usually used in traditional cryptosystems which allow the application of chaos in cryptography. Considering the possibility for the selfsynchronization of chaotic systems, this concept has become a focal topic for research [22]. Therefore, several schemes have been developed to exploit this property of chaotic systems for secure communications. Encryption based chaos has been suggested as a new and efficient way to deal with the problem of fast and highly secure mobile communications. Similarly, several works are proposed to exploit the hyperchaotic (HC) systems providing the nonlinearity and the good randomness. Among them, we can cite the Rssler’s hyperchaotic systems [23, 24], Chen’s hyperchaotic systems [25, 26], Lu’s hyperchaotic system [27], and Lorenz’s hyperchaotic systems [28–30].
This paper proposes a new architecture which combines the regular SNOW3G cipher with a Hyperchaotic PseudoRandom Number Generator (HCPRNG) in order to design a hyperchaotic SNOW3G stream cipher providing good randomness, infinite period, and unpredictability on long term while increasing the complexity of a cryptanalysis attack from the weakness in the initialization mode of the regular SNOW3G cipher [14]. The considered HCPRNG is based on a fourdimensional (4D) Lorenz’s chaotic system which is used as an additional layer to the regular SNOW3G while maintaining its standard properties. Contrariwise of the previous simulated system adding one simple linear chaotic map with the FSM layer of the regular SNOW3G algorithm [31], we propose an enhancement of initialization process and complexity and randomness of output keystream. The main purpose of this added layer is the perturbation of both the digital LFSR sequences and the FSM output. Thus, we suggest this hyperchaotic perturbation technique to investigate the encryption efficiency of LFSR based stream cipher. Consequently, the proposed architecture has the following features. First, the structure of the stream generator key is more complex having a number of variables and parameters, and the time sequence of output is nonrule and not predictable. Thereby, a large key space is provided for use as seed keys of cipher sequences. Second, the standardized core of SNOW3G stream cipher is respected in order to facilitate the integration of our approach in the current and future mobile communication networks. Moreover, the considered system is irreversible and unpredictable and it may be extended to many other (4D) continuous chaotic systems while being suitable for digital implementation. Considering the numerical resolution of nonlinear differential equations to get a digital implementation, our proposed approach has been designed and verified using a VHDL (VHSIC Hardware Description Language) description with a fixedpoint representation of all data on 48 bits leading to a successful hardware implementation targeted to FPGA technology (FieldProgrammable Gate Array). The obtained implementation results provide good performance in terms of hardware area and throughput. Finally, the sturdiness of our proposed architecture has been tested using security analyses and statistical tests. Consequently, the experimental results presented in this paper prove that the added HC generator enhances the randomness and robustness of SNOW3G algorithm against different analyses and statistical attacks.
The rest of this paper is organized as follows. Section 2 briefly reminds the reader with the architecture of the regular SNOW3G stream cipher. Section 3 details the processing steps and architecture of the enhanced SNOW3G stream cipher including a Lorenz’s HC generator as PRNG to perturb the digital output of the regular SNOW3G stream cipher. The digital implementation results on Virtex5 Xilinx FPGA technology and evaluations are presented in Section 4. In this section, the performance and architectural simulations prove the feasibility and the efficiency of our proposed HC SNOW3G stream cipher. In Section 5, the robustness of our new scheme is evaluated through three security analyses: exhaustive key search, key sensitivity, and statistical tests to prove that the proposed HC SNOW3G stream cipher resists against cryptanalysis attacks and exhibits truly random sequences suitable as cipher keys for the data encryption compared to the regular SNOW3G cipher. Finally, Section 6 concludes this paper.
2. Regular SNOW3G Algorithm
The SNOW3G is a cryptographic algorithm which was originally designed as the kernel of the UMTS confidentiality and integrity functions f8 and f9 [5], respectively. After that, it has been kept as the first kernel algorithm for the LTE security functions 128EEA1 and 128EIA1, respectively [3, 4]. SNOW3G is a stream cipher that generates 32bit word keystream under the control of the 128bit Ciphering Key (CK) and 128bit Initialization Vector (IV). It is divided into two interacting layers. The first layer is the LFSR layer which is formed by 16 stages of 32 bits each . The second one is the FSM layer which is formed by three registers (, , and ) of 32 bits each. The detailed architecture of the SNOW3G stream cipher is illustrated in Figure 1, where represents bitwise XOR operation and is adder arithmetic operator. Considering that the regular SNOW3G can not offer robustness against short keystream data set attacks [14], we propose enhancing its statistical properties and security level by overcoming its weaknesses through an additional layer updating the initialization and keystream modes while keeping its standard.
3. Enhanced SNOW3G Algorithm Based on HCPRNG
In this section, we present our designed scheme to enforce the confidentiality and integrity protection for LTE and new generations of mobile standards. We propose adding a HCPRNG as an additional layer to the regular SNOW3G architecture which is based on the LFSR and FSM layers. The HCPRNG is added to the regular SNOW3G architecture to consolidate the complexity of the regular SNOW3G stream cipher in order to improve the randomness of the output keystream and to ameliorate the LFSR initialization based on the perturbation effect. More precisely, the HCPRNG output is mixed with the feedback value of the LFSR layer during the initialization process (see Figure 2), or mixed with the FSM output and with the register during the keystream generation process (more details in Section 3.4). Finally, a specific HC SNOW3G stream cipher is obtained. Figures 2 and 6 depict the considered enhanced architecture. The layers forming the HC SNOW3G architecture are detailed in the following subsections.
3.1. LFSR Layer
As with the regular SNOW3G, this layer is formed by 16 stages of 32 bits each (see Figures 1 and 2). The associated feedback is defined by a primitive polynomial over the finite Galois field using bitwise XOR operations and the wellknown and main functions [3]. The LFSR component is clocked in two operating modes described as follows.
Initialization Mode. In this mode, the LFSR is performed by using three stage registers , , and and one 32bit word called which is the output value of the FSM layer. First, the two 32bit stage registers and are divided into four bytes as follows:where is the concatenation operation. In this division step, the feedback value is calculated by This feedback value sets the stage register () and the contents of the other stage registers are shifted as follows:
Keystream Mode. In this mode, the main difference with the initialization mode is that the feedback value is calculated without using the 32bit word and by All the other steps are similar to the initialization mode.
3.2. FSM Layer
As with the regular SNOW3G, the FSM layer is formed by three registers , , and of 32 bits each (see Figures 1 and 2). To generate a 32bit output keystream word named , this component uses two substitution boxes and , one linear bitwise XOR operation, and one nonlinear integer modulo adder [3]. The FSM is clocked by using two inputs provided by the two registers and arising from the previous LFSR component (see Figure 1). Therefore, can be expressed by Thereby, an intermediate value is calculated to set the three registers , , and at each clock cycle as defined by
3.3. HCPRNG Layer
The added HCPRNG layer is performed by a nonlinear dynamic generator which is very sensitive to initial conditions and presents high recurrences (see Figure 2). This system can be used in cryptography to replace the PRNG. A cryptosystem based on this HCPRNG consists of using a chaotic nonlinear oscillator as a pseudorandom signal generator which is combined with the message before transmission. At the reception, the similar chaotic oscillator is used in order to regenerate the pseudorandom signal which is combined with the received signal through the inverse operation and in order to recover the original message [32]. Moreover, the added HCPRNG layer must be synchronized between the emitter and the receiver to ensure encryption/decryption process like any chaotic or HC system. To realize our HCPRNG, we have implemented the Lorenz HC system which is generated by deriving the generalized Lorenz quadratic controller system (4D) by providing a hyperchaotic behaviour. It is a fourdimensional dynamical controlled system which is characterized by the following [33]:where , , , and are the control parameters. Note that , , , and are >0, and usually , , , and is varied. The system exhibits one hyperchaotic behaviour for . The initial conditions are set as . The two principal requisites presented below must be considered to obtain hyperchaos behaviour: (1)The minimal dimension of the phase space that embeds a HC attractor should be at least four, which requires the minimum number of coupled firstorder autonomous ordinary differential equations to be four.(2)The number of terms in the coupled equations giving rise to instability should be at least two, of which at least one should have a nonlinear function [34].
For resolving (7), we use the RungeKutta fourthorder resolution method (RK4 method) [35, 36]. We present a brief review of this method.
For example, a nonlinear system is defined byNote that , , , and , where , , , and are nonlinear functions. At each iteration , RK4 uses four intermediate values from the iteration . Then, (9) is used to solve (8):Note that is the integration step (interval). For each integration step , four increments are defined for each function (, , , and ): first increment at the beginning, then two increments at the midpoint, and a last increment at the end of the interval , as follows.
When , the first increment values are defined based on the slope at the beginning of the interval, as follows:and when , the second increment values are defined based on the slope at the midpoint of the interval, using previous values (, , , and ), as follows:and when , the third increment values are defined based on the slope at the midpoint of the interval, using previous values (, , , and ), as follows:and when , the fourth increment values are defined based on the slope at the end of the interval, using previous values (, , , and ), as follows:
Mentioning that HC signals are real, we used the fixedpoint format of 48 bits as . The real part is encoded on 16 bits and the decimal part is encoded on 32 bits. The used arithmetic fixedpoint allows achieving a good compromise between performance and cost. Equation set (8) is simulated in MATLAB platform using the numerical tool RK4, and the results are illustrated in Figures 3 and 4. A good randomness is obtained in random HC signals (decimal part) as shown in Figure 3(b) compared to the HC signals (real and decimal parts) as shown in Figure 3(a). Similarly, the Lorenz attractor formed by the random HC signals (decimal part) and given in Figure 4(b) presents more randomness compared to the attractor obtained by the HC signals (real and decimal parts) and given in Figure 4(a). Thereafter, we used only the decimal part of hyperchaotic signals encoded on 32 bits as random perturbation signals.
(a) Obtained hyperchaotic signals (real and decimal parts)
(b) Obtained hyperchaotic signals (decimal part)
(a) Attractors (, , and ) (real and decimal parts)
(b) Attractors (, , and ) (decimal part)
3.3.1. Digital Implementation of the Proposed HCPRNG
To realize the HCPRNG component, we opt for a hardware behaviour description based on Moore’s Finite State Machine [35]. This FSM system describes the numerical resolution based on RungeKutta method performing (7). Thereby, the RK4 method is implemented in digital way suitable for FPGA using the FSM system coded in VHDL language and detailed in Figure 5. This figure describes the FSM system corresponding to the internal states of the HCPRNG layer. A detailed description at each state of the FSM system is presented as follows.
State_1. It is the initialization state. All outputs are set to zero and the state variables are initialized with the initial conditions ().
State_2. In this state, we compute , , , and and the intermediate points , , , and . RK4 signal is always set to zero. At the next rising edge of clock signal, it jumps to the next state without any condition.
State_3. The values of the intermediate points , , , and are used to update the variables , , , and , respectively. At the next rising edge of clock signal, it jumps to the next state without any condition.
State_4. In this state, we compute the initial slopes , , , and and the intermediate points , , , and , respectively. RK4 signal is always set to zero. At the next rising edge of clock signal, it jumps to the next state without any condition.
State_5. The values of the intermediate points calculated in state_4 are used to update the variables , , , and . At the next rising edge of clock signal, it jumps to the next state without any condition.
State_6. In this state, we compute the initial slopes , , , and and the intermediate points , , , and , respectively. RK4 signal is always set to zero. At the next rising edge of clock signal, it jumps to the next state without any condition.
State_7. The values of the intermediate points calculated in state_6 are used to update the variables , , , and . At the next rising edge of clock signal, it jumps to the next state without any condition.
State_8. In this state, the HC solutions , , , and of (8) are calculated, and the RK4 signal is set to one to indicate the end of the process. At the next rising edge of clock signal, it jumps to state_end without any condition.
State_End. It is the last state of the FSM, the first chaotic key values , , , and are generated to perturb SNOW3G, and they are also used to update the variables , , , and , respectively, for the next chaotic key calculation. At the next rising edge of clock signal, if , then it jumps to state_2 to start new generation key cycle. But if , which indicates that all the required keys are generated, the FSM jumps to state_1 to wait a new order of keystream generation. is a command to control the end of output keystreams and is the number of keystreams to be generated.
3.4. Keystream Generation
To ensure the synchronization of the enhanced SNOW3G stream cipher parts, all its components are ordered by the same clock and reset signals. Thereby, two main 128bit inputs CK and IV are loaded to the LFSR stages before starting the process. And then the algorithm is performed according to two operating modes (initialization and keystream modes) depending on the LFSR mode. The perturbation of the LFSR and FSM layers is ordered by a specific block command which defines the starting of perturbation (see Figures 2 and 6). This block provides one perturbation command which is defined by the 4 Least Significant Bits (LSB) of the Initial Vector (LSB(IV) = IV3 down to 0). The keystream generator is performed from the following processing steps.
Key Loading. This step is performed before the initialization mode. First, it begins by dividing each of the two 128bit input words CK and IV into 32bit words as follows: Then, the 16 LFSR stage registers are loaded by the formed 32bit words as follows:In parallel of this key loading step, the HCPRNG layer command is initialized by the IV as follows:
Initialization Mode. When the key loading process is completed, the FSM layer is executed using and stage registers from LFSR layer to generate a 32bit output word expressed by (5). The registers of the FSM layer are set to zero before computing . At the same time, the HCPRNG is executed to produce the 32bit word perturbation signal. After waiting clock cycles, is mixed with by a bitwise XOR operator in order to perturb the LFSR updating. Consequently, the new feedback value is calculated from the following equation:The number of clock cycles is defined by , corresponding to the value contained in which depends on IV. The 16 LFSR stage registers are updated as follows:The FSM and HCPRNG layers run in the initialization mode 32 clock cycles, producing the two 32bit words and , which are used by the LFSR feedback value as defined in (17). Note that the initialization mode does not produce any output keystream . The detailed architecture of the proposed HC SNOW3G stream cipher in its initialization mode is given in Figure 2.
Keystream Mode. At the end of initialization mode, the FSM is performed during one clock cycle, and the associated output word is discarded. Then, the LFSR feedback value is calculated by (4), and the 16 stage registers are updated as follows:For the next clock cycles, the FSM 32bit output word generated by (5) is mixed with the HCPRNG 32bit output word and the register of the LFSR in order to produce the 32bit keystream word as defined by (20). The architecture of the proposed HC SNOW3G stream cipher in its keystream mode is given in Figure 6:Therefore, in this processing mode, the LFSR operates on keystream mode, and both FSM and HCPRNG layers are clocked at each clock cycle to generate a 32bit keystream word as mentioned before. This mode runs times where is the number of 32bit blocks to be encrypted.
4. FPGA Implantation of the Proposed Design
The proposed architecture is mainly based on three layers, as already discussed: the HCPRNG layer and the FSM and LFSR layers of the regular SNOW3G. The added HCPRNG layer is used in order to perturb the LFSR synchronization in the initialization mode and the FSM output in the keystream mode, as described in Figures 2 and 6, respectively.
The RTL description of the proposed architecture has been implemented on Xilinx Virtex5 FPGA (XC5vfx70t1) through the ML507 Virtex Development platform [37] using VHDL structural description. ISE 13.1i of Xilinx tools have been used for this digital implementation allowing obtaining the logic resource requirements and the associated realtime constraints. The Xilinx Synthesis Technology (XST) results after place and route show the performance analysis of our implementation in Table 1. To exhibit the importance of this architecture, we also implemented the regular SNOW3G and the PLCM (Piecewise Linear Chaotic Map) SNOW3G proposed in [31] on the same FPGA device. The results are presented in Table 1. This table depicts comparison in terms of hardware resources, maximum time frequency, throughput, and the power consumption. Our logic implementation on a Xilinx Virtex5 device requires only 2391 Slice registers, 56 bonded IOBs, and 10 block RAMs. In addition, the low power consumption estimated by 1.36 Watts is suitable for embedded electronic applications thanks to the considered FSM encoding algorithm and the fixedpoint coding data.

To evaluate the performance of the proposed stream cipher, the throughput rate metric is considered. The throughput rate is defined as the number of bits of key in a unit of time for a keystream. In view of the performance results (see Table 1), we have achieved a maximal throughput of 922.88 Mbps for the proposed HC SNOW3G and 422.56 Mbps for the PLCM SNOW3G, where the regular SNOW3G achieves a maximal throughput of 8264.32 Mbps. Thus, the proposed architecture is two times faster than PLCM SNOW3G architecture and nine times slower than the regular SNOW3G architecture. On the other hand, the proposed HC SNOW3G architecture occupies greater area compared to the regular and PLCM SNOW3G architectures. The difference in terms of hardware area is due to the following:(1)The HC system is for order 4 where the PLCM system is for order 3.(2)The HC system is more complex and has more nonlinearity than the PLCM system.(3)The HC system complexity provides good randomness and security compared to the PLCM system.
Based on the obtained results and the discussed comparison, we conclude that the proposed HC SNOW3G is better than the PLCM SNOW3G in terms of randomness, security, and high throughput.
To ensure that the proposed architecture enhances the complexity of the standardized SNOW3G stream cipher suitable for increasing the robustness of data encryption, security and statistical tests are performed in order to prove the high level of security obtained from our architecture.
5. Cryptographic Strength and Performance
The security and statistical analyses of our designed architecture are presented in this section. The proposed stream cipher HC SNOW3G algorithm is subjected to two security tests: (1) key sensitivity and (2) key space and several statistical analyses such as uniformity and randomness. to demonstrate its satisfactory security and good randomness with regard to the added HCPRNG layer.
5.1. Statistical Analysis
Many statistical analyses are applied to our proposed stream cipher scheme to demonstrate its robustness such as randomness, uniformity, mixing nature, low coefficient correlation between original and encrypted data packets, and NIST tests. The simulations are done using keystreams of 125000 bytes in length which are normally distributed with a mean equal to 128 and standard deviation equal to 8.
5.1.1. Randomness and Uniformity Analysis
Any performing stream cipher should produce high random keystreams and with best uniformity representation. Therefore, a keystream of 1000000 bits produced by our design is analyzed. The recurrence plot representation (Figure 7(a)) and distribution (Figure 7(b)) of the generated keystream indicate clearly a good degree of randomness and uniformity.
(a) Recurrence plot of keystream
(b) Distribution of keystream
The high randomness of generated keystream is also proved by the randomexcursion and randomexcursionvariant tests of NIST [38]. To perform these tests, we analyzed 250 keystream sequences where each sequence is composed of 50 packets of 1000000 bits. The proportion value of each sequence is shown in Figure 8. The determined range of acceptable proportion using the confidence interval is defined by where is the sample size, , and .
In our case, the confidence interval is (i.e., the proportion value should be laid above 0.947786) which is represented in Figure 8 by the red line. The simulation results indicate clearly the high randomness of keystreams. Indeed, all randomexcursion and randomexcursionvariant proportion values are above the minimum proportion value and close to ideal value 1. In addition, other tests proving randomness and uniformity of our proposed stream cipher are presented in the following subsections.
5.1.2. Low Correlation Coefficient
The correlation is an important test to prove the independence of encrypted data from the original ones. Indeed, the encrypted data are increasingly different from the original ones when the correlation coefficient becomes as low as possible. The correlation coefficient is computed according to [39]whereFor performing this test, we have analysed 500 encrypted packets with different keys, and in each case we have calculated the correlation coefficient between original packet and its corresponding encrypted packet. The results are shown in Figure 9. The illustrated results indicate clearly that no detectable correlation exists between the original and corresponding cipher packets considering that the correlation coefficient is always close to ideal value zero.
5.1.3. Distribution and ChiSquare Uniformity
An additional statistical approach, the distribution of frequency counts which can define the uniformity of generated keystreams, is performed. Any sequence is categorized uniform if its corresponding distribution is close to a uniform distribution. In Figures 10(a) and 10(b) distributions of an original and its corresponding encrypted packet obtained by our proposed stream cipher are presented, respectively. From these results, we deduce that the contents of the encrypted packet are spread over the entire space and have a uniform distribution thanks to a good level of mixing included by our added HCPRNG layer. To validate this uniformity, the Chisquare test is applied [40]. The Chisquare distance is computed according to Note that represents the number of levels (here 256), represents the observed occurrence frequencies of each level of field size (0–255) in the histogram of ciphered generation contents, and is the expected occurrence frequency of uniform distribution. Before applying the test, we fixed the significant level to 0.05. After test, we analyzed the result according to the value. Indeed, if (in our case study), and the null hypothesis is not rejected, then the distribution of the histogram is uniform. In Figure 11, the results of the Chisquare test for 500 different ciphered packets of 125000 bytes each are shown. Based on these results, we conclude that a stronger mixing property is obtained with uniform distribution exceeding ≈95% considering all values are below the value of presented by a red line in Figure 11.
(a) Distribution of one original sequence
(b) Distribution of corresponding encrypted sequence
5.1.4. NIST Keystream Analysis
Various statistical tests can be used to evaluate the randomness of a sequence, for example, NIST [38], DIEHARD [41], NESSIE [42]. In our case study, the NIST statistical tests are used to evaluate our HC SNOW3G stream cipher. To illustrate the importance of the proposed design, we repeat the three statistical tests done in [14] to evaluate the randomness of the generated keystreams. To perform comparison results with previous work [14], we have considered the usual significance level used in the NIST tests [38] and the same sample size sequences. Therefore, in all the experiments the significance level was set to 0.01 and sample size was set to 300 sequences. The tests are defined as follows:(1)Long keystream data set test: it begins by generating bits for each of the 300 random CK (set IV to zero in all the cases) to obtain 300 vectors of 1048576 bits. Then, it evaluates the result vectors by the 15 NIST tests.(2)Short keystream data set test: it begins by generating bits for each of the 307200 random CK (set IV to zero in all the cases). The concatenation of all the keystreams of bits allows obtaining 300 vectors of 1048576 bits. Then, it evaluates the result vectors by the 15 NIST tests.(3)IV data set: it begins by generating 256 sequences of 4096 bits each for 300 random CK. Note that the first sequence of each key is generated with IV set to zero. Then, it is incremented for the following 255 sequences. As a result, we obtain 300 vectors of 1048576 bits for evaluation by the 15 NIST tests.
To perform the analysis, we compare the results of our proposed HC SNOW3G stream cipher with results of the regular SNOW3G done in [14]. The aim of this analysis is to prove the amelioration of the initialization process and randomness of short keystream data set. As a result, we find that both algorithms (regular SNOW3G and our proposed design) pass in success all the fifteen NIST tests for test set 1 (long keystream data set) and test set 3 (IV data set). However, only our proposed design passes in success all the fifteen NIST tests for test set 2 (short keystream data set). Indeed, the regular SNOW3G fails in the eight NIST tests as it is presented in Table 2. More precisely, this table gives a comparison of short keystream generated by the regular SNOW3G cipher with short keystream generated by our proposed HC SNOW3G design. We can clearly observe that all tests are passed compared to the regular SNOW3G cipher where NIST tests based on the short keystream data set have failed [14]. Therefore, we can conclude that our proposed design present an enhanced initialization process and generates very good pseudorandom keystream, which justify its high level of security. Indeed, it is very difficult to find a plaintext masked by a sequence generated by this stream cipher which can be used in the 128EEA1 confidentiality algorithm. Similarly, it is theoretically impossible to generate the same MAC by the 128EEIA1 integrity algorithm based on this stream cipher without knowing original message.

5.2. Key Sensitivity Analysis
The key sensitivity analysis is one among the most important security tests of cryptosystems. In other words, an ideal cryptosystem should be sensitive with respect to the secret key. For testing the key sensitivity of the proposed architecture, we analyzed 500 random keys, where in each case a single bit in the secret key is changed. Then, the percent of Hamming Distance (HD) is calculated according to where is the length in bit level of the encrypted packet and and are the corresponding ciphers packets using two secret keys different in one bit and , respectively. The obtained results are shown in Figure 12 in which a high sensitivity is indicated, while the average Hamming Distance percent is closer to the optimal value in bit level. We conclude that a change of one bit in the secret key leads to thoroughly different keystreams with respect to the avalanche effect [43].
5.3. Key Space Analysis
The proposed enhanced stream cipher HC SNOW3G has the advantage of being able to generate a usable random number while maintaining a large enough key space and high level security. The key space achieved in the present work is increased from in the regular SNOW3G stream cipher to by addition of through the controlling command used to perform the perturbation process which is coded in 16 bits.
Additionally, considering all the initial values and control parameters of our HC generator (defined by (7)) as internal keys, the key space of the generator is based upon those 8 parameters. First, we fix the initial values (, and ) and the three parameters , , and whereas is considered the key of the random number generator (we change slightly the value of ) to generate a new binary sequence. The experiment is done more than 1000 times. The obtained results show that the variance ratio of each bit is approximated to 99%, even if the change of initial value or control parameter is an extremely small value , which means that the system is extremely sensitive to the key changes. Consequently, the key space is larger than for this considered key (). Similarly, the 4 initial values and the 3 remaining control parameters can be considered as key of our random sequence generator. Finally, the key space is defined by , which is large enough to withstand attacks limited by a key space of .
Otherwise, the HC generator key space of is much better than the PLCM generator key space of [44]. Finally, we conclude that our HC generator is sufficiently large to make the bruteforce attacks infeasible.
5.4. Synthesis and Discussion
In cryptography, any cipher must exhibit the confusion and diffusion defined on Shannon’s theory with success to be considered secure enough and able to resist attacks [45]. Our designed cipher is resistant against the powerful attacks that are based on statistical analysis. Moreover, the avalanche effect is attained when repeating the tests several times [43], and then a significant difference is caused in the generated keystream by changing of a single bit in the Ciphering Key, which makes our cipher resistant against a special case of differential cryptanalysis. The proposed cipher is also resistant against the statistical attacks proved by the obtained statistical analysis results. Furthermore, the key space of is achieved, which is sufficiently large to make the bruteforce attack infeasible. Finally, the added nonrevertible HC generator limits the ability of the attackers who try to break the cipher. The high randomness and security of our cipher is achieved according to the new combined HC technique with both regular LFSR and FSM layers in addition to the strength of the original SNOW3G against contemporary cryptanalytic.
6. Conclusion
In this paper, an enhanced SNOW3G stream cipher is proposed. The objective is the improvement of the randomness and the complexity of the regular SNOW3G stream cipher which presents a weakness in its initialization mode leading to failure of the NIST test based on the short keystream data set. The adopted original approach is to include a HCPRNG (Hyperchaotic PseudoRandom Number Generator) based on 4D Lorenz system in the regular SNOW3G cipher as an additional layer while keeping standardization and in order to generate a more robustness keystream. The proposed architecture performs the perturbation concept of digital LFSR (Linear Feedback Shift Register) sequences and the digital output of the regular SNOW3G cipher part through one hyperchaotic generator which is used as PRNG (PseudoRandom Number Generator). The obtained statistical and security tests proved that the proposed stream cipher is more secure than the regular SNOW3G cipher as long as it passes all analyses presented in this paper. Therefore, the proposed stream cipher can replace the regular SNOW3G stream cipher without modification in its mechanism while respecting its standard requirements, mainly the length of input and output parameters. Consequently, this paper proposed a new digital hyperchaotic SNOW3G stream cipher architecture which can be used as the kernel of the confidentiality and integrity algorithms used in the UMTS and LTE standards. The hardware implementation results of our proposed hyperchaotic SNOW3G cipher provide a good tradeoff between high security, performance, and hardware resources. Indeed, the proposed implemented design in FPGA Virtex5 device consumes a low logic area cost while it achieves a throughput of 922.88 Mbps. Finally, our technique exhibits attractive performance and can be extended to enhancing the 4G security level by scrambling the plaintext for the LTE 128EEA1 confidentiality algorithm or controlling the integrity of a signalling message for 128EIA1 algorithm.
Conflicts of Interest
The authors declare that there are no conflicts of interest regarding the publication of this paper.
References
 K. E. Mayes and K. Markantonakis, “Mobile communication security controllers an evaluation paper,” Information Security Technical Report, vol. 13, no. 3, pp. 173–192, 2008. View at: Publisher Site  Google Scholar
 C. Blanchard, “Security for the third generation (3G) mobile system,” Information Security Technical Report, vol. 5, no. 3, pp. 55–65, 2000. View at: Publisher Site  Google Scholar
 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification, Technical Specification (TS) TS 35.216 V12.0.0, 3GPP (Sep 201409).
 Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications, Technical Specification (TS) TS 35.215 V12.0.0, 3GPP (Sep 201409).
 Tech. Rep., 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 specification, Technical Specification (TS) TS 35.201 V12.0.0, 3GPP (Sep 201409).
 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI specification, Technical Specification (TS) TS 35.202 V12.0.0, 3GPP (Sep 201409).
 Digital cellular telecommunications system (phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; 3GPP System Architecture Evolution (SAE); Security Architecture, Technical Specification (TS) ETSI TS 133 401 V11.5.0, 3GPP (Oct 201210).
 P. Szalachowski, B. Ksiezopolski, and Z. Kotulski, “CMAC, CCM and GCM/GMAC: advanced modes of operation of symmetric block ciphers in wireless sensor networks,” Information Processing Letters, vol. 110, no. 7, pp. 247–251, 2010. View at: Publisher Site  Google Scholar  MathSciNet
 D.S. Kundi, A. Aziz, and N. Ikram, “A high performance STBox based unified AES encryption/decryption architecture on FPGA,” Microprocessors and Microsystems, vol. 41, pp. 37–46, 2016. View at: Publisher Site  Google Scholar
 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications, Technical Specification (TS) TS 35.221 V12.0.0, 3GPP (Sep 201409).
 Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification, Technical Specification (TS) TS 35.222 V12.0.0, 3GPP (Sep 201409).
 S. Murphy, “The advanced encryption standard (AES),” Information Security Technical Report, vol. 4, no. 4, pp. 12–17, 1999. View at: Publisher Site  Google Scholar
 F. Lafitte, O. Markowitch, and D. Van Heule, “SAT based analysis of LTE stream cipher ZUC,” Journal of Information Security and Applications, vol. 22, pp. 54–65, 2015. View at: Publisher Site  Google Scholar
 P. Bohm, “Statistical Evaluation of Stream Cipher SNOW 3G,” in Proceedings of the "Constantin Brancusi" University of Targu Jiu Engineering Faculty Scientific Conference with International Participation, Targu Jiu, Romania, 13th edition, 2008. View at: Google Scholar
 M. S. N. Nia and T. Eghlidos, “Improved Heuristic guess and determine attack on SNOW 3G stream cipher,” in Proceedings of the 2014 7th International Symposium on Telecommunications, IST 2014, pp. 972–976, September 2014. View at: Publisher Site  Google Scholar
 B. Debraize and I. M. Corbella, “Fault analysis of the stream cipher snow 3G,” in Proceedings of the 6th International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, pp. 103–110, Lausanne, Switzerland, September 2009. View at: Publisher Site  Google Scholar
 B. B. Brumley, R. M. Hakala, K. Nyberg, and S. Sovio, “Consecutive Sbox lookups: a timing attack on SNOW 3G,” in Proceedings of the 12th International Conference, ICICS 2010, pp. 171–185, Barcelona , Spain, 2010. View at: Google Scholar
 H. Gilbert and M. Minier, “A Collision Attack on 7 Rounds of Rijndael,” in Proceedings of the AES Candidate Conference, pp. 230–241, 2000. View at: Google Scholar
 A. Biryukov, D. PriemuthSchmid, and B. Zhang, “Multiset Collision Attacks on ReducedRound SNOW 3G and SNOW 3G ⊕,” in Proceedings of the 8th International Conference, ACNS 2010, pp. 139–153, Beijing, China, 2010. View at: Google Scholar
 A. Kircanski and A. M. Youssef, “On the sliding property of SNOW 3G and SNOW 2.0,” IET Information Security, vol. 5, no. 4, pp. 199–206, 2011. View at: Publisher Site  Google Scholar
 S. Sadoudi, C. Tanougast, and M. S. Azzaz, “First experimental solution for channel noise sensibility in digital chaotic communications,” Progress in Electromagnetics Research C, vol. 32, pp. 181–196, 2012. View at: Publisher Site  Google Scholar
 M. S. Azzaz, C. Tanougast, S. Sadoudi, and A. Bouridane, “Synchronized hybrid chaotic generators: application to realtime wireless speech encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 8, pp. 2035–2047, 2013. View at: Publisher Site  Google Scholar  MathSciNet
 O. E. Rossler, “An equation for hyperchaos,” Physics Letters A, vol. 71, no. 23, pp. 155–157, 1979. View at: Publisher Site  Google Scholar  MathSciNet
 S. Nikolov and S. Clodong, “Occurrence of regular, chaotic and hyperchaotic behavior in a family of modified Rossler hyperchaotic systems,” Chaos, Solitons & Fractals, vol. 22, no. 2, pp. 407–431, 2004. View at: Publisher Site  Google Scholar  MathSciNet
 A. Chen, J. Lu, J. Lü, and S. Yu, “Generating hyperchaotic Lü attractor via state feedback control,” Physica A: Statistical Mechanics and its Applications, vol. 36, no. 4, pp. 103–110, 2006. View at: Publisher Site  Google Scholar
 T. Gao, Z. Chen, Z. Yuan, and G. Chen, “A hyperchaos generated from Chen's system,” International Journal of Modern Physics C, vol. 17, no. 4, pp. 471–478, 2006. View at: Publisher Site  Google Scholar
 Y. Li, W. K. S. Tang, and G. Chen, “Generating hyperchaos via state feedback control,” International Journal of Bifurcation and Chaos, vol. 15, no. 10, pp. 3367–3375, 2005. View at: Publisher Site  Google Scholar
 G. Tiegang, C. Zengqiang, G. Qiaolun, and Z. Yuan, “A new hyperchaos generated from generalized Lorenz system via nonlinear feedback,” Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 390–397, 2008. View at: Publisher Site  Google Scholar
 Q. Jia, “Hyperchaos generated from the Lorenz chaotic system and its control,” Physics Letters A, vol. 366, no. 3, pp. 217–222, 2007. View at: Publisher Site  Google Scholar
 W. Xingyuan and W. Mingjun, “A hyperchaos generated from Lorenz system,” Physica A: Statistical Mechanics and its Applications, vol. 387, no. 14, pp. 3751–3758, 2008. View at: Publisher Site  Google Scholar  MathSciNet
 M. Wasi, A. Arif, and S. Windarta, “Modified SNOW 3G: Stream cipher algorithm using piecewise linear chaotic map,” in Proceedings of the AIP Conference Proceedings, vol. 1707, Issue 1, 2016. View at: Google Scholar
 G. Alvarez, G. P. F. Monotoya, G. Pastor, and M. Romera, “Chaotic cryptosystems,” in Proceedings of the IEEE 33rd Annual International Carnahan Conference on Security Technology, pp. 332–338, Madrid, Spain, October 1999. View at: Publisher Site  Google Scholar
 E. Lorenz, “Deterministic nonperiodic flow,” Journal of Atmospheric Sciences, no. 20, pp. 130–141, 1963. View at: Google Scholar
 T. Tsubone and T. Saito, “Hyperchaos from a 4D manifold piecewiselinear system,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 45, no. 9, pp. 889–894, 1998. View at: Publisher Site  Google Scholar
 S. Sadoudi, C. Tanougast, M. S. Azzaz, and A. Dandache, “Design and FPGA implementation of a wireless hyperchaotic communication system for secure realtime image transmission,” Eurasip Journal on Image and Video Processing, vol. 2013, article 43, pp. 1–18, 2013. View at: Publisher Site  Google Scholar
 J.P. Demailly, “Analyse numérique et équations différentielles, EDP Sciences 4,” Collection Grenoble Sciences, 2006. View at: Google Scholar
 Virtex 5 FPGA Configuration User Guide, ug702, Xilinx (sep 2012).
 A. Rukhin, J. Sota, J. Nechvatal et al., “A statistical test suite for random and pseudorandom number generators for cryptographic applications,” Special Publication NIST 80022, National Institute of Standards and Technology, 2010. View at: Publisher Site  Google Scholar
 J. L. Rodgers and A. W. Nicewander, “Thirteen ways to look at the correlation coefficient,” The American Statistician, vol. 42, no. 1, pp. 59–66, 1988. View at: Publisher Site  Google Scholar
 C. Bates and B. Carl, “The Chisquare Test of Goodness of Fit for Bivariate Normal Distribution,” Defence Technical Information Center. View at: Google Scholar
 G. Marsaglia, “The Marsaglia Random Number CDROM, with The Diehard Battery of Tests of Randomness,” Florida State University under a grant from The National Science Foundation, 1985. View at: Google Scholar
 B. Preneel, “New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report,” in Proceedings of the International Workshop on Public Key Cryptography (PKC) 2002: Public Key Cryptography, pp. 297–309, 2002. View at: Google Scholar
 D. Han, L. Min, and G. Chen, “A Stream Encryption Scheme with Both Key and Plaintext Avalanche Effects for Designing ChaosBased Pseudorandom Number Generator with Application to Image Encryption,” International Journal of Bifurcation and Chaos, vol. 26, no. 5, article 1650091, 2016. View at: Publisher Site  Google Scholar
 Y. Hu, C. Zhu, and Z. Wang, “An improved piecewise linear chaotic map based image encryption algorithm,” The Scientific World Journal, vol. 2014, Article ID 275818, 7 pages, 2014. View at: Publisher Site  Google Scholar
 C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Technical Journal, vol. 28, pp. 656–715, 1949. View at: Publisher Site  Google Scholar  MathSciNet
Copyright
Copyright © 2017 Mahdi Madani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.