Table of Contents Author Guidelines Submit a Manuscript
Security and Communication Networks
Volume 2017 (2017), Article ID 5746976, 15 pages
https://doi.org/10.1155/2017/5746976
Research Article

Digital Implementation of an Improved LTE Stream Cipher Snow-3G Based on Hyperchaotic PRNG

1LISIC Laboratory, Electronics and Computer Science Faculty, University of Science and Technology of Houari Boumediene (USTHB), Algiers, Algeria
2LCOMS, Universite de Lorraine, Metz, France

Correspondence should be addressed to Mahdi Madani

Received 23 June 2017; Revised 10 September 2017; Accepted 27 September 2017; Published 27 November 2017

Academic Editor: Angel M. Del Rey

Copyright © 2017 Mahdi Madani et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. K. E. Mayes and K. Markantonakis, “Mobile communication security controllers an evaluation paper,” Information Security Technical Report, vol. 13, no. 3, pp. 173–192, 2008. View at Publisher · View at Google Scholar · View at Scopus
  2. C. Blanchard, “Security for the third generation (3G) mobile system,” Information Security Technical Report, vol. 5, no. 3, pp. 55–65, 2000. View at Publisher · View at Google Scholar · View at Scopus
  3. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 2: SNOW 3G specification, Technical Specification (TS) TS 35.216 V12.0.0, 3GPP (Sep 2014-09).
  4. Specification of the 3GPP Confidentiality and Integrity Algorithms UEA2 & UIA2; Document 1: UEA2 and UIA2 specifications, Technical Specification (TS) TS 35.215 V12.0.0, 3GPP (Sep 2014-09).
  5. Tech. Rep., 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 1: f8 and f9 specification, Technical Specification (TS) TS 35.201 V12.0.0, 3GPP (Sep 2014-09).
  6. 3G Security; Specification of the 3GPP Confidentiality and Integrity Algorithms; Document 2: KASUMI specification, Technical Specification (TS) TS 35.202 V12.0.0, 3GPP (Sep 2014-09).
  7. Digital cellular telecommunications system (phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; 3GPP System Architecture Evolution (SAE); Security Architecture, Technical Specification (TS) ETSI TS 133 401 V11.5.0, 3GPP (Oct 2012-10).
  8. P. Szalachowski, B. Ksiezopolski, and Z. Kotulski, “CMAC, CCM and GCM/GMAC: advanced modes of operation of symmetric block ciphers in wireless sensor networks,” Information Processing Letters, vol. 110, no. 7, pp. 247–251, 2010. View at Publisher · View at Google Scholar · View at MathSciNet
  9. D.-S. Kundi, A. Aziz, and N. Ikram, “A high performance ST-Box based unified AES encryption/decryption architecture on FPGA,” Microprocessors and Microsystems, vol. 41, pp. 37–46, 2016. View at Publisher · View at Google Scholar · View at Scopus
  10. Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 1: EEA3 and EIA3 specifications, Technical Specification (TS) TS 35.221 V12.0.0, 3GPP (Sep 2014-09).
  11. Specification of the 3GPP Confidentiality and Integrity Algorithms EEA3 & EIA3; Document 2: ZUC specification, Technical Specification (TS) TS 35.222 V12.0.0, 3GPP (Sep 2014-09).
  12. S. Murphy, “The advanced encryption standard (AES),” Information Security Technical Report, vol. 4, no. 4, pp. 12–17, 1999. View at Publisher · View at Google Scholar
  13. F. Lafitte, O. Markowitch, and D. Van Heule, “SAT based analysis of LTE stream cipher ZUC,” Journal of Information Security and Applications, vol. 22, pp. 54–65, 2015. View at Publisher · View at Google Scholar · View at Scopus
  14. P. Bohm, “Statistical Evaluation of Stream Cipher SNOW 3G,” in Proceedings of the "Constantin Brancusi" University of Targu Jiu Engineering Faculty Scientific Conference with International Participation, Targu Jiu, Romania, 13th edition, 2008.
  15. M. S. N. Nia and T. Eghlidos, “Improved Heuristic guess and determine attack on SNOW 3G stream cipher,” in Proceedings of the 2014 7th International Symposium on Telecommunications, IST 2014, pp. 972–976, September 2014. View at Publisher · View at Google Scholar · View at Scopus
  16. B. Debraize and I. M. Corbella, “Fault analysis of the stream cipher snow 3G,” in Proceedings of the 6th International Workshop on Fault Diagnosis and Tolerance in Cryptography, FDTC 2009, pp. 103–110, Lausanne, Switzerland, September 2009. View at Publisher · View at Google Scholar · View at Scopus
  17. B. B. Brumley, R. M. Hakala, K. Nyberg, and S. Sovio, “Consecutive S-box lookups: a timing attack on SNOW 3G,” in Proceedings of the 12th International Conference, ICICS 2010, pp. 171–185, Barcelona , Spain, 2010.
  18. H. Gilbert and M. Minier, “A Collision Attack on 7 Rounds of Rijndael,” in Proceedings of the AES Candidate Conference, pp. 230–241, 2000.
  19. A. Biryukov, D. Priemuth-Schmid, and B. Zhang, “Multiset Collision Attacks on Reduced-Round SNOW 3G and SNOW 3G ,” in Proceedings of the 8th International Conference, ACNS 2010, pp. 139–153, Beijing, China, 2010.
  20. A. Kircanski and A. M. Youssef, “On the sliding property of SNOW 3G and SNOW 2.0,” IET Information Security, vol. 5, no. 4, pp. 199–206, 2011. View at Publisher · View at Google Scholar · View at Scopus
  21. S. Sadoudi, C. Tanougast, and M. S. Azzaz, “First experimental solution for channel noise sensibility in digital chaotic communications,” Progress in Electromagnetics Research C, vol. 32, pp. 181–196, 2012. View at Publisher · View at Google Scholar · View at Scopus
  22. M. S. Azzaz, C. Tanougast, S. Sadoudi, and A. Bouridane, “Synchronized hybrid chaotic generators: application to real-time wireless speech encryption,” Communications in Nonlinear Science and Numerical Simulation, vol. 18, no. 8, pp. 2035–2047, 2013. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus
  23. O. E. Rossler, “An equation for hyperchaos,” Physics Letters A, vol. 71, no. 2-3, pp. 155–157, 1979. View at Publisher · View at Google Scholar · View at MathSciNet
  24. S. Nikolov and S. Clodong, “Occurrence of regular, chaotic and hyperchaotic behavior in a family of modified Rossler hyperchaotic systems,” Chaos, Solitons & Fractals, vol. 22, no. 2, pp. 407–431, 2004. View at Publisher · View at Google Scholar · View at MathSciNet
  25. A. Chen, J. Lu, J. Lü, and S. Yu, “Generating hyperchaotic Lü attractor via state feedback control,” Physica A: Statistical Mechanics and its Applications, vol. 36, no. 4, pp. 103–110, 2006. View at Publisher · View at Google Scholar · View at Scopus
  26. T. Gao, Z. Chen, Z. Yuan, and G. Chen, “A hyperchaos generated from Chen's system,” International Journal of Modern Physics C, vol. 17, no. 4, pp. 471–478, 2006. View at Publisher · View at Google Scholar · View at Scopus
  27. Y. Li, W. K. S. Tang, and G. Chen, “Generating hyperchaos via state feedback control,” International Journal of Bifurcation and Chaos, vol. 15, no. 10, pp. 3367–3375, 2005. View at Publisher · View at Google Scholar · View at Scopus
  28. G. Tiegang, C. Zengqiang, G. Qiaolun, and Z. Yuan, “A new hyper-chaos generated from generalized Lorenz system via nonlinear feedback,” Chaos, Solitons & Fractals, vol. 35, no. 2, pp. 390–397, 2008. View at Publisher · View at Google Scholar · View at Scopus
  29. Q. Jia, “Hyperchaos generated from the Lorenz chaotic system and its control,” Physics Letters A, vol. 366, no. 3, pp. 217–222, 2007. View at Publisher · View at Google Scholar · View at Scopus
  30. W. Xingyuan and W. Mingjun, “A hyperchaos generated from Lorenz system,” Physica A: Statistical Mechanics and its Applications, vol. 387, no. 14, pp. 3751–3758, 2008. View at Publisher · View at Google Scholar · View at MathSciNet
  31. M. Wasi, A. Arif, and S. Windarta, “Modified SNOW 3G: Stream cipher algorithm using piecewise linear chaotic map,” in Proceedings of the AIP Conference Proceedings, vol. 1707, Issue 1, 2016.
  32. G. Alvarez, G. P. F. Monotoya, G. Pastor, and M. Romera, “Chaotic cryptosystems,” in Proceedings of the IEEE 33rd Annual International Carnahan Conference on Security Technology, pp. 332–338, Madrid, Spain, October 1999. View at Publisher · View at Google Scholar
  33. E. Lorenz, “Deterministic nonperiodic flow,” Journal of Atmospheric Sciences, no. 20, pp. 130–141, 1963. View at Google Scholar
  34. T. Tsubone and T. Saito, “Hyperchaos from a 4-D manifold piecewise-linear system,” IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications, vol. 45, no. 9, pp. 889–894, 1998. View at Publisher · View at Google Scholar · View at Scopus
  35. S. Sadoudi, C. Tanougast, M. S. Azzaz, and A. Dandache, “Design and FPGA implementation of a wireless hyperchaotic communication system for secure real-time image transmission,” Eurasip Journal on Image and Video Processing, vol. 2013, article 43, pp. 1–18, 2013. View at Publisher · View at Google Scholar
  36. J.-P. Demailly, “Analyse numérique et équations différentielles, EDP Sciences 4,” Collection Grenoble Sciences, 2006. View at Google Scholar
  37. Virtex 5 FPGA Configuration User Guide, ug702, Xilinx (sep 2012).
  38. A. Rukhin, J. Sota, J. Nechvatal et al., “A statistical test suite for random and pseudorandom number generators for cryptographic applications,” Special Publication NIST 800-22, National Institute of Standards and Technology, 2010. View at Publisher · View at Google Scholar
  39. J. L. Rodgers and A. W. Nicewander, “Thirteen ways to look at the correlation coefficient,” The American Statistician, vol. 42, no. 1, pp. 59–66, 1988. View at Publisher · View at Google Scholar
  40. C. Bates and B. Carl, “The Chi-square Test of Goodness of Fit for Bivariate Normal Distribution,” Defence Technical Information Center.
  41. G. Marsaglia, “The Marsaglia Random Number CDROM, with The Diehard Battery of Tests of Randomness,” Florida State University under a grant from The National Science Foundation, 1985. View at Google Scholar
  42. B. Preneel, “New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report,” in Proceedings of the International Workshop on Public Key Cryptography (PKC) 2002: Public Key Cryptography, pp. 297–309, 2002.
  43. D. Han, L. Min, and G. Chen, “A Stream Encryption Scheme with Both Key and Plaintext Avalanche Effects for Designing Chaos-Based Pseudorandom Number Generator with Application to Image Encryption,” International Journal of Bifurcation and Chaos, vol. 26, no. 5, article 1650091, 2016. View at Publisher · View at Google Scholar · View at Scopus
  44. Y. Hu, C. Zhu, and Z. Wang, “An improved piecewise linear chaotic map based image encryption algorithm,” The Scientific World Journal, vol. 2014, Article ID 275818, 7 pages, 2014. View at Publisher · View at Google Scholar · View at Scopus
  45. C. E. Shannon, “Communication theory of secrecy systems,” Bell Labs Technical Journal, vol. 28, pp. 656–715, 1949. View at Publisher · View at Google Scholar · View at MathSciNet · View at Scopus