A novel chaos-based encryption algorithm over TCP data packet for secure communication

In this article, a new algorithm that can encrypt data on TCP data segment by using a novel chaotic random number generator was developed. First of all, dynamic analyses of the chaotic system to be used were made and the original pseudo-random number generator (PRNG) with a new approach was designed. Key series produced by PRNG was tested on NIST and passed all the tests. The chaos-based encryption here was performed on TCP, one of the most fundamental protocols in data communication. Following this, TCP data segments were encrypted by the sender on bit base with key series produced by PRNG, and then they were decrypted by the receiver. Security level of the chaos-based encryption carried out here was tested with histogram, its key length, key sensitivity and entropy method. Memory and time usages were measured in performance analysis. So as to reveal the performance of the encryption, memory usage, encryption and decryption times were analyzed by comparison on different security algorithms. According to tests and analyses results, this chaos-based encryption has a high level of performance and security; and it is an original study that can be used in real-time implementations with TCP protocol. Copyright © 2016 John Wiley & Sons, Ltd.

[1]  Jörg Widmer,et al.  TCP Friendly Rate Control (TFRC): Protocol Specification , 2003, RFC.

[2]  Mark Handley,et al.  RFC 5348: TCP Friendly Rate Control (TFRC): Protocol Specification , 2008 .

[3]  Mustafa Türk,et al.  Random number generation using multi-mode chaotic attractor , 2013, 2013 21st Signal Processing and Communications Applications Conference (SIU).

[4]  Ennio Gambi,et al.  A new chaotic algorithm for video encryption , 2002, IEEE Trans. Consumer Electron..

[5]  K.Sakthidasan Sankaran,et al.  A New Chaotic Algorithm for Image Encryption and Decryption of Digital Color Images , 2011 .

[6]  Jing Liu,et al.  A Speech Chaotic Encryption Algorithm Based on Network , 2008, 2008 International Conference on Intelligent Information Hiding and Multimedia Signal Processing.

[7]  Riccardo Rovatti,et al.  Implementation and Testing of High-Speed CMOS True Random Number Generators Based on Chaotic Systems , 2010, IEEE Transactions on Circuits and Systems I: Regular Papers.

[8]  Guoyuan Qi,et al.  A four-wing hyper-chaotic attractor and transient chaos generated from a new 4-D quadratic autonomous system , 2010 .

[9]  Safwan El Assad,et al.  Secure TCP/IP communications over DVB-S/DVB-RCS using chaotic sequences , 2009, 2009 International Conference for Internet Technology and Secured Transactions, (ICITST).

[10]  Bruce Schneier,et al.  Description of a New Variable-Length Key, 64-bit Block Cipher (Blowfish) , 1993, FSE.

[11]  Deepa Kundur,et al.  Practical Data Hiding in TCP/IP , 2002 .

[12]  Salih Ergun,et al.  Truly random number generators based on a non-autonomous chaotic oscillator , 2007 .

[13]  A. V. Prabu,et al.  Audio Encryption in Hand sets , 2012 .

[14]  V. R. Ghorpade,et al.  Steganography by hiding data in TCP/IP headers , 2010, 2010 3rd International Conference on Advanced Computer Theory and Engineering(ICACTE).

[15]  Kamlesh Gupta,et al.  Novel Approach for fast Compressed Hybrid color image Cryptosystem , 2012, Adv. Eng. Softw..

[16]  Di Xiao,et al.  Analysis and improvement of a chaos-based image encryption algorithm , 2009 .

[17]  C. Chui,et al.  A symmetric image encryption scheme based on 3D chaotic cat maps , 2004 .

[18]  Sundarapandian Vaidyanathan,et al.  Analysis, synchronization and circuit design of a novel butterfly attractor , 2014 .

[19]  Ali Kanso,et al.  Cryptosystems based on continued fractions , 2011, Secur. Commun. Networks.

[20]  Akif Akgul,et al.  A new three-dimensional chaotic system without equilibrium points, its dynamical analyses and electronic circuit application , 2016 .

[21]  Guanrong Chen,et al.  A four-wing chaotic attractor generated from a new 3-D quadratic autonomous system , 2008 .

[22]  Julien Clinton Sprott,et al.  A novel four-wing strange attractor born in bistability , 2015, IEICE Electron. Express.

[23]  Muhammad Khurram Khan,et al.  Chaos-based secure satellite imagery cryptosystem , 2010, Comput. Math. Appl..

[24]  Xiaoling Huang,et al.  A NEW DIGITAL IMAGE ENCRYPTION ALGORITHM BASED ON 4D CHAOTIC SYSTEM , 2012 .

[25]  Mohamed I. Sobhy,et al.  Chaotic algorithms for data encryption , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[26]  J. Yorke,et al.  Chaos: An Introduction to Dynamical Systems , 1997 .

[27]  Ihsan Pehlivan,et al.  Implementation of FPGA-based real time novel chaotic oscillator , 2014 .

[28]  M. T. Mohammed,et al.  Confidentiality enhancement of Secure Real Time Transport Protocol , 2012, 2012 8th International Computer Engineering Conference (ICENCO).

[29]  Security Enhancement on VoIP using Chaotic Cryptography , 2006, IECON 2006 - 32nd Annual Conference on IEEE Industrial Electronics.

[30]  Qurban A. Memon Synchronized chaos for network security , 2003, Comput. Commun..

[31]  Qifeng Liu,et al.  Chaotic oscillator with potentials in TRNG and ADC , 2012, 2012 35th International Conference on Telecommunications and Signal Processing (TSP).

[32]  Irwin Goodwin Rumors Denied on Gibbons and Deutch , 1997 .

[33]  S. Lian,et al.  Efficient image or video encryption based on spatiotemporal chaos system , 2009 .

[34]  Osama S. Faragallah,et al.  An Efficient Block Encryption Cipher Based on Chaotic Maps for Secure Multimedia Applications , 2011, Inf. Secur. J. A Glob. Perspect..

[35]  Zhouchao Wei,et al.  Analysis, nonlinear control, and chaos generator circuit of another strange chaotic system , 2012 .

[36]  Zengqiang Chen,et al.  Image encryption based on a new total shuffling algorithm , 2008 .

[37]  E. Ott Chaos in Dynamical Systems: Contents , 2002 .

[38]  Gunhan Dundar,et al.  A new dual entropy core true random number generator , 2013, 2013 8th International Conference on Electrical and Electronics Engineering (ELECO).

[39]  Tzung-Her Chen,et al.  A security-enhanced key agreement protocol based on chaotic maps , 2013, Secur. Commun. Networks.