Improving the Diffusion of the Stream Cipher Salsa20 by Employing a Chaotic Logistic Map

The stream cipher Salsa20 and its reduced versions are among the fastest stream ciphers available today. However, Salsa20/7 is broken and Salsa20/12 is not as safe as before. Therefore, Salsa20 must completely perform all of the four rounds of encryption to achieve a good diffusion in order to resist the known attacks. In this paper, a new variant of Salsa20 that uses the chaos theory and that can achieve diffusion faster than the original Salsa20 is presented. The method has been tested and benchmarked with the original Salsa20 with a series of tests. Most of the tests show that the proposed chaotic Salsa of two rounds is faster than the original four rounds of Salsa20/4, but it offers the same diffusion level.

[1]  Daniel J. Bernstein,et al.  The Salsa20 Family of Stream Ciphers , 2008, The eSTREAM Finalists.

[2]  Ali Mohammed Noori Hasan Design and simulation of a modified perturbed digital chaotic signal generator for secure data communication , 2009, ICIS '09.

[3]  M. Bernhard Introduction to Chaotic Dynamical Systems , 1992 .

[4]  Willi Meier,et al.  Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 , 2006, INDOCRYPT.

[5]  Shahram Khazaei,et al.  New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba , 2008, FSE.

[6]  Robert A. J. Matthews,et al.  On the Derivation of a "Chaotic" Encryption Algorithm , 1989, Cryptologia.

[7]  Musheer Ahmad,et al.  Modified Multi-Chaotic Systems that are Based on Pixel Shuffle for Image Encryption , 2013, J. Inf. Process. Syst..

[8]  D. R. Frey,et al.  Chaotic digital encoding: an approach to secure communication , 1993 .

[9]  Ralf Schweizer Does God Play Dice? The Mathematics of Chaos, Ian Stewart. 1989. Basil Blackwell, Cambrdige, MA. 317 pages. ISBN: 0-631-16847-8. $19.95 , 1991 .

[10]  Paul Crowley Truncated differential cryptanalysis of five rounds of Salsa20 , 2005, IACR Cryptol. ePrint Arch..

[11]  Garry Howell,et al.  An Introduction to Chaotic dynamical systems. 2nd Edition, by Robert L. Devaney , 1990 .

[12]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[13]  A. Kanso,et al.  Logistic chaotic maps for binary numbers generations , 2009 .

[14]  Leonid A. Levin,et al.  A hard-core predicate for all one-way functions , 1989, STOC '89.

[15]  Vinod Patidar,et al.  Discrete chaotic cryptography using external key , 2003 .

[16]  Xiaomin Wang,et al.  Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing , 2006, CANS.