Using a Chaotic Cipher to Encrypt Ethernet Traffic

In this work a new physical layer encryption method for Ethernet 1000Base-X standard is proposed. The proposed encryption scheme uses a chaotic stream cipher to encrypt the 8b10b symbols flow at PCS (Physical Coding Sublayer) level. The complete system has been implemented in an FPGA (Field Programmable Gate Array). Experimental results are analyzed, concluding that it is possible to cipher traffic at this level and hide the complete Ethernet traffic pattern from any malicious observer. Moreover, no overhead is introduced during encryption and no throughput losses are produced.

[1]  Zsigmond Szilárd,et al.  Physical-layer security in evolving optical networks , 2016, IEEE Communications Magazine.

[2]  Morris Dworkin 800-38 G Recommendation for Block Cipher Modes of Operation : Methods for Format-Preserving Encryption , 2013 .

[3]  Bert M. Coursey,et al.  Appendix a. , 2006, Journal of the ICRU.

[4]  Joseph Zambreno,et al.  A chaotic encryption scheme for real-time embedded systems: design and implementation , 2013, Telecommun. Syst..

[5]  Phillip Rogaway,et al.  A Synopsis of Format-Preserving Encryption , 2010 .

[6]  Carlos Sánchez-Azqueta,et al.  Fast and secure chaotic stream cipher with a MEMS-based seed generator , 2017, 2017 IEEE International Instrumentation and Measurement Technology Conference (I2MTC).

[7]  Lena Wosinska,et al.  A New Approach to Optical Networks Security: Attack-Aware Routing and Wavelength Assignment , 2010, IEEE/ACM Transactions on Networking.

[8]  Carlos Sánchez-Azqueta,et al.  Chaos-based stream cipher for gigabit ethernet , 2018, 2018 IEEE 9th Latin American Symposium on Circuits & Systems (LASCAS).

[9]  Carlos Sánchez-Azqueta,et al.  Application of a MEMS-Based TRNG in a Chaotic Stream Cipher , 2017, Sensors.

[10]  Robert F. Mills,et al.  Evaluation of Format- Preserving Encryption Algorithms for Critical Infrastructure Protection , 2014, Critical Infrastructure Protection.

[11]  Tommaso Addabbo,et al.  Digitized Chaos for Pseudo-random Number Generation in Cryptography , 2011, Chaos-Based Cryptography.

[12]  Guanrong Chen,et al.  On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps , 2005, Int. J. Bifurc. Chaos.

[13]  Paul R. Prucnal,et al.  Optical Layer Security in Fiber-Optic Networks , 2011, IEEE Transactions on Information Forensics and Security.

[14]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.