Skip to main content

Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms

  • Chapter
Chaos-Based Cryptography

Part of the book series: Studies in Computational Intelligence ((SCI,volume 354))

Abstract

Protection of private user information in computers and communication networks has been one of the major concerns during the last decade. It has become even more critical due to pervasive use of smart mobile devices, and is exacerbated due to their limited processing and battery power needed to manage complex encryption schemes, particularly for real-time multimedia applications (audio and video). Secure multimedia communication systems require processing of huge amounts of information at speeds ranging from Kilobits/sec (Kbs) to the order of Megabits/sec (Mbs). Provisioning of security for such large volumes of data in mobile devices may be simply infeasible when the complexity of related operations is beyond the processing limit of such devices. In this chapter we evaluate the performance of different encryption schemes, including AES implementations and non-conventional chaotic encryption on different architectures. Our experiments reveal that chaos-based schemes outperform the conventional AES implementation in terms of CPU usage, encryption speed, and energy consumption. Particularly they consume 300-400% less CPU power, and have over 250% faster encryption speed. However, the performance also depends on the floating point capability of the platform; a suitable scheme may be chosen depending on the CPU power of platform. The performance results reported in this chapter are based on experiments on contemporary desktops, laptops, netbooks, and cell phones (Nokia N800 and N900).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Li, S., Mou, X., Ji, Z., Zhang, J., Cai, Y., Ji, Z., Zhang, J.: On the security of a chaotic encryption scheme: problems with computerized chaos. Comput. Phys. Commun. 153(1), 52–58 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  2. Li, S., Chen, G., Mou, X.: On the dynamical degradation of digital piecewise linear chaotic maps. Int. Journ. Bifurcat. Chaos 15(10), 3119–3151 (2005)

    Article  MathSciNet  MATH  Google Scholar 

  3. Binder, P.M., Jensen, R.V.: Simulating chaotic behavior with finite-state machines. Physical Review A 34(5), 4460–4463 (1986)

    Article  Google Scholar 

  4. Álvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurcat. Chaos 16(8), 2129–2151 (2006)

    Article  MATH  Google Scholar 

  5. Kocarev, L.: Chaos-based cryptography: a brief overview. IEEE Circ. Syst. Mag. 1(3), 6–21 (2001)

    Article  Google Scholar 

  6. Al-masalha, F., Khokhar, A., Hasimoto-Beltran, R.: Scalable Encryption of Variable Length Coded Video Bit Streams. In: The 35th IEEE Conference on Local Computer Networks, LCN 2010 (2010)

    Google Scholar 

  7. Li, S., Zheng, X., Mou, X., Cai, Y.: Chaotic encryption scheme for real-time digital video. In: Real-Time Imaging VI. Proc. of the SPIE, vol. 4666, pp. 149–160 (2002)

    Google Scholar 

  8. Lian, S., Sun, J., Wang, Z., Dai, Y.: A fast video encryption scheme based-on chaos. In: 8th IEEE International Conference on Control, Automation, Robotics and Vision (2004)

    Google Scholar 

  9. Hasimoto-Beltran, R.: High-performance multimedia encryption based on chaos. Chaos 18, 023110 (2008)

    Article  MathSciNet  Google Scholar 

  10. Perrig, A., Szewczyk, R., Wen, V., Culler, D., Tygar, J.D., Eason, G.: SPINS: Security Protocols for sensor Networks. Wireless Networks 8, 521–534 (2002), doi:10.1023/A:1016598314198

    Article  MATH  Google Scholar 

  11. Bernstein, D.J., Schwabe, P.: New AES Software Speed Records. In: Chowdhury, D.R., Rijmen, V., Das, A. (eds.) INDOCRYPT 2008. LNCS, vol. 5365, pp. 322–336. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  12. Gladman, B.: AES and combined encryption/authentication modes (2006), http://fp.gladman.plus.com/AES/

  13. PolarSSL, http://polarssl.org

  14. Sang, T., Wang, R., Yan, Y.: Perturbance-based algorithm to expand cycle length chaotic key stream. Electron. Lett. 34, 873 (1998)

    Article  Google Scholar 

  15. Clinton, J.S.: Chaos and Time-series Analysis. Oxford University Press, Oxford (2006)

    Google Scholar 

  16. Dellnitz, M., Field, M., Golubitsky, M., Hohmann, A., Ma, J.: Cycling chaos. IEEE Trans. Circuits Syst. I: Fundam. Theory Appl. 42, 821 (1995)

    Article  Google Scholar 

  17. Cernak, J.: Digital generators of chaos. Phys. Lett. A 214, 151 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  18. Pareek, N.K., Patidar, V., Sud, K.K.: Discrete chaotic cryptography using external key. Phys. Lett. A 309, 75 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  19. Álvarez, G., Montoya, F., Romera, M., Pastor, G.: Cryptanalysis of a discrete chaotic system using external key. Phys. Lett. A 319, 334 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  20. National Institute of Standards and Technology (NIST): FIPS-197: Advanced Encryption Standard (AES), http://www.csrc.nist.gov/publications/fips/fips197/fips/-197.pdf

  21. Osvik, D.A., Bos, J.W., Stefan, D., Canright, D.: Fast software AES encryption. In: Hong, S., Iwata, T. (eds.) FSE 2010. LNCS, vol. 6147, pp. 75–93. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  22. Maemo, http://maemo.org/

  23. Hu, H., Xu, Y., Zhu, Z.: A method of improving the properties of digital chaotic system. Chaos, Solitons Fractals 38, 439–446 (2008)

    Article  MATH  Google Scholar 

  24. Cernak, J.: Digital generators of chaos. Phys. Lett. A 214, 151–160 (1996)

    Article  MathSciNet  MATH  Google Scholar 

  25. Chen, G., Mao, Y., Chui, C.K.: A symmetric image encryption scheme based on 3D chaotic cat maps. Chaos, Solitons Fractals 21, 749 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  26. Fridrich, J.: Symmetric ciphers based on Two-dimensional chaotic maps. Int. J. Bifurcation Chaos 8, 1259–1284 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  27. Mao, Y., Chen, G., Lian, S.: A novel fast image encryption scheme based on the 3D chaotic baker map. Int. J. Bifurcat. Chaos 14(10), 3613–3624 (2004)

    Article  MathSciNet  MATH  Google Scholar 

  28. Xu, D., Li, Z., Bishop, S.R., Galvanetto, U.: Estimation of periodic-like motions of chaotic evolutions using detected unstable periodic patterns. Patt. Recog. Lett. 23, 245–252 (2002)

    Article  MATH  Google Scholar 

  29. Davidchack, R.L., Lai, Y.-C.: Efficient algorithm for detecting unstable periodic orbits in chaotic systems. Phys. Rev. E 60, 6172–6175 (1999)

    Article  Google Scholar 

  30. Saiki, Y.: Numerical detection of unstable periodic orbits in continuous-time dynamical systems with chaotic behavior. Nonlin. Processes Geophys. 14, 615–620 (2007)

    Article  Google Scholar 

  31. Pei, X., Dolan, K., Moss, F.: Counting unstable periodic orbits in noisy systems: A scaling relation connecting experiment with theory. Chaos 8, 853–860 (1998)

    Article  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Hasimoto-Beltran, R., Al-Masalha, F., Khokhar, A. (2011). Performance Evaluation of Chaotic and Conventional Encryption on Portable and Mobile Platforms. In: Kocarev, L., Lian, S. (eds) Chaos-Based Cryptography. Studies in Computational Intelligence, vol 354. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20542-2_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20542-2_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20541-5

  • Online ISBN: 978-3-642-20542-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics