José David Rodríguez-Muñoz , Esteban Tlelo-Cuautle , Luis Gerardo de la Fraga
{"title":"Chaos-based authentication of encrypted images under MQTT for IoT protocol","authors":"José David Rodríguez-Muñoz , Esteban Tlelo-Cuautle , Luis Gerardo de la Fraga","doi":"10.1016/j.vlsi.2025.102378","DOIUrl":null,"url":null,"abstract":"<div><div>In lightweight cryptographic applications, the authentication of encrypted data is a challenge that can be solved by using high-order chaotic systems. The proposed work shows that increasing the length of bits in a Hash function, leads to diminish the possibility of a collision. Using high-order chaotic systems, can also lead to use large prime numbers by exploiting the fact that the division and modulo operations provide a better distribution in a most uniform way. In addition, because a prime number has factors including 1 and himself, then this greatly reduces the appearance of repetitive patterns in a modulo operation. In this manner, this article presents the implementation of a chaos based system for authentication of encrypted RGB images using Raspberry Pi devices. First, a two dimensional (2D) map, and 3D, and 4D chaotic systems, are implemented on Raspberry Pi devices to design pseudo-random number generators (PRNG). Second, the randomness of the sequences is evaluated by performing NIST (National Institute of Standards and Technology) tests. Third, the random sequences are used to construct a stream cipher and an authenticated Hash function based on a method called pseudo dot product. Fourth, RGB images are encrypted using the PRNGs based on 2D, 3D, and 4D chaotic systems. In the proposed work, all these processes are performed under a machine-to-machine (M2M) wireless connectivity system, which is available on the message queuing telemetry transport (MQTT) communication protocol for Internet of Things (IoT). In the experiments, three Raspberry Pi devices are configured as a publisher, a broker, and a subscriber to work on MQTT for sending and receiving encrypted RGB images, while the images are authenticated through the evaluation of Hash function tags, which are generated by using 2D, 3D, and 4D chaotic systems. The main conclusion is that the encryption/decryption and authentication processes are much better when using high-dimensional chaotic systems.</div></div>","PeriodicalId":54973,"journal":{"name":"Integration-The Vlsi Journal","volume":"102 ","pages":"Article 102378"},"PeriodicalIF":2.2000,"publicationDate":"2025-02-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Integration-The Vlsi Journal","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0167926025000355","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"COMPUTER SCIENCE, HARDWARE & ARCHITECTURE","Score":null,"Total":0}
引用次数: 0
Abstract
In lightweight cryptographic applications, the authentication of encrypted data is a challenge that can be solved by using high-order chaotic systems. The proposed work shows that increasing the length of bits in a Hash function, leads to diminish the possibility of a collision. Using high-order chaotic systems, can also lead to use large prime numbers by exploiting the fact that the division and modulo operations provide a better distribution in a most uniform way. In addition, because a prime number has factors including 1 and himself, then this greatly reduces the appearance of repetitive patterns in a modulo operation. In this manner, this article presents the implementation of a chaos based system for authentication of encrypted RGB images using Raspberry Pi devices. First, a two dimensional (2D) map, and 3D, and 4D chaotic systems, are implemented on Raspberry Pi devices to design pseudo-random number generators (PRNG). Second, the randomness of the sequences is evaluated by performing NIST (National Institute of Standards and Technology) tests. Third, the random sequences are used to construct a stream cipher and an authenticated Hash function based on a method called pseudo dot product. Fourth, RGB images are encrypted using the PRNGs based on 2D, 3D, and 4D chaotic systems. In the proposed work, all these processes are performed under a machine-to-machine (M2M) wireless connectivity system, which is available on the message queuing telemetry transport (MQTT) communication protocol for Internet of Things (IoT). In the experiments, three Raspberry Pi devices are configured as a publisher, a broker, and a subscriber to work on MQTT for sending and receiving encrypted RGB images, while the images are authenticated through the evaluation of Hash function tags, which are generated by using 2D, 3D, and 4D chaotic systems. The main conclusion is that the encryption/decryption and authentication processes are much better when using high-dimensional chaotic systems.
期刊介绍:
Integration''s aim is to cover every aspect of the VLSI area, with an emphasis on cross-fertilization between various fields of science, and the design, verification, test and applications of integrated circuits and systems, as well as closely related topics in process and device technologies. Individual issues will feature peer-reviewed tutorials and articles as well as reviews of recent publications. The intended coverage of the journal can be assessed by examining the following (non-exclusive) list of topics:
Specification methods and languages; Analog/Digital Integrated Circuits and Systems; VLSI architectures; Algorithms, methods and tools for modeling, simulation, synthesis and verification of integrated circuits and systems of any complexity; Embedded systems; High-level synthesis for VLSI systems; Logic synthesis and finite automata; Testing, design-for-test and test generation algorithms; Physical design; Formal verification; Algorithms implemented in VLSI systems; Systems engineering; Heterogeneous systems.