Efficient Real-Time Key Generation for IoT Using Multi-Dimensional Chaotic Maps

Harith G. Ayoub, Osama A. Qasim, Zaid A. Abdulrazzaq, Mohammed S. Noori
International Journal of Computational and Electronic Aspects in Engineering
Volume 6: Issue 1, March 2025, pp 24-34


Author's Information
Harith G. Ayoub1 
Corresponding Author
1Northern Technical University, (NTU), Mosul, Iraq
harithga@ntu.edu.iq

Osama A. Qasim2, Zaid A. Abdulrazzaq3, Mohammed S. Noori4
2,3,4Northern Technical University, (NTU), Mosul, Iraq

Research Paper -- Peer Review
First online on – 10 March 2025

Open Access article under Creative Commons License

Cite this article –Harith G. Ayoub, Osama A. Qasim, Zaid A. Abdulrazzaq, Mohammed S. Noori“Efficient Real-Time Key Generation for IoT Using Multi-Dimensional Chaotic Maps”, International Journal of Computational and Electronic Aspects in Engineering, RAME Publishers, vol. 6, Issue 1, pp. 24-34, 2025.
https://doi.org/10.26706/ijceae.6.1.20250205


Abstract:-
The paper presents a new approach for triple key generation techniques with Henon, Lozi and Duffing chaotic maps in FPGA. Three key streams generated by XORing chaotic maps with pseudo random number generators, the results of XORing PN1 with PN2 is called gold code generator. The algorithm was built in embedded Xilinx System Generator tool (XSG) and the results were validated using MATLAB/SIMULINK environment. NIST, Normality and Dieharder test randomness tests were employed for key streams and verified as the best randomness in comparison with recent work.
Index Terms:-
FPGA, PN, XSG, Chaos, Gold Code
REFERENCES
  1. Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333.

  2. Evsutin, O., Melman, A., & Meshcheryakov, R. (2020). Digital steganography and watermarking for digital images: A review of current research directions. IEEE Access, 8, 166589-166611.

  3. Alanezi, A., Abd-El-Atty, B., Kolivand, H., Abd El-Latif, A. A., Abd El-Rahiem, B., Sankar, S., & Khalifa, H. S. (2021). Securing Digital Images through Simple Permutation‐Substitution Mechanism in Cloud‐Based Smart City Environment. Security and Communication Networks, 2021(1), 6615512.

  4. Suhail, A. T., & Ayoub, H. G. (2022). A new method for hiding a secret file in several WAV files depends on circular secret key. Egyptian Informatics Journal, 23(4), 33-43.

  5. Zia, U., McCartney, M., Scotney, B., Martinez, J., AbuTair, M., Memon, J., & Sajjad, A. (2022). Survey on image encryption techniques using chaotic maps in spatial, transform, and spatiotemporal domains. International Journal of Information Security, 21(4), 917-935.

  6. S. A. Baker, "Preserving Big Data Privacy in Cloud Environments Based on Homomorphic Encryption and Distributed clustering," NTU Journal of Engineering and Technology, vol. 3, no. 1, Mar. 2024, doi: 10.56286/ntujet.v3i1.861.

  7. Habeeb Noori Jumaah, "Embedded Reversibility Data in an Encrypted Photograph: A Case Study," International Journal of Computational and Electronic Aspects in Engineering, vol. 5, no. 3, pp. 73–79, Sep. 2024. [Online]. Available: https://www.rame.org.in/pdf/ijceae/paper5/v5i3paper1.html

  8. Serri Ismael Hamad, "Use of Chaos in Key Schedules for A Symmetrical Encryption Algorithm without Data Loss," International Journal of Computational and Electronic Aspects in Engineering, vol. 5, no. 4, pp. 194–202, Dec. 2024. [Online]. Available: https://www.rame.org.in/pdf/ijceae/paper5/v5i4paper7.html

  9. Wassan Adnan Hashim, "Quantum Cryptography-Enabled Cloud Security (QCECS) Framework," International Journal of Computational and Electronic Aspects in Engineering, vol. 5, no. 4, pp. 214–228, Dec. 2024. [Online]. Available: https://www.rame.org.in/pdf/ijceae/paper5/v5i4paper9.html

  10. Alyaa Ali Hameed Kjwan, "Adaptive Covert Communication Framework for 6G Networks Integrating Quantum Cryptography and AI-Augmented Physical Layer Security," International Journal of Computational and Electronic Aspects in Engineering, vol. 5, no. 4, pp. 203–213, Dec. 2024. [Online]. Available: https://www.rame.org.in/pdf/ijceae/paper5/v5i4paper8.html.

  11. Z. S. Karam, R. H. Ali, and B. O. Al-Nashy, "Exploring Emerging Strategies for Countering Computer Malware Attacks: A Comprehensive Survey of Tools and Techniques," Int. J. Comput. Electron. Asp. Eng., vol. 4, no. 2, pp. 25–37, Jun. 2023, doi: 10.26706/ijceae.4.2.20239750.

  12. Masood, F., Ahmad, J., Shah, S. A., Jamal, S. S., & Hussain, I. (2020). A novel hybrid secure image encryption based on julia set of fractals and 3D Lorenz chaotic map. Entropy, 22(3), 274.

  13. Salih, A. A., Abdulrazaq, Z. A., & Ayoub, H. G. (2024). Design and Enhancing Security Performance of Image Cryptography System Based on Fixed Point Chaotic Maps Stream Ciphers in FPGA. Baghdad Science Journal, 21(5 (SI)), 1754-1754.

  14. Parikibandla, S., & Alluri, S. (2021). Low area field‐programmable gate array implementation of PRESENT image encryption with key rotation and substitution. ETRI Journal, 43(6), 1113-1129.

  15. Qureshi, K. N., Qayyum, S., Ul Islam, M. N., & Jeon, G. (2021). A secure data parallel processing based embedded system for internet of things computer vision using field programmable gate array devices. International Journal of Circuit Theory and Applications, 49(5), 1450-1469.

  16. Yang, C.-H., & Chien, Y.-S. (2020). FPGA implementation and design of a hybrid chaos-AES color image encryption algorithm. Symmetry, 12(2), 189.

  17. Burger, W., & Burge, M. J. (2022). Digital image processing: An algorithmic introduction. Springer Nature.

  18. Ding, K., Ma, K., Wang, S., & Simoncelli, E. P. (2021). Comparison of full-reference image quality models for optimization of image processing systems. International Journal of Computer Vision, 129(4), 1258-1281.

  19. Salvi, M., Acharya, U. R., Molinari, F., & Meiburger, K. M. (2021). The impact of pre-and post-image processing techniques on deep learning frameworks: A comprehensive review for digital pathology image analysis. Computers in Biology and Medicine, 128, 104129.

  20. Toktas, A., & Erkan, U. (2022). 2D fully chaotic map for image encryption constructed through a quadruple-objective optimization via artificial bee colony algorithm. Neural Computing and Applications, 1-25.

  21. Žeger, I., Grgic, S., Vuković, J., & Šišul, G. (2021). Grayscale image colorization methods: Overview and evaluation. IEEE Access, 9, 113326-113346.

  22. Wang, X., Lin, S., & Li, Y. (2021). Bit-level image encryption algorithm based on BP neural network and gray code. Multimedia Tools and Applications, 80, 11655-11670.

  23. Ntnguyen, et al. (2021). [Reference details not found in the uploaded file.]

  24. Al-Roithy, B., & Gutub, A. (2020). Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections. International Journal of Computer Science and Network Security, 20(12), 167-176.

  25. Etem, T., & Kaya, T. (2020). A novel true random bit generator design for image encryption. Physica A: Statistical Mechanics and its Applications, 540, 122750.

  26. Yazdeen, A. A., Zeebaree, S. R., Sadeeq, M. M., Kak, S. F., Ahmed, O. M., & Zebari, R. R. (2021). FPGA implementations for data encryption and decryption via concurrent and parallel computation: A review. Qubahan Academic Journal, 1(2), 8-16.

  27. Krishna, B. M., Chowdary, G. R., Santhosh, C., Kalam, S., & Naidu, K. (2024). Implementation of Xilinx system generator based image processing algorithms through FPGA. AIP Conference Proceedings.

  28. BOUAZA Youcef, F. A. (2023). Image filtering design and implementation based on Xilinx System Generator with Hardware Co-Simulation and VHDL with FPGA IP Core Generator

  29. Alhomoud, A. (2024). Real Time FPGA Implementation of a High Speed for Video Encryption and Decryption System with High Level Synthesis Tools. International Journal of Advanced Computer Science & Applications, 15(1).

  30. Gonchenko, S. V., Safonov, K. A., & Zelentsov, N. G. (2022). Antisymmetric Diffeomorphisms and Bifurcations of a Double Conservative Hénon Map. Regular and Chaotic Dynamics, 27(6), 647-667.

  31. Kumar, A., & Dua, M. (2024). A novel exponent–sine–cosine chaos map-based multiple-image encryption technique. Multimedia Systems, 30(3), 141.

  32. Naik, R. B., & Singh, U. (2024). A review on applications of chaotic maps in pseudo-random number generators and encryption. Annals of Data Science, 11(1), 25-50.

  33. Chen, X., Qian, S., Yu, F., Zhang, Z., Shen, H., Huang, Y., Cai, S., Deng, Z., Li, Y., & Du, S. (2020). Pseudorandom Number Generator Based on Three Kinds of Four‐Wing Memristive Hyperchaotic System and Its Application in Image Encryption. Complexity, 2020(1), 8274685.

  34. Kanwal, S., Inam, S., Quddus, S., & Hajjej, F. (2023). Research on color image encryption approach based on chaotic Du3ffing map. Physica Scripta, 98(12), 125252.

  35. Li, C., Luo, G., & Li, C. (2018). A parallel image encryption algorithm based on chaotic Duffing oscillators. Multimedia Tools and Applications, 77, 19193-19208

  36. Zhang, S., Zhang, H., & Wang, C. (2023). Dynamical analysis and applications of a novel 2-D hybrid dual-memristor hyperchaotic map with complexity enhancement. Nonlinear Dynamics, 111(16), 15487-15513.

  37. Ning, H., Zhao, G., Dong, Y., & Ma, Y. (2022). A Novel Two-Dimensional Dynamic Pseudo-Random Coupled Map Lattices System Based on Partitioned Elementary Cellular Automata. Applied Sciences, 12(23), 12399.

  38. Gafsi, M., Abbassi, N., Hajjaji, M. A., Malek, J., & Mtibaa, A. (2021). Xilinx Zynq FPGA for hardware implementation of a chaos-based cryptosystem for real-time image protection. Journal of Circuits, Systems and Computers, 30(11), 2150204

  39. Shafi, K. M., Chawla, P., Hegde, A. S., Gayatri, R., Padhye, A., & Chandrashekar, C. (2023). Multi-bit quantum random number generator from path-entangled single photons. EPJ Quantum Technology, 10(1), 43.

  40. ES-SABRY, Mohammed, et al. Securing images using high dimensional chaotic maps and DNA encoding techniques. IEEE Access, 2023.

  41. To view full paper, Download here


Publishing with