{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T05:53:04Z","timestamp":1761630784121,"version":"build-2065373602"},"reference-count":34,"publisher":"MDPI AG","issue":"3","license":[{"start":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T00:00:00Z","timestamp":1490054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100003176","name":"Ministerio de Educaci\u00f3n, Cultura y Deporte","doi-asserted-by":"publisher","award":["FPU14\/03523"],"award-info":[{"award-number":["FPU14\/03523"]}],"id":[{"id":"10.13039\/501100003176","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100003329","name":"Ministerio de Econom\u00eda y Competitividad","doi-asserted-by":"publisher","award":["TEC2014-52840"],"award-info":[{"award-number":["TEC2014-52840"]}],"id":[{"id":"10.13039\/501100003329","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>In this work, we used a sensor-based True Random Number Generator in order to generate keys for a stream cipher based on a recently published hybrid algorithm mixing Skew Tent Map and a Linear Feedback Shift Register. The stream cipher was implemented and tested in a Field Programmable Gate Array (FPGA) and was able to generate 8-bit width data streams at a clock frequency of 134 MHz, which is fast enough for Gigabit Ethernet applications. An exhaustive cryptanalysis was completed, allowing us to conclude that the system is secure. The stream cipher was compared with other chaotic stream ciphers implemented on similar platforms in terms of area, power consumption, and throughput.<\/jats:p>","DOI":"10.3390\/s17030646","type":"journal-article","created":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T12:22:22Z","timestamp":1490098942000},"page":"646","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":23,"title":["Application of a MEMS-Based TRNG in a Chaotic Stream Cipher"],"prefix":"10.3390","volume":"17","author":[{"given":"Miguel","family":"Garcia-Bosque","sequence":"first","affiliation":[{"name":"Group of Electronic Design, University of Zaragoza, 50009 Zaragoza, Spain"}]},{"given":"Adri\u00e1n","family":"P\u00e9rez","sequence":"additional","affiliation":[{"name":"Group of Electronic Design, University of Zaragoza, 50009 Zaragoza, Spain"}]},{"given":"Carlos","family":"S\u00e1nchez-Azqueta","sequence":"additional","affiliation":[{"name":"Group of Electronic Design, University of Zaragoza, 50009 Zaragoza, Spain"}]},{"given":"Santiago","family":"Celma","sequence":"additional","affiliation":[{"name":"Group of Electronic Design, University of Zaragoza, 50009 Zaragoza, Spain"}]}],"member":"1968","published-online":{"date-parts":[[2017,3,21]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"6","DOI":"10.1109\/7384.963463","article-title":"Chaos-based cryptography: A brief overview","volume":"1","author":"Kocarev","year":"2001","journal-title":"IEEE Circuits Syst. Mag."},{"key":"ref_2","unstructured":"Borisov, N., Goldberg, I., and Wagner, D. (2011, January 16\u201321). Intercepting mobile communications: The insecurity of 802.11. Proceedings of the 7th Annual International Conference on Mobile Computing and Networking (MOBICOM), Rome, Italy."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Voris, J., Saxena, D., and Halevi, T. (2011, January 15\u201317). Accelerometers and randomness: Perfect together. Proceedings of the 4th ACM Conference on Wireless Network Security, Hamburg, Germany.","DOI":"10.1145\/1998412.1998433"},{"key":"ref_4","unstructured":"Zhun, H., and Hongyi, C. (2001, January 23\u201325). A truly random number generator based on thermal noise. Proceedings of the 4th International Conference on ASIC (ASICON), Shanghai, China."},{"key":"ref_5","unstructured":"Jun, B., and Kocher, P. (1999). The Intel Random Number Generator, Cryptography Research Inc.. White Paper Prepared for Intel Corporation."},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Hwang, C.H., Li, S.W., Liao, T.S., Chen, F.Z., and Tsai, D.P. (2012, January 13\u201316). The development of measurement\/monitoring by mobile devices and systems. Proceedings of the Instrumentation and Measurement Technology Conference (I2MTC), Graz, Austria.","DOI":"10.1109\/I2MTC.2012.6229475"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Garcia-Bosque, M., S\u00e1nchez-Azqueta, C., and Celma, S. (2016, January 7). Sensor-Based Seeds for a Chaotic Stream Cipher. Proceedings of the EUROSENSORS 2016, Budapest, Hungary.","DOI":"10.1016\/j.proeng.2016.11.485"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Garcia-Bosque, M., S\u00e1nchez-Azqueta, C., Royo, G., and Celma, S. (2016, January 27\u201330). Lightweight ciphers based on chaotic map-LFSR architectures. Proceedings of the 12th Conference on PhD Research in Microelectronics and Electronics (PRIME), Lisbon, Portugal.","DOI":"10.1109\/PRIME.2016.7519519"},{"key":"ref_9","unstructured":"Analog Devices, \u201cADXL335\u201d 2010. Available online: https:\/\/www.sparkfun.com\/datasheets\/Components\/SMD\/adxl335.pdf."},{"key":"ref_10","unstructured":"Duynh, Q.H. (2012). Secure Hash Standard (SHS)."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"2129","DOI":"10.1142\/S0218127406015970","article-title":"Some basic cryptographic requirements for chaos-based cryptosystems","volume":"5","author":"Alvarez","year":"2006","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1607","DOI":"10.3390\/s110201607","article-title":"Secure chaotic map based block cryptosystem with application to camera sensor networks","volume":"11","author":"Guo","year":"2011","journal-title":"Sensors"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"398","DOI":"10.1016\/j.optlaseng.2009.10.001","article-title":"Chaos-based secure communication system using logistic map","volume":"48","author":"Singh","year":"2009","journal-title":"Opt. Laser Eng."},{"key":"ref_14","doi-asserted-by":"crossref","unstructured":"Feldman, D.P. (2012). Chaos and Fractals: An Elementary Introduction, Oxford University Press.","DOI":"10.1093\/acprof:oso\/9780199566433.001.0001"},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1923","DOI":"10.1016\/j.physd.2009.06.020","article-title":"A rigorous lower bound for the stability regions of the quadratic map","volume":"238","author":"Tucer","year":"2009","journal-title":"Physica D"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Galias, Z., and Garda, B. (2015, January 24\u201327). Detection of all low-period windows for the logistic map. Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS), Lisbon, Portugal.","DOI":"10.1109\/ISCAS.2015.7168979"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"1585","DOI":"10.1142\/S0218127495001198","article-title":"Design of one-dimensional chaotic maps with prescribed statistical properties","volume":"16","author":"Baranovsky","year":"1995","journal-title":"Int. J. Bifurc. Chaos"},{"key":"ref_18","unstructured":"Kocarev, L., and Lian, S. (2009). Chaos-Based Cryptography, Springer."},{"key":"ref_19","unstructured":"Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., and Heckert, A. (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications."},{"key":"ref_20","unstructured":"Turan, M.S., Barker, E., Kelsey, J., Mcay, K.A., Baish, M.L., and Boile, M. (2016). Recommendation for the Entropy Sources Used for Random Bit Generation."},{"key":"ref_21","first-page":"768770","article-title":"Various techniques used in connection with random digits","volume":"5","year":"1963","journal-title":"NBS Appl. Math. Ser."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Bagini, V., and Bucci, M. (1999, January 12\u201313). A design of reliable true random number generator for cryptographic applications. Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 1999 (CHES 1999), Worcester, MA, USA.","DOI":"10.1007\/3-540-48059-5_18"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"4442","DOI":"10.1063\/1.1809295","article-title":"Fast nondeterministic random bit generator based on weakly correlated physical events. Cryptanalyzing a discrete-time chaos synchronization secure communication system","volume":"75","year":"2004","journal-title":"Rev. Sci. Instrum."},{"key":"ref_24","unstructured":"Tuck, K. Low Power Modes and Auto-Wake\/Sleep Using the MMA8450Q. Available online: http:\/\/www.nxp.com\/assets\/documents\/data\/en\/application-notes\/AN3921.pdf."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Dabal, P., and Pelka, R. (2011, January 13\u201314). A chaos-based pseudo-random bit generator implemented in FPGA device. Proceedings of the International Symposium Design and Diagnostics of Electronics Circuits and Systems (DDECS), Cottbus, Germany.","DOI":"10.1109\/DDECS.2011.5783069"},{"key":"ref_26","unstructured":"Dabal, P., and Pelka, R. (2012, January 24\u201326). FPGA implementation of chaotic pseudo-random bit generators. Proceedings of the 19th International Conference Mixed Design of Integrated Circuits and Systems (MIXDES), Warsaw, Poland."},{"key":"ref_27","first-page":"515","article-title":"A chaotic encryption scheme for real-time embedded systems: Design and implementation","volume":"52","author":"Pande","year":"2013","journal-title":"Telecommun. Syst."},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Azzad, M.S., Tanougast, C., Sadoudi, S., and Dandache, A. (2009, January 28). Real-time FPGA implementation of Lorenz\u2019s chaotic generator for ciphering telecommunications. Proceedings of the IEEE International Circuits and Systems and TAISA Conference, Toulouse, France.","DOI":"10.1109\/NEWCAS.2009.5290495"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Banik, S., Bogdanov, A., and Regazzoni, F. (2014, January 8\u201310). Exploring the energy consumption of lightweight blockciphers in FPGA. Proceedings of the Internatonal Conference on ReConFigurable Computing and FPGAs (ReConFig), Cancun, Mexico.","DOI":"10.1109\/ReConFig.2015.7393308"},{"key":"ref_30","doi-asserted-by":"crossref","unstructured":"Paar, C., and Pelzl, J. (2010). Understanding Cryptography: A Textbook for Students and Practicioners, Springer.","DOI":"10.1007\/978-3-642-04101-3"},{"key":"ref_31","unstructured":"Bogdanov, A., Knusdsen, L.R., Leander, G., Paar, C., Poschmann, A., Robshaw, M.J.B., Seurin, Y., and Vikkelsoe, C. (2006, January 10\u201313). Present: An ultra-lightweight block cipher for low-resource device. Proceedings of the Workshop on Cryptographic Hardware and Embedded Systems 2006 (CHES 2006), Yokohama, Japan."},{"key":"ref_32","unstructured":"ENISA Algorithms, Key Size and Parameters Report. November 2014. Available online: www.enisa.europa.eu\/activities\/identity-and-trust\/library\/deliverables\/algorithms-key-size-and-parameters-report-2014."},{"key":"ref_33","doi-asserted-by":"crossref","unstructured":"Barker, E., and Roginsky, A. (2011). Transitions: Recommendation for Transitioning the Use of Cryptographic Algorithms and Key Lengths.","DOI":"10.6028\/NIST.SP.800-131a"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"689","DOI":"10.1016\/j.chaos.2003.12.013","article-title":"Cryptanalyzing a discrete-time chaos synchronization secure communication system","volume":"21","author":"Montoya","year":"2004","journal-title":"Chaos Solitons Fractals"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/3\/646\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T18:30:57Z","timestamp":1760207457000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/17\/3\/646"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3,21]]},"references-count":34,"journal-issue":{"issue":"3","published-online":{"date-parts":[[2017,3]]}},"alternative-id":["s17030646"],"URL":"https:\/\/doi.org\/10.3390\/s17030646","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2017,3,21]]}}}