CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS

Size: px
Start display at page:

Download "CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS"

Transcription

1 24 CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS 3.1 INTRODUCTION Pseudo Random Number Generators (PRNGs) are widely used in many applications, such as numerical analysis, probabilistic algorithms, secure communications, integrated circuit testing, computer games and cryptography. The quality of randomness is usually the main criterion to distinguish the different PRNGs. Besides the quality of randomness, implementation cost and throughput are also important factors to evaluate the effectiveness of the PRNGs in applications, such as modern communications, image encryption, video encryption and sensor networks, and so on. Chaos has widely been used in cryptography in recent years. Chaotic maps are often used in encrypting images. Chaos is applied to expand the diffusion and confusion in the image. Due to the desirable properties of nonlinear dynamical systems, such as pseudorandom behavior, sensitivity to initial conditions, unpredictability and ergodicity, chaos-based encryption is suggested as a new and efficient way, to deal with the intractable problem of fast and highly secure image encryption. This chapter discusses chaotic based true pseudo random values generation and its comparisons. A one-dimensional logistic map is commonly used in image encryption schemes due to low hardware complexity, low computation cost, simplicity and better pseudo random number generation.

2 25 Besides, the high implementation cost renders as unsuitable a pseudo random number generator. Though the logistic map is better for image encryption, it has some common problems such as stable windows, blank windows, uneven distribution of sequences and weak key. New types of chaotic maps have been proposed in this research, to alleviate the aforementioned problems in the logistic map. The maps are mixed together well to improve the random values. Thus, the proposed chaotic maps do not have security issues, which are present in the logistic map. Moreover, the resulting chaotic sequences are uniformly distributed, and the key size has been increased considerably. The proposed chaotic maps have been experimented using the statistical test suite provided by National Institute of Standards and Technology (NIST). It is found that the new types of chaotic maps have perfect randomness and successfully pass all tests. 3.2 LOGISTIC MAP The logistic map is a simple nonlinear model, but it has a complicated dynamic behavior. The chaotic sequence produced by the logistic map is extremely sensitive to the change of its initial value. The logistic map is defined as (1 ) where 0 < < 1 and 0 < 4. The sequences produced by the logistic map are controlled by parameter value of and the initial value of. The system has different characteristics with different values of, called the bifurcation parameter. For > starts the process of bifurcation. It may be noted that the closer the value of 4, the more chaotic the system response will be. Figure 3.1 shows the different characteristics for the values of. The horizontal axis shows the values of the parameter, and the vertical axis shows the possible long term values of.

3 26 Figure 3.1 Bifurcation of the logistic map Logistic mapping sequences also have good auto-correlation and cross-correlation properties. The iterative sequences which are produced by the logistic map can replace the traditional pseudo-random sequences produced by the linear feedback shift register (LFSR) used in encryption. In general, the logistic map has some common weaknesses, such as stable windows, blank windows, uneven distribution of sequences, and a weak key as suggested by Xie et al (2009). The blank window is a more serious weakness than the others. Figure 3.2 illustrates the blank window by a logistic map when >

4 27 Figure 3.2 Blank window of the logistic map Hence, new types of chaotic logistic maps are required to alleviate the weaknesses. The maps are mixed together, so as to achieve a larger key space and to attain chaotic behavior. 3.3 PROPOSED CHAOTIC MAP The proposed chaotic maps are defined as follows x n+1 = [µ y n (1 - x n ) k 1 + z n ] mod 1 y n+1 = [µ y n sin(z n ) k 2 + x n+1 )] mod 1 z n+1 = [µ z n + y n+1 k 3 + x n+1 ] mod 1 where 0 < 3.999, k 1 > 33.5, k 2 > 37.9, k 3 > 35.7 are used to increase the chaotic keys. Along with the key k i the distribution of the sequences becomes better. Figure 3.3 shows that the aforementioned weaknesses such as stable windows, blank windows, uneven distribution of sequences and a weak key are completely resolved.

5 28 Figure 3.3 Distribution of the sequence of each chaotic map Thus, the proposed chaotic map does not have security issues which are present in the logistic map. Moreover, the resulting chaotic sequences are uniformly distributed and the key size has been increased greatly Comparison between Logistic Map and Proposed Chaotic Map In general, the lyapunov exponent is calculated to find the instability of the maps, where the instability is indicated by positive values. The basic expression of the discrete lyapunov exponent is defined as = 1 ( ) ) ) where m i is the subset of the trajectory of a digitized map F in length M and ) is the distance between m i and m j. The computation of the logistic map is shown in Figure 3.4.

6 29 Figure 3.4 Lyapunov exponents of the logistic map Figure 3.5 shows that the complex degrees of the proposed chaotic maps are larger and more random than those of the logistic map. The positive frequency indicates that the sequences are more random and complex. The larger lyapunov value is better for chaotic systems. Figure 3.5 Lyapunov exponents of the new chaotic map

7 30 The histograms are constructed to display the frequency, in which the states along a trajectory fall into a given region in the state space. The state space is divided [0, 1] into n=256 discrete non intersecting intervals, where the i th interval is, ; for i=1,2...n-256. Then, a long trajectory of length is calculated, using an initial system state as follows: For the logistic map L(x)=µx(1-x) x 0 =L 1 (x 0 ),. L (x 0 ) x i =L(x i-1 ) where i=1,2,3, Figure 3.6 shows the histogram of the logistic map. Figure 3.6 Histogram of the logistic map

8 31 For the proposed map S(x, y, z)=(µ y (1-x) k + z) mod 1 T(x, y, z)=(µ y+ sin(z) k + x) mod 1 U(x, y, z)=(µ (z + y)+ sin(z) k + x) mod 1 The trajectory of length using the initial system (x 0, y 0, z 0 ) is generated as follows x 0, x 1 = S(x 0, y 0, z 0 ), x 2 = S(x 1, y 1, z 1 ),.. y 0, y 1 = T(x 0, y 0, z 0 ), y 2 = T(x 2, y 1, z 1 ),.. z 0, z 1 = U(x 1, y 1, z 0 ), z 2 = U(x 2, y 2, z 1 ),.. x i = S(x i-1, y i-1, z i-1 ) y i = T(x i, y i-1, z i-1 ) z i = U(x i, y i, z i-1 ) Figure 3.7 Histogram of the new chaotic map

9 32 Note that, in the logistic map (Figure 3.6) the intensity values are not uniformly distributed, and they are high only in (0, 1). But, the histogram of the new chaotic map is uniformly distributed as in Figure 3.7. The equal distribution is obtained for each proposed map. Hence, the key space of the new chaotic system is larger than that of the logistic map. It is better and more suitable for image encryptions Randomness of the Nonlinear Chaotic Maps Sequence The series of statistical tests suite provided by the National Institute of Standards and Technology (NIST) special publication (2010) is used to check the perfect randomness of the values generated by each nonlinear chaotic map. In particular, their outputs must be unpredictable in the absence of the knowledge of the inputs. These tests may be useful as the first step in determining whether or not a generator is suitable for a particular cryptographic application. A P_value of zero indicates that the sequence appears to be completely non-random, and the larger the P_value is, the closer a sequence is to a perfect random sequence. For each test, a P_value is computed from the binary sequence. If this value is greater than a predefined threshold, the sequence would be considered as random with a confidence of 1- and the sequence passes the test successfully; otherwise, the sequence fails this test. In this experiment, the P_value is set to 0.01, which means that a sequence which passed the test is considered as random with 99% confidence. In the experiment, sequences, each of 1,000,352 bits, are generated by maps, and they all pass the statistic tests. If there is more than one statistical value in a test, the test is marked with an asterisk, and the average value is computed. In order to evaluate the randomness of the random numbers generated by the maps, the bit sequences get X, Y, Z, and then test them with the NIST statistical test suite. Table 3.1 shows the P_values of each map.

10 33 Table 3.1 Results of the randomness test P_value Statistical test name X map Y map Z map Logistic map Frequency (monobits) test Test for frequency within a block Fail Runs test Fail Test for the longest run of ones in a block Fail Random binary matrix rank test Fail Discrete Fourier transform (spectral) test Non-overlapping (aperiodic) template matching test Overlapping (periodic) template matching Test Fail Fail Fail Maurer's universal statistical test Fail Lempel Ziv complexity test Fail Linear complexity test Fail Serial test Fail Approximate entropy test Fail Cumulative sum (cusum) test Fail Random excursions test Fail Random excursions variant test Fail Here, it is found that the new chaotic maps have perfect randomness and successfully pass all the tests. The logistic map satisfies only one test, and fails in all other tests. Thus, the new maps are suitable for image encryption.

A novel pseudo-random number generator based on discrete chaotic iterations

A novel pseudo-random number generator based on discrete chaotic iterations A novel pseudo-random number generator based on discrete chaotic iterations Qianxue Wang, Christophe Guyeux and Jacques M. Bahi University of Franche-Comte Computer Science Laboratory LIFC, Belfort, France

More information

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice PRAMANA c Indian Academy of Sciences Vol. 85, No. 4 journal of October 215 physics pp. 617 627 An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice RENFU

More information

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith Abstract Generating random numbers are mainly used to create secret keys or random

More information

Design of S-Box using Combination of Chaotic Functions

Design of S-Box using Combination of Chaotic Functions 129 Design of S-Box using Combination of Chaotic Functions Tanu Wadhera 1, Gurmeet Kaur 2 1 Department of Electronics and Communication Engineering, Punjabi University, Patiala, India 2 Department of Electronics

More information

A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing

A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing Informatica 33 (29) 441 452 441 A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing Vinod Patidar and K. K. Sud Department of Basic Sciences, School of Engineering,

More information

A new pseudorandom number generator based on complex number chaotic equation

A new pseudorandom number generator based on complex number chaotic equation A new pseudorandom number generator based on complex number chaotic equation Liu Yang( 刘杨 ) and Tong Xiao-Jun( 佟晓筠 ) School of Computer Science and Technology, Harbin Institute of Technology, Weihai 264209,

More information

Research Article A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map

Research Article A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map Hindawi Publishing Corporation Mathematical Problems in Engineering Volume 22, Article ID 9382, 9 pages doi:.55/22/9382 Research Article A Novel True Random Number Generator Based on Mouse Movement and

More information

arxiv: v1 [cs.cr] 18 Jul 2009

arxiv: v1 [cs.cr] 18 Jul 2009 Breaking a Chaotic Cryptographic Scheme Based on Composition Maps Chengqing Li 1, David Arroyo 2, and Kwok-Tung Lo 1 1 Department of Electronic and Information Engineering, The Hong Kong Polytechnic University,

More information

Construction of Pseudorandom Binary Sequences Using Chaotic Maps

Construction of Pseudorandom Binary Sequences Using Chaotic Maps Applied Mathematical Sciences, Vol. 9, 2015, no. 78, 3847-3853 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2015.52149 Construction of Pseudorandom Binary Sequences Using Chaotic Maps Dimo

More information

NEW ALTERNATE RING-COUPLED MAP FOR MULTI-RANDOM NUMBER GENERATION

NEW ALTERNATE RING-COUPLED MAP FOR MULTI-RANDOM NUMBER GENERATION Accepted for publication in: Journal of Nonlinear Systems and Applications, April 2013 NEW ALTERNATE RING-COUPLED MAP FOR MULTI-RANDOM NUMBER GENERATION Andrea Espinel, Ina Taralova and René Lozi Abstract.

More information

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register

Self-shrinking Bit Generation Algorithm Based on Feedback with Carry Shift Register Advanced Studies in Theoretical Physics Vol. 8, 2014, no. 24, 1057-1061 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2014.49132 Self-shrinking Bit Generation Algorithm Based on Feedback

More information

A new simple technique for improving the random properties of chaos-based cryptosystems

A new simple technique for improving the random properties of chaos-based cryptosystems AIP ADVANCES 8, 035004 (2018) A new simple technique for improving the random properties of chaos-based cryptosystems M. Garcia-Bosque, a A. Pérez-Resa, a C. Sánchez-Azqueta, a and S. Celma a Group of

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle Network Security Chapter 2 Basics 2.4 Random Number Generation for Cryptographic Protocols Motivation It is

More information

MODIFIED NON-OVERLAPPING TEMPLATE MATCHING TEST AND PROPOSAL ON SETTING TEMPLATE

MODIFIED NON-OVERLAPPING TEMPLATE MATCHING TEST AND PROPOSAL ON SETTING TEMPLATE J. Jpn. Soc. Comp. Statist., 27(2014), 49 60 DOI:10.5183/jjscs.1311001 208 MODIFIED NON-OVERLAPPING TEMPLATE MATCHING TEST AND PROPOSAL ON SETTING TEMPLATE Yuichi Takeda, Mituaki Huzii, Norio Watanabe

More information

FResCA: A Fault-Resistant Cellular Automata Based Stream Cipher

FResCA: A Fault-Resistant Cellular Automata Based Stream Cipher FResCA: A Fault-Resistant Cellular Automata Based Stream Cipher Jimmy Jose 1,2 Dipanwita Roy Chowdhury 1 1 Crypto Research Laboratory, Department of Computer Science and Engineering, Indian Institute of

More information

NAVAL POSTGRADUATE SCHOOL

NAVAL POSTGRADUATE SCHOOL NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS GENERALIZED BOOLEAN FUNCTIONS AS COMBINERS by Oliver Di Nallo June 2017 Thesis Advisor: Pantelimon Stănică Second Reader: Thor Martinsen Approved for

More information

A Fast Digital Chaotic Generator for Secure Communication

A Fast Digital Chaotic Generator for Secure Communication A Fast Digital Chaotic Generator for Secure Communication Shih-Liang Chen TingTing Hwang Shu-Ming Chang Wen-Wei Lin Abstract In this paper, we propose a digitalized chaotic map, Variational Logistic Map

More information

Multi-Map Orbit Hopping Chaotic Stream Cipher

Multi-Map Orbit Hopping Chaotic Stream Cipher Multi-Map Orbit Hopping Chaotic Stream Cipher Xiaowen Zhang 1, Li Shu 2, Ke Tang 1 Abstract In this paper we propose a multi-map orbit hopping chaotic stream cipher that utilizes the idea of spread spectrum

More information

Signature Attractor Based Pseudorandom Generation Algorithm

Signature Attractor Based Pseudorandom Generation Algorithm Advanced Studies in Theoretical Physics Vol. 9, 2015, no. 6, 287-293 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/astp.2015.517 Signature Attractor Based Pseudorandom Generation Algorithm Krasimir

More information

A Chaotic Encryption System Using PCA Neural Networks

A Chaotic Encryption System Using PCA Neural Networks A Chaotic Encryption System Using PCA Neural Networks Xiao Fei, Guisong Liu, Bochuan Zheng Computational Intelligence Laboratory, School of Computer Science and Engineering, University of Electronic Science

More information

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding

Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding International Journal on Advances in Security, vol 4 no &, year, http://www.iariajournals.org/security/ Evaluating Quality of Chaotic Pseudo-Random Generators: Application to Information Hiding 8 Jacques

More information

Digital Secure-Communication Using Robust Hyper-Chaotic Systems

Digital Secure-Communication Using Robust Hyper-Chaotic Systems Digital Secure-Communication Using Robust Hyper-Chaotic Systems Shih-Liang Chen Shu-Ming Chang Wen-Wei Lin Ting-Ting Hwang Abstract In this paper, we propose a robust hyper-chaotic system that is practically

More information

Multi-valued Arbiters for Quality Enhancement of PUF Responses on FPGA Implementation

Multi-valued Arbiters for Quality Enhancement of PUF Responses on FPGA Implementation Multi-valued Arbiters for Quality Enhancement of PUF Responses on FPGA Implementation Siarhei S. Zalivaka 1, Alexander V. Puchkov 2, Vladimir P. Klybik 2, Alexander A. Ivaniuk 2, Chip-Hong Chang 1 1 School

More information

Chaos and Cryptography

Chaos and Cryptography Chaos and Cryptography Vishaal Kapoor December 4, 2003 In his paper on chaos and cryptography, Baptista says It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property

More information

Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems

Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded Systems Amit Pande and Joseph Zambreno Department of Electrical and Computer Engineering Iowa State University,

More information

Information and Communications Security: Encryption and Information Hiding

Information and Communications Security: Encryption and Information Hiding Short Course on Information and Communications Security: Encryption and Information Hiding Tuesday, 10 March Friday, 13 March, 2015 Lecture 9: Encryption using Chaos Contents Chaos and Cryptography Iteration

More information

A Highly Flexible Lightweight and High Speed True Random Number Generator on FPGA

A Highly Flexible Lightweight and High Speed True Random Number Generator on FPGA A Highly Flexible Lightweight and High Speed True Random Number Generator on FPGA Faqiang Mei, Lei Zhang, Chongyan Gu, Yuan Cao 3, Chenghua Wang and Weiqiang Liu College of EIE, Nanjing University of Aeronautics

More information

Chaotic Random Bit Generator Realized with a Microcontroller

Chaotic Random Bit Generator Realized with a Microcontroller Journal of Computations & Modelling, vol.3, no.4, 2013, 115-136 ISSN: 1792-7625 (print), 1792-8850 (online) Scienpress Ltd, 2013 Chaotic Random Bit Generator Realized with a Microcontroller Christos K.

More information

An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps

An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos Maps Entropy 2015, 17, 181-196; doi:10.3390/e17010181 Article OPEN ACCESS entropy ISSN 1099-4300 www.mdpi.com/journal/entropy An Image Encryption Scheme Based on Hyperchaotic Rabinovich and Exponential Chaos

More information

A chaotic encryption scheme for real-time embedded systems: design and implementation

A chaotic encryption scheme for real-time embedded systems: design and implementation Telecommun Syst DOI 10.1007/s11235-011-9460-1 A chaotic encryption scheme for real-time embedded systems: design and implementation Amit Pande Joseph Zambreno Springer Science+Business Media, LLC 2011

More information

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors

We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists. International authors and editors We are IntechOpen, the world s leading publisher of Open Access books Built by scientists, for scientists 3,700 108,500 1.7 M Open access books available International authors and editors Downloads Our

More information

Analysis of FIPS Test and Chaos-Based Pseudorandom Number Generator

Analysis of FIPS Test and Chaos-Based Pseudorandom Number Generator Chaotic Modeling and Simulation (CMSIM) : 73 80, 013 Analysis of FIPS 140- Test and Chaos-Based Pseudorandom Number Generator Lequan Min, Tianyu Chen, and Hongyan Zang Mathematics and Physics School, University

More information

A Pseudo Random Number Generator Based on Chaotic Billiards

A Pseudo Random Number Generator Based on Chaotic Billiards International Journal of Networ Security, Vol.19, No.3, PP.479-486, May 017 DOI: 10.6633/IJNS.01703.193).17) 479 A Pseudo Random Number Generator Based on Chaotic Billiards Khalid Charif, Ahmed Drissi,

More information

Pseudo-Random Generators

Pseudo-Random Generators Pseudo-Random Generators Why do we need random numbers? Simulation Sampling Numerical analysis Computer programming (e.g. randomized algorithm) Elementary and critical element in many cryptographic protocols

More information

Pseudo-Random Generators

Pseudo-Random Generators Pseudo-Random Generators Topics Why do we need random numbers? Truly random and Pseudo-random numbers. Definition of pseudo-random-generator What do we expect from pseudorandomness? Testing for pseudo-randomness.

More information

Analysis and Comparison of One Dimensional Chaotic Map Functions

Analysis and Comparison of One Dimensional Chaotic Map Functions Analysis and Comparison of One Dimensional Chaotic Map Functions Tanu Wadhera 1, Gurmeet Kaur 2 1,2 ( Punjabi University, Patiala, Punjab, India) Abstract : Chaotic functions because of their complexity

More information

Topics. Pseudo-Random Generators. Pseudo-Random Numbers. Truly Random Numbers

Topics. Pseudo-Random Generators. Pseudo-Random Numbers. Truly Random Numbers Topics Pseudo-Random Generators Why do we need random numbers? Truly random and Pseudo-random numbers. Definition of pseudo-random-generator What do we expect from pseudorandomness? Testing for pseudo-randomness.

More information

Chaotic Based Secure Hash Algorithm

Chaotic Based Secure Hash Algorithm Chaotic Based Secure Hash Algorithm Mazen Tawfik Mohammed 1, Alaa Eldin Rohiem 2, Ali El-moghazy 3 and A. Z. Ghalwash 4 1,2 Military technical College, Cairo, Egypt 3 Higher Technological Institute, Cairo,

More information

Multiprime Blum-Blum-Shub pseudorandom number generator

Multiprime Blum-Blum-Shub pseudorandom number generator Calhoun: The NPS Institutional Archive DSpace Repository Theses and Dissertations 1. Thesis and Dissertation Collection, all items 2016-09 Multiprime Blum-Blum-Shub pseudorandom number generator Shrestha,

More information

Example Chaotic Maps (that you can analyze)

Example Chaotic Maps (that you can analyze) Example Chaotic Maps (that you can analyze) Reading for this lecture: NDAC, Sections.5-.7. Lecture 7: Natural Computation & Self-Organization, Physics 256A (Winter 24); Jim Crutchfield Monday, January

More information

The Phase-Modulated Logistic Map: an Exploration

The Phase-Modulated Logistic Map: an Exploration The Phase-Modulated Logistic Map: an Exploration Ryan James UC Davis rgjames@ucdavis.edu The logistic map is one of the most common examples of how chaotic dynamics can arise in simple systems. In this

More information

Solutions for week 1, Cryptography Course - TDA 352/DIT 250

Solutions for week 1, Cryptography Course - TDA 352/DIT 250 Solutions for week, Cryptography Course - TDA 352/DIT 250 In this weekly exercise sheet: you will use some historical ciphers, the OTP, the definition of semantic security and some combinatorial problems.

More information

A Fast Chaos-Based Pseudo-Random Bit Generator Using Binary64 Floating-Point Arithmetic

A Fast Chaos-Based Pseudo-Random Bit Generator Using Binary64 Floating-Point Arithmetic A Fast Chaos-Based Pseudo-Random Bit Generator Using Binary64 Floating-Point Arithmetic Michael François, David Defour, Christophe Negre To cite this version: Michael François, David Defour, Christophe

More information

PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS

PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS PERIOD LENGTHS OF CHAOTIC PSEUDO-RANDOM NUMBER GENERATORS Jörg Keller Hanno Wiese FernUniversität in Hagen LG Parallelität und VLSI 58084 Hagen, Germany joerg.keller@fernuni-hagen.de ABSTRACT Cryptographic

More information

arxiv:cs/ v1 [cs.cr] 2 Feb 2004

arxiv:cs/ v1 [cs.cr] 2 Feb 2004 Problems of Baptista s chaotic cryptosystems and countermeasures for enhancement of their overall performances arxiv:cs/0402004v1 [cs.cr] 2 Feb 2004 Shujun Li, Guanrong Chen Department of Electronic Engineering,

More information

Pipelined Pseudo-Random Number Generator with the Efficient Post-Processing Method

Pipelined Pseudo-Random Number Generator with the Efficient Post-Processing Method Pipelined Pseudo-Random Number Generator with the Efficient Post-Processing Method Paweł D bal Abstract This brief proposes a novel architecture of the chaotic pseudo-random bit generators (PRBGs) based

More information

Fully Digital Chaotic Oscillators Applied to Pseudo Random Number Generation. Thesis by Abhinav S. Mansingka

Fully Digital Chaotic Oscillators Applied to Pseudo Random Number Generation. Thesis by Abhinav S. Mansingka Fully Digital Chaotic Oscillators Applied to Pseudo Random Number Generation Thesis by Abhinav S. Mansingka B.S. (summa cum laude), Cornell University, Ithaca, NY, USA, 21. Submitted in Partial Fulfillment

More information

Weak key analysis for chaotic cipher based on randomness properties

Weak key analysis for chaotic cipher based on randomness properties . RESEARCH PAPER. SCIENCE CHINA Information Sciences May 01 Vol. 55 No. 5: 116 1171 doi: 10.1007/s1143-011-4401-x Weak key analysis for chaotic cipher based on randomness properties YIN RuMing, WANG Jian,

More information

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers

IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers IEOR SEMINAR SERIES Cryptanalysis: Fast Correlation Attacks on LFSR-based Stream Ciphers presented by Goutam Sen Research Scholar IITB Monash Research Academy. 1 Agenda: Introduction to Stream Ciphers

More information

Chaos-Based Symmetric Key Cryptosystems

Chaos-Based Symmetric Key Cryptosystems 1 Chaos-Based Symmetric Key Cryptosystems Christopher A. Wood caw4567@rit.edu Abstract Chaos theory is the study of dynamical systems that are highly sensitive to initial conditions and exhibit seemingly

More information

Phase-Space Reconstruction. Gerrit Ansmann

Phase-Space Reconstruction. Gerrit Ansmann Phase-Space Reconstruction Gerrit Ansmann Reprise: The Need for Non-Linear Methods. Lorenz oscillator x = 1(y x), y = x(28 z) y, z = xy 8z 3 Autoregressive process measured with non-linearity: y t =.8y

More information

Discrete Time Coupled Logistic Equations with Symmetric Dispersal

Discrete Time Coupled Logistic Equations with Symmetric Dispersal Discrete Time Coupled Logistic Equations with Symmetric Dispersal Tasia Raymer Department of Mathematics araymer@math.ucdavis.edu Abstract: A simple two patch logistic model with symmetric dispersal between

More information

Testing the Reliability of Statistical Tests for Pseudorandom Number Generators

Testing the Reliability of Statistical Tests for Pseudorandom Number Generators Testing the Reliability of Statistical Tests for Pseudorandom Number Generators Hiroshi Haramoto (Ehime Univ.) joint work with Makoto Matsumoto (Hiroshima Univ.) July, 3rd, 2018 This work is supported

More information

Fully digital 1-D, 2-D and 3-D multiscroll chaos as hardware pseudo random number generators

Fully digital 1-D, 2-D and 3-D multiscroll chaos as hardware pseudo random number generators Fully digital -D, 2-D and 3-D multiscroll chaos as hardware pseudo random number generators Item Type Conference Paper Authors Mansingka, Abhinav S.; adwan, Ahmed Gomaa; Salama, Khaled N. Citation Mansingka

More information

Cryptography Lecture 3. Pseudorandom generators LFSRs

Cryptography Lecture 3. Pseudorandom generators LFSRs Cryptography Lecture 3 Pseudorandom generators LFSRs Remember One Time Pad is ideal With OTP you need the same transmission capacity via an already secure channel for the key as you can then secure via

More information

Thesis Research Notes

Thesis Research Notes Thesis Research Notes Week 26-2012 Christopher Wood June 29, 2012 Abstract This week was devoted to reviewing some classical literature on the subject of Boolean functions and their application to cryptography.

More information

On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision

On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision Shujun Li a,, Xuanqin Mou a, Yuanlong Cai a, Zhen Ji b and Jihong Zhang b a School of Electronics

More information

ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER

ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER ASYMMETRIC NUMERAL SYSTEMS: ADDING FRACTIONAL BITS TO HUFFMAN CODER Huffman coding Arithmetic coding fast, but operates on integer number of bits: approximates probabilities with powers of ½, getting inferior

More information

EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs)

EECS150 - Digital Design Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) EECS150 - igital esign Lecture 26 Error Correction Codes, Linear Feedback Shift Registers (LFSRs) Nov 21, 2002 John Wawrzynek Fall 2002 EECS150 Lec26-ECC Page 1 Outline Error detection using parity Hamming

More information

MARKOV CHAINS A finite state Markov chain is a sequence of discrete cv s from a finite alphabet where is a pmf on and for

MARKOV CHAINS A finite state Markov chain is a sequence of discrete cv s from a finite alphabet where is a pmf on and for MARKOV CHAINS A finite state Markov chain is a sequence S 0,S 1,... of discrete cv s from a finite alphabet S where q 0 (s) is a pmf on S 0 and for n 1, Q(s s ) = Pr(S n =s S n 1 =s ) = Pr(S n =s S n 1

More information

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System

A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System entropy Article A Novel Image Encryption Scheme Using the Composite Discrete Chaotic System Hegui Zhu 1, *, Xiangde Zhang 1, Hai Yu 2, Cheng Zhao 3 and Zhiliang Zhu 2 1 College of Sciences, Northeastern

More information

A novel block encryption scheme based on chaos and an S-box for wireless sensor networks

A novel block encryption scheme based on chaos and an S-box for wireless sensor networks A novel block encryption scheme based on chaos and an S-box for wireless sensor networks Tong Xiao-Jun( ) a), Wang Zhu( ) b), and Zuo Ke( ) a) a) School of Computer Science and Technology, Harbin Institute

More information

Mechanisms of Chaos: Stable Instability

Mechanisms of Chaos: Stable Instability Mechanisms of Chaos: Stable Instability Reading for this lecture: NDAC, Sec. 2.-2.3, 9.3, and.5. Unpredictability: Orbit complicated: difficult to follow Repeatedly convergent and divergent Net amplification

More information

Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications

Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications Filtering Nonlinear Feedback Shift Registers using Welch-Gong Transformations for Securing RFID Applications Kalikinkar Mandal, and Guang Gong Department of Electrical and Computer Engineering University

More information

-Cryptosystem: A Chaos Based Public Key Cryptosystem

-Cryptosystem: A Chaos Based Public Key Cryptosystem International Journal of Cryptology Research 1(2): 149-163 (2009) -Cryptosystem: A Chaos Based Public Key Cryptosystem 1 M.R.K. Ariffin and 2 N.A. Abu 1 Al-Kindi Cryptography Research Laboratory, Laboratory

More information

On ZK-Crypt, Book Stack, and Statistical Tests

On ZK-Crypt, Book Stack, and Statistical Tests On ZK-Crypt, Book Stack, and Statistical Tests S. Doroshenko A. Fionov A. Lubkin V. Monarev B. Ryabko Abstract The algorithms submitted to the ECRYPT Stream Cipher Project (estream) were tested using the

More information

The logistic difference equation and the route to chaotic behaviour

The logistic difference equation and the route to chaotic behaviour The logistic difference equation and the route to chaotic behaviour Level 1 module in Modelling course in population and evolutionary biology (701-1418-00) Module author: Sebastian Bonhoeffer Course director:

More information

CHAPTER-1 INTRODUCTION

CHAPTER-1 INTRODUCTION CHAPTER-1 1.1 Need for Security INTRODUCTION The present era of data explosion involves the necessity of high efficiency in terms of data capacity and data security [1]. As the data collection and processing

More information

STREAM CIPHER. Chapter - 3

STREAM CIPHER. Chapter - 3 STREAM CIPHER Chapter - 3 S t r e a m C i p h e r P a g e 38 S t r e a m C i p h e r P a g e 39 STREAM CIPHERS Stream cipher is a class of symmetric key algorithm that operates on individual bits or bytes.

More information

Entropy Evaluation for Oscillator-based True Random Number Generators

Entropy Evaluation for Oscillator-based True Random Number Generators Entropy Evaluation for Oscillator-based True Random Number Generators Yuan Ma DCS Center Institute of Information Engineering Chinese Academy of Sciences Outline RNG Modeling method Experiment Entropy

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION Physically unclonable cryptographic primitives using self-assembled carbon nanotubes Zhaoying Hu, Jose Miguel M. Lobez Comeras, Hongsik Park, Jianshi Tang, Ali Afzali, George S. Tulevski, James B. Hannon,

More information

Pseudo-random Number Generation Using Binary Recurrent Neural Networks

Pseudo-random Number Generation Using Binary Recurrent Neural Networks Senior Individualized Project Pseudo-random Number Generation Using Binary Recurrent Neural Networks James M. Hughes, Kalamazoo College Advisors: Prof. Dr. Jochen Triesch, Fellow, Frankfurt Institute for

More information

AIR FORCE INSTITUTE OF TECHNOLOGY

AIR FORCE INSTITUTE OF TECHNOLOGY LIMITATIONS OF A TRUE RANDOM NUMBER GENERATOR IN A FIELD PROGRAMMABLE GATE ARRAY THESIS Jennifer L. Brady AFIT/GE/ENG/08-01 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY

More information

On some properties of PRNGs based on block ciphers in counter mode

On some properties of PRNGs based on block ciphers in counter mode On some properties of PRNGs based on block ciphers in counter mode Alexey Urivskiy, Andrey Rybkin, Mikhail Borodin JSC InfoTeCS, Moscow, Russia alexey.urivskiy@mail.ru 2016 Pseudo Random Number Generators

More information

A Secure Chaos-based Image Cryptosystem with an Improved Sine Key Generator

A Secure Chaos-based Image Cryptosystem with an Improved Sine Key Generator American Journal of Signal Processing 206, 6(3): 67-76 DOI: 0.5923/j.ajsp.2060603.0 A Secure Chaos-based Image Cryptosystem with an Improved Sine Key Generator Hidayet Oğraş,*, Mustafa Türk 2 Department

More information

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary

CPSC 531: Random Numbers. Jonathan Hudson Department of Computer Science University of Calgary CPSC 531: Random Numbers Jonathan Hudson Department of Computer Science University of Calgary http://www.ucalgary.ca/~hudsonj/531f17 Introduction In simulations, we generate random values for variables

More information

Using Information Theory Approach to Randomness Testing

Using Information Theory Approach to Randomness Testing Using Information Theory Approach to Randomness Testing B. Ya. Ryabko and V.A. Monarev Abstract We address the problem of detecting deviations of binary sequence from randomness,which is very important

More information

Further improving security of Vector Stream Cipher

Further improving security of Vector Stream Cipher NOLTA, IEICE Paper Further improving security of Vector Stream Cipher Atsushi Iwasaki 1a) and Ken Umeno 2 1 Fukuoka Institute of Technology Wajiro-higashi, Higashiku, Fukuoka 811-0295, Japan 2 Graduate

More information

THE CUBIC PUBLIC-KEY TRANSFORMATION*

THE CUBIC PUBLIC-KEY TRANSFORMATION* CIRCUITS SYSTEMS SIGNAL PROCESSING c Birkhäuser Boston (2007) VOL. 26, NO. 3, 2007, PP. 353 359 DOI: 10.1007/s00034-006-0309-x THE CUBIC PUBLIC-KEY TRANSFORMATION* Subhash Kak 1 Abstract. This note proposes

More information

Application of Chaotic Number Generators in Econophysics

Application of Chaotic Number Generators in Econophysics 1 Application of Chaotic Number Generators in Econophysics Carmen Pellicer-Lostao 1, Ricardo López-Ruiz 2 Department of Computer Science and BIFI, Universidad de Zaragoza, 50009 - Zaragoza, Spain. e-mail

More information

NEW RESULTS CONCERNING THE POWER OF NIST RANDOMNESS TESTS

NEW RESULTS CONCERNING THE POWER OF NIST RANDOMNESS TESTS THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 18, Special Issue 2017, pp 381-388 NEW RESULTS CONCERNING THE POWER OF NIST RANDOMNESS TESTS Carmina GEORGESCU,

More information

EECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs. Cross-coupled NOR gates

EECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs. Cross-coupled NOR gates EECS150 - Digital Design Lecture 23 - FFs revisited, FIFOs, ECCs, LSFRs April 16, 2009 John Wawrzynek Spring 2009 EECS150 - Lec24-blocks Page 1 Cross-coupled NOR gates remember, If both R=0 & S=0, then

More information

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 3 Apr 2002

arxiv:cond-mat/ v1 [cond-mat.dis-nn] 3 Apr 2002 arxiv:cond-mat/0204076v1 [cond-mat.dis-nn] 3 Apr 2002 In: M. Suzuki and N. Kawashima (eds.) Coherent Approaches to Fluctuations (Proc. Hayashibara Forum 95), pp. 59-64, World Scientific (singapore, 1995).

More information

A NOVEL MULTIPLE PSEUDO RANDOM BITS GENERATOR BASED ON SPATIOTEMPORAL CHAOS. Ping Li,1 Zhong Li Wolfgang. A. Halang Guanrong Chen

A NOVEL MULTIPLE PSEUDO RANDOM BITS GENERATOR BASED ON SPATIOTEMPORAL CHAOS. Ping Li,1 Zhong Li Wolfgang. A. Halang Guanrong Chen A OVEL MULTIPLE PSEUDO RADOM BITS GEERATOR BASED O SPATIOTEMPORAL CHAOS Ping Li, Zhong Li Wolfgang. A. Halang Guanrong Chen Faculty of Electrical and Computer Engineering, FernUniversität in Hagen, 884

More information

Introduction to Dynamical Systems Basic Concepts of Dynamics

Introduction to Dynamical Systems Basic Concepts of Dynamics Introduction to Dynamical Systems Basic Concepts of Dynamics A dynamical system: Has a notion of state, which contains all the information upon which the dynamical system acts. A simple set of deterministic

More information

COMPOSITIONS OF LINEAR FUNCTIONS AND APPLICATIONS TO HASHING

COMPOSITIONS OF LINEAR FUNCTIONS AND APPLICATIONS TO HASHING COMPOSITIONS OF LINEAR FUNCTIONS AND APPLICATIONS TO HASHING VLADIMIR SHPILRAIN AND BIANCA SOSNOVSKI ABSTRACT. Cayley hash functions are based on a simple idea of using a pair of (semi)group elements,

More information

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption

The Method of Obtaining Best Unary Polynomial for the Chaotic Sequence of Image Encryption Journal of Information Hiding and Multimedia Signal Processing c 2017 ISSN 2073-4212 Ubiquitous International Volume 8, Number 5, September 2017 The Method of Obtaining Best Unary Polynomial for the Chaotic

More information

Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications

Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications Australian Journal of Basic and Applied Sciences, 4(7): 1691-1698, 2010 ISSN 1991-8178 Implementation of Digital Chaotic Signal Generator Based on Reconfigurable LFSRs for Multiple Access Communications

More information

arxiv: v2 [cs.cr] 6 Aug 2017

arxiv: v2 [cs.cr] 6 Aug 2017 Cryptanalyzing an Image Scrambling Encryption Algorithm of Pixel Bits Chengqing Li a,, Dongdong Lin a, Jinhu Lü b a Hunan Province Cooperative Innovation Center for Wind Power Equipment and Energy Conversion,

More information

Co-existence of Regular and Chaotic Motions in the Gaussian Map

Co-existence of Regular and Chaotic Motions in the Gaussian Map EJTP 3, No. 13 (2006) 29 40 Electronic Journal of Theoretical Physics Co-existence of Regular and Chaotic Motions in the Gaussian Map Vinod Patidar Department of Physics, Banasthali Vidyapith Deemed University,

More information

One-way Hash Function Based on Neural Network

One-way Hash Function Based on Neural Network One-way Hash Function Based on Neural Network Shiguo Lian, Jinsheng Sun, Zhiquan Wang Department of Automation, Nanjing University of Science & echnology, Nanjing, 294, China, sg_lian@63.com Abstract A

More information

Binary GH Sequences for Multiparty Communication. Krishnamurthy Kirthi

Binary GH Sequences for Multiparty Communication. Krishnamurthy Kirthi Binary GH Sequences for Multiparty Communication Krishnamurthy Kirthi Abstract This paper investigates cross correlation properties of sequences derived from GH sequences modulo p, where p is a prime number

More information

Correcting Codes in Cryptography

Correcting Codes in Cryptography EWSCS 06 Palmse, Estonia 5-10 March 2006 Lecture 2: Orthogonal Arrays and Error- Correcting Codes in Cryptography James L. Massey Prof.-em. ETH Zürich, Adjunct Prof., Lund Univ., Sweden, and Tech. Univ.

More information

Cryptanalysis of a computer cryptography scheme based on a filter bank

Cryptanalysis of a computer cryptography scheme based on a filter bank NOTICE: This is the author s version of a work that was accepted by Chaos, Solitons & Fractals in August 2007. Changes resulting from the publishing process, such as peer review, editing, corrections,

More information

Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system

Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system ISSN 1746-7659, England, UK Journal of Information and Computing Science Vol. 1, No., 017, pp.13-19 Image encryption based on the tracking control Hindmarsh-Rose system via Genesio-Tesi system Keming Tang

More information

Pseudo-Random Bit Generator Based on Couple Chaotic Systems and its Applications in Stream-Cipher Cryptography

Pseudo-Random Bit Generator Based on Couple Chaotic Systems and its Applications in Stream-Cipher Cryptography Pseudo-Random Bit Generator Based on Couple Chaotic Systems and its Applications in Stream-Cipher Cryptography Li Shujun a, Mou Xuanqin b, and Cai Yuanlong c Institute of Image Processing, School of Electronics

More information

Pseudo-random Number Generation. Qiuliang Tang

Pseudo-random Number Generation. Qiuliang Tang Pseudo-random Number Generation Qiuliang Tang Random Numbers in Cryptography The keystream in the one-time pad The secret key in the DES encryption The prime numbers p, q in the RSA encryption The private

More information

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1

Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Permutation Generators Based on Unbalanced Feistel Network: Analysis of the Conditions of Pseudorandomness 1 Kwangsu Lee A Thesis for the Degree of Master of Science Division of Computer Science, Department

More information

AN EFFICIENT PRNG FOR STREAM CIPHERS BASED ON HYBRID CELLULAR AUTOMATA WITH NONLINEAR FEEDBACK

AN EFFICIENT PRNG FOR STREAM CIPHERS BASED ON HYBRID CELLULAR AUTOMATA WITH NONLINEAR FEEDBACK THE PUBLISHING HOUSE PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A, OF THE ROMANIAN ACADEMY Volume 16, Special Issue 2015, pp. 367-374 AN EFFICIENT PRNG FOR STREAM CIPHERS BASED ON HYBRID CELLULAR AUTOMATA

More information

A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256

A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256 A Novel Hyper Chaos-based Image Encryption Algorithm Using Dynamic DNA Coding and SHA-256 Shuqin Zhu Wenhong Wang School of Computer Science; Liaocheng University Liaocheng, 252, China E-mail: wangwenhong@lcu-cs.com

More information