2,181 research outputs found
A novel pseudo-random number generator based on discrete chaotic iterations
Security of information transmitted through the Internet, against passive or
active attacks is an international concern. The use of a chaos-based
pseudo-random bit sequence to make it unrecognizable by an intruder, is a field
of research in full expansion. This mask of useful information by modulation or
encryption is a fundamental part of the TLS Internet exchange protocol. In this
paper, a new method using discrete chaotic iterations to generate pseudo-random
numbers is presented. This pseudo-random number generator has successfully
passed the NIST statistical test suite (NIST SP800-22). Security analysis shows
its good characteristics. The application for secure image transmission through
the Internet is proposed at the end of the paper.Comment: The First International Conference on Evolving Internet:Internet 2009
pp.71--76 http://dx.doi.org/10.1109/INTERNET.2009.1
Discrete-Time Chaotic-Map Truly Random Number Generators: Design, Implementation, and Variability Analysis of the Zigzag Map
In this paper, we introduce a novel discrete chaotic map named zigzag map
that demonstrates excellent chaotic behaviors and can be utilized in Truly
Random Number Generators (TRNGs). We comprehensively investigate the map and
explore its critical chaotic characteristics and parameters. We further present
two circuit implementations for the zigzag map based on the switched current
technique as well as the current-mode affine interpolation of the breakpoints.
In practice, implementation variations can deteriorate the quality of the
output sequence as a result of variation of the chaotic map parameters. In
order to quantify the impact of variations on the map performance, we model the
variations using a combination of theoretical analysis and Monte-Carlo
simulations on the circuits. We demonstrate that even in the presence of the
map variations, a TRNG based on the zigzag map passes all of the NIST 800-22
statistical randomness tests using simple post processing of the output data.Comment: To appear in Analog Integrated Circuits and Signal Processing (ALOG
Improving random number generators by chaotic iterations. Application in data hiding
In this paper, a new pseudo-random number generator (PRNG) based on chaotic
iterations is proposed. This method also combines the digits of two XORshifts
PRNGs. The statistical properties of this new generator are improved: the
generated sequences can pass all the DieHARD statistical test suite. In
addition, this generator behaves chaotically, as defined by Devaney. This makes
our generator suitable for cryptographic applications. An illustration in the
field of data hiding is presented and the robustness of the obtained data
hiding algorithm against attacks is evaluated.Comment: 6 pages, 8 figures, In ICCASM 2010, Int. Conf. on Computer
Application and System Modeling, Taiyuan, China, pages ***--***, October 201
Deterministic Chaos in Digital Cryptography
This thesis studies the application of deterministic chaos to digital
cryptography. Cryptographic systems such as pseudo-random generators
(PRNG), block ciphers and hash functions are regarded as a dynamic
system (X, j), where X is a state space (Le. message space)
and f : X -+ X is an iterated function. In both chaos theory and
cryptography, the object of study is a dynamic system that performs
an iterative nonlinear transformation of information in an apparently
unpredictable but deterministic manner. In terms of chaos theory, the
sensitivity to the initial conditions together with the mixing property
ensures cryptographic confusion (statistical independence) and diffusion
(uniform propagation of plaintext and key randomness into cihertext).
This synergetic relationship between the properties of chaotic and
cryptographic systems is considered at both the theoretical and practical
levels: The theoretical background upon which this relationship is
based, includes discussions on chaos, ergodicity, complexity, randomness,
unpredictability and entropy.
Two approaches to the finite-state implementation of chaotic systems
(Le. pseudo-chaos) are considered: (i) floating-point approximation of
continuous-state chaos; (ii) binary pseudo-chaos. An overview is given
of chaotic systems underpinning cryptographic algorithms along with
their strengths and weaknesses. Though all conventional cryposystems
are considered binary pseudo-chaos, neither chaos, nor pseudo-chaos are
sufficient to guarantee cryptographic strength and security.
A dynamic system is said to have an analytical solution Xn = (xo)
if any trajectory point Xn can be computed directly from the initial
conditions Xo, without performing n iterations. A chaotic system with an
analytical solution may have a unpredictable multi-valued map Xn+l =
f(xn). Their floating-point approximation is studied in the context of
pseudo-random generators.
A cryptographic software system E-Larm ™ implementing a multistream
pseudo-chaotic generator is described. Several pseudo-chaotic
systems including the logistic map, sine map, tangent- and logarithm feedback
maps, sawteeth and tent maps are evaluated by means of floating point
computations. Two types of partitioning are used to extract
pseudo-random from the floating-point state variable: (i) combining the
last significant bits of the floating-point number (for nonlinear maps);
and (ii) threshold partitioning (for piecewise linear maps). Multi-round
iterations are produced to decrease the bit dependence and increase non-linearity.
Relationships between pseudo-chaotic systems are introduced
to avoid short cycles (each system influences periodically the states of
other systems used in the encryption session).
An evaluation of cryptographic properties of E-Larm is given using
graphical plots such as state distributions, phase-space portraits, spectral
density Fourier transform, approximated entropy (APEN), cycle length
histogram, as well as a variety of statistical tests from the National Institute
of Standards and Technology (NIST) suite. Though E-Larm passes
all tests recommended by NIST, an approach based on the floating-point
approximation of chaos is inefficient in terms of the quality/performance
ratio (compared with existing PRNG algorithms). Also no solution is
known to control short cycles.
In conclusion, the role of chaos theory in cryptography is identified;
disadvantages of floating-point pseudo-chaos are emphasized although
binary pseudo-chaos is considered useful for cryptographic applications.Durand Technology Limite
Chaos in computer performance
Modern computer microprocessors are composed of hundreds of millions of
transistors that interact through intricate protocols. Their performance during
program execution may be highly variable and present aperiodic oscillations. In
this paper, we apply current nonlinear time series analysis techniques to the
performances of modern microprocessors during the execution of prototypical
programs. Our results present pieces of evidence strongly supporting that the
high variability of the performance dynamics during the execution of several
programs display low-dimensional deterministic chaos, with sensitivity to
initial conditions comparable to textbook models. Taken together, these results
show that the instantaneous performances of modern microprocessors constitute a
complex (or at least complicated) system and would benefit from analysis with
modern tools of nonlinear and complexity science
Quantum network architecture of tight-binding models with substitution sequences
We study a two-spin quantum Turing architecture, in which discrete local
rotations \alpha_m of the Turing head spin alternate with quantum controlled
NOT-operations. Substitution sequences are known to underlie aperiodic
structures. We show that parameter inputs \alpha_m described by such sequences
can lead here to a quantum dynamics, intermediate between the regular and the
chaotic variant. Exponential parameter sensitivity characterizing chaotic
quantum Turing machines turns out to be an adequate criterion for induced
quantum chaos in a quantum network.Comment: Accepted for publication in J. mod. Optics [Proc. Workshop
"Entanglement and Decoherence", Gargnano (Italy), Sept 1999], 3 figure
Recommendations and illustrations for the evaluation of photonic random number generators
The never-ending quest to improve the security of digital information
combined with recent improvements in hardware technology has caused the field
of random number generation to undergo a fundamental shift from relying solely
on pseudo-random algorithms to employing optical entropy sources. Despite these
significant advances on the hardware side, commonly used statistical measures
and evaluation practices remain ill-suited to understand or quantify the
optical entropy that underlies physical random number generation. We review the
state of the art in the evaluation of optical random number generation and
recommend a new paradigm: quantifying entropy generation and understanding the
physical limits of the optical sources of randomness. In order to do this, we
advocate for the separation of the physical entropy source from deterministic
post-processing in the evaluation of random number generators and for the
explicit consideration of the impact of the measurement and digitization
process on the rate of entropy production. We present the Cohen-Procaccia
estimate of the entropy rate as one way to do this. In order
to provide an illustration of our recommendations, we apply the Cohen-Procaccia
estimate as well as the entropy estimates from the new NIST draft standards for
physical random number generators to evaluate and compare three common optical
entropy sources: single photon time-of-arrival detection, chaotic lasers, and
amplified spontaneous emission
- …