5,773 research outputs found

    GENEROWANIE SEKWENCJI LOSOWYCH O ZWIĘKSZONEJ SILE KRYPTOGRAFICZNEJ

    Get PDF
    Random sequences are used in various applications in construction of cryptographic systems or formations of noise-type signals. For these tasks there is used the program generator of random sequences which is the determined device. Such a generator, as a rule, has special requirements concerning the quality of the numbers formation sequence. In cryptographic systems, the most often used are linearly – congruent generators, the main disadvantage of which is the short period of formation of pseudo-random number sequences. For this reason, in the article there is proposed the use of chaos generators as the period of the formed selection in this case depends on the size of digit net of the used computing system. It is obvious that the quality of the chaos generator has to be estimated through a system of the NIST tests. Therefore, detailed assessment of their statistical characteristics is necessary for practical application of chaos generators in cryptographic systems. In the article there are considered various generators and there is also given the qualitative assessment of the formation based on the binary random sequence. Considered are also the features of testing random number generators using the system. It is determined that not all chaos generators meet the requirements of the NIST tests. The article proposed the methods for improving statistical properties of chaos generators. The method of comparative analysis of random number generators based on NIST statistical tests is proposed, which allows to select generators with the best statistical properties. Proposed are also methods for improving the statistical characteristics of binary sequences, which are formed on the basis of various chaos generators.Sekwencje losowe wykorzystywane są do tworzenia systemów kryptograficznych lub do formowania sygnałów zakłócających. Do tych zadań wykorzystywany jest generator sekwencji losowych, który jest urządzeniem deterministycznym. Taki generator z reguły ma specjalne wymagania dotyczące jakości tworzenia sekwencji liczbowej. W systemach kryptograficznych najczęściej stosuje się generatory liniowo-przystające, których główną wadą jest krótki okres formowania pseudolosowych sekwencji liczbowych. Z tego powodu w artykule zaproponowano użycie generatora chaotycznego, jako że okres próbkowania w tym przypadku zależy od rozmiaru siatki bitowej w używanym systemie obliczeniowym. Oczywistym jest, że należy oszacować jakość generatora chaotycznego za pomocą systemu testów NIST, dlatego też do praktycznego zastosowania generatorów chaotycznych w systemach kryptograficznych wymagana jest szczegółowa ocena ich cech statystycznych. W artykule rozważono różne generatory, a także podano ocenę jakościową procesu formacji na podstawie losowej sekwencji binarnej. Rozważano również funkcje testowania generatorów liczbowych przy użyciu systemu. Stwierdzono, że nie wszystkie generatory chaotyczne spełniają wymagania testów NIST. W artykule zaproponowano metody poprawy właściwości statystycznych generatorów chaotycznych, tak jak również metodę analizy porównawczej generatorów liczb losowych, która oparta jest na testach statystycznych NIST, i która pozwala wybrać generatory o najlepszych cechach statystycznych. Przedstawiono także metody poprawy właściwości statystycznych sekwencji binarnych, które powstają na podstawie różnych generatorów chaotycznych

    Divergent Predictive States: The Statistical Complexity Dimension of Stationary, Ergodic Hidden Markov Processes

    Full text link
    Even simply-defined, finite-state generators produce stochastic processes that require tracking an uncountable infinity of probabilistic features for optimal prediction. For processes generated by hidden Markov chains the consequences are dramatic. Their predictive models are generically infinite-state. And, until recently, one could determine neither their intrinsic randomness nor structural complexity. The prequel, though, introduced methods to accurately calculate the Shannon entropy rate (randomness) and to constructively determine their minimal (though, infinite) set of predictive features. Leveraging this, we address the complementary challenge of determining how structured hidden Markov processes are by calculating their statistical complexity dimension -- the information dimension of the minimal set of predictive features. This tracks the divergence rate of the minimal memory resources required to optimally predict a broad class of truly complex processes.Comment: 16 pages, 6 figures; Supplementary Material, 6 pages, 2 figures; http://csc.ucdavis.edu/~cmg/compmech/pubs/icfshmp.ht

    From Chaos to Pseudorandomness: A Case Study on the 2-D Coupled Map Lattice

    Get PDF
    Applying the chaos theory for secure digital communications is promising and it is well acknowledged that in such applications the underlying chaotic systems should be carefully chosen. However, the requirements imposed on the chaotic systems are usually heuristic, without theoretic guarantee for the resultant communication scheme. Among all the primitives for secure communications, it is well accepted that (pseudo) random numbers are most essential. Taking the well-studied 2-D coupled map lattice (2D CML) as an example, this article performs a theoretical study toward pseudorandom number generation with the 2D CML. In so doing, an analytical expression of the Lyapunov exponent (LE) spectrum of the 2D CML is first derived. Using the LEs, one can configure system parameters to ensure the 2D CML only exhibits complex dynamic behavior, and then collect pseudorandom numbers from the system orbits. Moreover, based on the observation that least significant bit distributes more evenly in the (pseudo) random distribution, an extraction algorithm E is developed with the property that when applied to the orbits of the 2D CML, it can squeeze uniform bits. In implementation, if fixed-point arithmetic is used in binary format with a precision of z bits after the radix point, E can ensure that the deviation of the squeezed bits is bounded by 2(-z) . Further simulation results demonstrate that the new method not only guides the 2D CML model to exhibit complex dynamic behavior but also generates uniformly distributed independent bits with good efficiency. In particular, the squeezed pseudorandom bits can pass both NIST 800-22 and TestU01 test suites in various settings. This study thereby provides a theoretical basis for effectively applying the 2D CML to secure communications

    Islands in the Gap: Intertwined Transport and Localization in Structurally Complex Materials

    Get PDF
    Localized waves in disordered one-dimensional materials have been studied for decades, including white-noise and correlated disorder, as well as quasi-periodic disorder. How these wave phenomena relate to those in crystalline (periodic ordered) materials---arguably the better understood setting---has been a mystery ever since Anderson discovered disorder-induced localization. Nonetheless, together these revolutionized materials science and technology and led to new physics far beyond the solid state. We introduce a broad family of structurally complex materials---chaotic crystals---that interpolate between these organizational extremes---systematically spanning periodic structures and random disorder. Within the family one can tune the degree of disorder to sweep through an intermediate structurally disordered region between two periodic lattices. This reveals new transport and localization phenomena reflected in a rich array of energy-dependent localization degree and density of states. In particular, strong localization is observed even with a very low degree of disorder. Moreover, markedly enhanced localization and delocalization coexist in a very narrow range of energies. Most notably, beyond the simply smoothed bands found in previous disorder studies, islands of transport emerge in band gaps and sharp band boundaries persist in the presence of substantial disorder. Finally, the family of materials comes with rather direct specifications of how to assemble the requisite material organizations.Comment: 7 pages, 3 figures, supplementary material; http://csc.ucdavis.edu/~cmg/compmech/pubs/talisdm.ht
    corecore