ArticlePDF Available

New Pseudo-Random Number Generator System Based on Jacobian Elliptic maps and Standard Map

Authors:
  • Al-Mustansiriya UniversityBaghdad,Iraq

Abstract and Figures

Chaot ic systems have numerous properties, for example: mixing property, sensitivity to initial conditions parameters, structural complexity and deterministic dynamics. These properties were investment in the last decade for cryptographic applications and developments of pseudorandom number/bit generator. The paper propose new pseudorandom number (bits) generator (PRNG) based on the Jacobian elliptic chaotic maps and standard map. The principle of the method consists in generating binary sequence from elliptic chaotic maps of cn and sn types. These sequence positions is permuted using standard map. The performance of the generator is studied through conventional statistical methods and also using the NIST test suite. The results show that the produced sequences possess high randomness statistical properties and good security level which make it suitable for cryptographic applications.
Content may be subject to copyright.
IJCCCE Vol.15, No.3, 2015
_________________________________________________________________________________
77
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard Map
Asst. Prof. Dr. Luma Fayeq Jalil1 Prof.Dr. Hilal Hadi Saleh2 Ekhlas Abass Albhrany3
1,2 Department of Computer Science, University of Technology, Baghdad
3 Department of Computer Science, Mustansiriyah University, Baghdad, Iraq,
e-mail: dr_lumafaik79@yahoo.com, hhsrq888@yahoo.com akhlas_abas@yahoo.com,
Received: 25/2/2015
Accepted: 11/11/2015
Abstract- Chaotic systems have numerous properties, for example: mixing property,
sensitivity to initial conditions parameters, structural complexity and deterministic
dynamics. These properties were investment in the last decade for cryptographic
applications and developments of pseudorandom number/bit generator. The paper propose
new pseudorandom number (bits) generator (PRNG) based on the Jacobian elliptic chaotic
maps and standard map. The principle of the method consists in generating binary sequence
from elliptic chaotic maps of cn and sn types. These sequence positions is permuted using
standard map. The performance of the generator is studied through conventional statistical
methods and also using the NIST test suite. The results show that the produced sequences
possess high randomness statistical properties and good security level which make it
suitable for cryptographic applications.
Keywords: chaotic function, pseudorandom sequences, Jacobian elliptic maps, Standard
map, NIST test suite.
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
78
1. Introduction
The generation of PRNG plays an
essential role in a large number of
applications such as simulations of
numerical, statistical mechanics, gaming
industry, communication or cryptography.
The main advantages of such generators are
the rapidity and the repeatability of the
sequences and require less memory for
algorithm storage. First way to design such
a pseudo-random number generator is
connected to the chaos theory [1]-[3]. That
theory focuses primarily on the description
of these systems that are often very simple
to define, but whose dynamics appears to
be very confused. Indeed, chaotic system
very attractive for pseudo-random number
generators because a slightly change in the
input can cause a large change in the output
(i.e. the extreme sensitivity to the initial
conditions). Moreover, during this last
decade several pseudo-random number
generators have been successfully
developed.
Patidar, 2009 designed a new PRBG
(pseudo random bit generator) based on
running pair of chaotic logistic maps side-
by-side and beginning from random
independent initial conditions [3]. Pareek ,
Patidar , Sud, 2010 proposed a new binary
sequence generator, called Cross- Coupled
Chaotic Random Bit Generator (CCCBG),
which achieve the interesting properties of
a skew tent map. They used two chaotic
maps which are the piecewise linear skew
tent maps and cross-coupled. The CCCBG
generates the binary sequences based on the
comparison between the outputs of the
skew tent and cross coupled chaotic maps
[5]. Francois, Grosges, 2011 proposed an
algorithm for generation of multiple
pseudo-random sequences using a chaotic
function. The algorithm uses permutations.
The permutation positions are computed
and indexed using a chaotic function based
on linear congruencies. These chaotic
permutations are obtained iteratively on this
initial vector to produce two chaotic maps
[6]. Azeem, Adriana, Adrian, 2013 suggest
using tent map to generate pseudorandom
binary sequences. The binary sequences
under investigation are obtained either by
considering all the successive iterations of
the tent map and choosing a threshold equal
to the tent map parameter or by applying a
periodical sampling on the tent map values
and by choosing a threshold equal to 0.5
[7]. Recently, Michael François, David
Defour and Christophe Negre 2014 propose
pseudo-random bit generator based on
combined three logistic maps and generate
a block of 32 random bits at each iteration.
The proposed generator based on the
binary64 double that produced based on the
IEEE 754-2008 standard for floating-point
arithmetic [8].In this paper, we propose a
novel pseudo-random number (bit)
generator (PRNG) based on the Jacobian
elliptic chaotic maps and standard map. It
combines the output of the elliptic chaotic
maps of cn and sn types. The output from
each type is converted to binary sequence.
Theses sequences are combined to produce
one binary sequence. This sequence is
permuted by using standard map. The
choice of using Jacobian elliptic chaotic
maps and standard map enlarges the
complexity of the system and increases the
difficulty for an attacker to extract sensitive
information from the outputs. Experimental
results and security analysis indicate that,
the elliptic chaotic map is advantageous
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
79
from the point of view of large key space
and high level of security.
The produced pseudo-random
sequences have successfully passed the
various statistical tests. The assets of the
generator are: high sensitivity to initial seed
values, high level of randomness and good
throughput.
The paper is structured as follows, the
description of the method as well as the
chaotic functions analysis are given in
Section 2 and 3 and 4. Section 5 presents
the statistical analysis applied on a set of
generated pseudo-random sequences. The
security analysis of the generator is
achieved in Section 6, before conclusions.
2. Jacobian Elliptic Chaotic Map
The core of the generator is the of the cn
and sn type of Jacobian elliptic chaotic
map. Ergodicity and fixed interval of
chaotic orbits are two major properties for
the performance of chaos based
cryptosystems. The families of one-
parameter elliptic chaotic maps of cn and sn
at the interval [0, 1] are defined as the ratio
of Jacobian elliptic functions of cn and sn
types [9] through the following equations:

 


Obviously, these equations map the
unit interval [0, 1] into itself. The maps
(α , x), w = 1, 2, are (N1)-nodal
maps, that is, they have (N1) critical
points in unit interval [0, 1] and they have
only a single period one stable fixed point
or they are ergodic.
As an example of the Jacobian elliptic maps
(1), the following maps can be presented:-





Where x0 [0, 1], α[0, 4] and k[0, 1].
The parameter k (modulus) represents the
parameter of the elliptic functions. Elliptic
chaotic maps are ergodic for certain values
of their parameters.
3. Standard Map
The so-called standard map was introduced
in [10]-[11], and is described by:
 

where k is the control parameter satisfying
k > 0, and the ith states ai and bi both take
real values in [0,2) for all i. Thestandard
map was discretized in astraightforward
manner [12] by substituting x = aN/2, y =
bN/2, K = kN/2 intoEq. (6), which
maps from [0,2) × [0,2) to N × N. After
discretization, the map becomes
 
 
 
where K is a positive integer. The
properties of this discretized map may not
be as good as the original one, but it can be
implemented in the integer domain, which
reduces the computational complexity and
is more suitable for real-time data
encryption. The standard map is used to
realize data permutation [12].
In the standard map, the pixels at the
corners of a square image have some
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
80
special properties. For example, the pixel at
position (0, 0) remains unchanged after any
number of iterations. This is actually a
weakness of the permutation process. And
it can do some help to the attackers
although the permutation process is further
strengthened by a diffusion process. In
order to avoid it, [13] proposed to change
the positions of the pixels at the corners ((0,
0), (0,N-1), (N- 1, 0) and (N- 1,N - 1)). That
is, the normal scan order is changed into a
random one. A random-couple (rx, ry) is
generated (after the iteration of chaotic
map), which represents the position of a
randomly selected pixel in the square
image. Then, the whole image shifts in
horizontal and vertical directions by rx and
ry, respectively as shown in Figure 1.The
normal scan mode by using the random
shift process is changed into a random one,
so it is named a random-scan mode.
The two parameters rx and ry both vary
from 0 to N-1. Thus, the random-scan
process can be combined with the chaotic
permutation process, and the modified
chaotic map becomes
 
 
 
The modified map is still invertible, so
the inverse-permutation process can be
easily realized. The modified chaotic
confusion process has two advantages [13]:
First the random-couple can be
generated under the control of keys, which
enlarges the cryptosystems key space. This
mean that the key space for the random-
couple is 2 × N (N is the width or height of
the matrix).
Second the random-scan process
makes it difficult to break the diffusion key
under known-plaintext attacks. This mean
that the random-scan process confuses the
position of the first pixel, which makes
attackers difficult to get the first pixels
cipher-pixel, and thus increases the
difficulty of breaking the diffusion key.
4. The Proposed PRNG
The main idea of the proposed PRNG
consists of the following major steps:-
Step 1: the initial condition (x) and control
parameters (α and k) are input to the
Jacobian elliptic chaotic map type cn
equation (3) and sn equation (4). These
numbers are floating point numbers where
the precision is 1016 for each of x0, α and k,
considered as the keys of the generator.
Step 2: Iterate the Jacobian elliptic maps
100 times and ignore the results, in order to
eliminate the transient effect of chaotic
map.
Step 3: modify the values of x, k and α
using simple XOR operation to increase the
complexity of algorithm.
Step 4: Iterate the Jacobian elliptic maps
one time and convert the floating point
output of each map to binary sequence of
random length. The two sequences are
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
81
combined into one random length binary
sequence.
Step 5: The parameters of standard map
equation (7) are constructed from the half
24-bit of the resulted sequence. These bits
are divided into three 8-bit integer numbers
to produce the parameters of standard map
(r1, r2, k). These 24-bit then is eliminated
from the sequence. The resulted binary
sequence is translate to matrix of 8 x N
where N is an integer number.
Step 6: Diffuse the resulted matrix by using
standard map equation (7).
Step 7: the resulted matrix from the
standard map is transferred column by
column to new binary sequence.
Step 8: repeat from step 4 until the desired
number of bits (numbers) is reached. When
number of bits becomes a chosen number
(in proposed algorithm this number is 500),
the parameters x, k and α are modified
based on last values of cn and sn maps in
order to increase the complexity of detect
the keys.
Step 9: The output of the algorithm can be
either a binary sequence of random length
or a sequence of a random number of
integer numbers.
The flowchart of the proposed algorithm is
presented in Figure 2.
5. Statistical Analysis
A statistical analysis should be
carefully conducted to prove the quality of
the pseudo-random sequences. The quality
of the output sequences produced by any
PRBG must have a high level of
randomness and be completely decorrelated
from each other.
5.1. Randomness evaluation.
This testing is implemented using
statistical tests NIST (National Institute of
Standards and Technology of the U.S.
Government) [14]. The testing is achieved
on sequences produced from nearby or
successive seed values.
Because for very distant seed values,
the chaotic trajectories are very different,
this usually allows obtaining good pseudo-
random sequences.
The testing was realized by generating
a number of m = 1000 different binary
sequences of length 1500. Each sequence is
generated by using different seed values.
The seed values are distributed in the range
[0..1] floating point number. All sequences
generated by the proposed PRNG are
analyzed using the NIST statistical
package. These tests are divided into two
groups based on the sequence length.
The first group consists of tests that can
be evaluated on the sequences that have
length >=100 bits, while the second group
consists of tests that are evaluated on the
sequences have length >=1000, 000.
Therefore we analyzed individual
sequences and concatenate sequences by
using the first group and only the
concatenate sequences using second group.
The results of NIST tests obtained on the
two groups are presented in Table 1 and
Table 2 respectively. The acceptable
proportion should lie above the proportion
previously defined. For individual
sequences, the proportion is:

 
This mean that the proportion should be
in the confidence interval [0.9994392..
0.9805608]. All the tested sequences
(individual and concatenate) pass
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
82
successfully the NIST tests. These results
show clearly the quality of the produced sequences from successive seed values.
Input the secret key x, k and α.
Input N.
Set i=1, j=1.
Convert the resulted floating point of sn
and sn maps into binary sequence. These
sequences are combined in one random
length sequence.
i=500?
Or I=63?
Transfer the resulted binary sequence to matrix
and diffuse it by using standard map.
j <= N?
Transfer the resulted matrix column by column into new
binary sequence which is the output of the generator.
i=i+1, j=j+1.
Iterate the Jacobian elliptic maps one
time using the new values of x, k and α
No
The parameters x, k and α
are modified based on last
values of cn and sn maps.
Set i=1.
End
Iterate the Jacobian elliptic maps cn and sn 100
times to avoid transient effect.
Modify the values of x, k and α using simple
xor operation
No
Yes
Yes
x,k and α the
parameters of
Jacobian elliptic
map.
i the counter of
bit number for
modification.
j the counter of
required number of
bits.
N→ the required
number of bits.
Figure 2 The Flowchart of Proposed PRNG.
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
83
5.2. Correlation evaluation
Correlation evaluation is to check the
correlation between the produced pseudo-
random number sequences. This can be
done in two different ways.
Firstly, the correlation between
generated sequences is analyzed globally by
computing the Pearson's correlation
coefficient of each pair of sequences [15].
Secondly correlation based directly on
the bits of sequences is analyzed. The
Hamming distance between two binary
sequences (of the same length M) is the
number of places where they differ, i.e., the
number of positions where one has a 0 and
the other a 1 [16].
5.2.1. Pearson’s correlation coefficient
Consider a pair of sequences given by:
S1 = [x1, . . . ,xN] and S2 = [y1, . . . , yN].
Therefore, the corresponding correlation
coefficient is[15]:

 


 


 



Where the mean values of S1 and S2 are:


 and

 
Two uncorrelated sequences are
characterized by CS1,S2 =0. The closer the
value of CS1,S2 is to ±1, the stronger the
correlation between the two sequences. In
the case of two independent sequences, the
value of CS1,S2 is equal to 0. Correlation
coefficients are computed for each pair of
sequences and the distribution of their
values is presented by a histogram.
The correlation between each pair of
the 1000 produced sequences is computed
using Pearson's correlation coefficient. The
results of the coefficient are represented in
the histograms shown in Figure 3. The
histogram shows that the computed
coefficients are very close to 0. This means
that around 99.9% of the coefficients
belong to [-0.08, 0.08] and the correlation
between the produced sequences is very
small.
5.2.2. Hamming distance
Given two binary sequences S =
[s0,……, sM-1 ] and S׳ = [s׳0,…… s׳M-1 ] of
same length (M), the Hamming distance is
the number of positions where they differ.
The distance is given as [16]:


 
In the case of truly random binary
sequences, such distance is typically around
M/2, which gives a proportion (i.e. d(S, S׳) /
M) of about 0.50. For each pair of produced
sequences, this proportion is determined
and all values are represented through a
histogram. The interest of both approaches
is to check the correlation for generated
sequences mainly from nearby or
successive seed values.
The bits of 1000 produced pseudo-
random sequences are analyzed using
Hamming distance. All resulted values are
represented through a histogram shown in
Figure 4. The distributions show that all the
proportions are around 50% and 99.3% of
the coefficients are belonging to [0.465,
0.535]. This testing provides another
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
84
indication about the decorrelation between
the generated sequences.
Test name
η of
Individual
Final Result
p-value of concatenate
Final Result
Frequency
0.994
Success
0.040903443
Success
Block Frequency
0.988
Success
0.553430376
Success
Runs
0.991
Success
0.880462635
Success
Longest Run
0.993
Success
0.231078877
Success
Rank
0.993
Success
0.823833254
Success
FFT
0.989
Success
0.514489087
Success
Non-Overlapping
0.984
Success
0.398411794
Success
Serial (1)
0.989
Success
0.684240449
Success
Serial (2)
0.993
Success
0.999648182
Success
Cumulative Sums
0.995
Success
0.063395343
Success
Test name
p-value of
Concatenate
Final
Result
Overlapping
0.957408045388764
Success
Universal
0.745350098931327
Success
Linear Complexity
0.402768848028256
Success
Approximate Entropy
0.110486457868039
Success
Random Excursions
(8 p-values)
0.807101754304452
0.485159643724902
0.94699932242908
0.719851271910543
0.150518027509838
0.286566773029429
0.539296753686001
0.850627304185789
Success
Success
Success
Success
Success
Success
Success
Success
Random E-Variant
(18 values)
0.349048077620093
0.490537427022143
0.351985540956662
0.253294182514715
0.268472090963728
0.1927496064346 1
0.467725747869967
0.843110263994956
0.759058537369923
0.080102266851582
0.128301667190791
0.759139341678901
0.832576263792955
0.704772436102199
0.866081601939654
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Table 1Results of first group of the NIST tests on the 1000 generated sequences for individual
and concatenate sequences. The ratio η of p-value concerns individual sequences while the p-
value concerns the concatenate sequences.
Table 2Results of second group of the NIST tests on the 1000 generated sequences for
concatenate sequences. The p-value concerns the concatenate sequences.
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
85
6. Security analyses
When a new PRNG is proposed, it
should always be accompanied by some
security analyses. All the critical points of
the cryptosystem and cryptographic
requirements should be taken into account
when the analysis is done [1]. The analyzed
points are: the size of the key space, the key
sensitivity, randomness quality of the
outputs and two basic attacks are evaluated:
brute-force attack, differential attack
.
6.1. Key space
Crucial part of each cryptosystem is the
key. Keeping in mind the end goal to make
brute-force attacks infeasible, PRNG ought
to have a large key space. The size of key
space that is smaller than 2128 is not secure
sufficiently. Here, the key space is
constructed form the parameters of
Jacobian elliptic maps cn and sn (initial
value x0 and control parameters k and α)
types which are floating point numbers,
where x0[0, 1], α[0, 4] and k[0, 1].If
the precision is 1016 for each of x0, α and k,
the size of key space for initial conditions
and control parameters is 2160((1016)3).
In addition the parameters of the
standard map (permutation parameter k and
the random scan keys [rx,ry]) which are
integer number, where k, rx and ry
[0..255]. If each parameter has 256 possible
keys (28), the total number of keys is
(28)3=224. So the total space of keys is
2160+224.
6.2. Key sensitivity.
Sensitivity analysis is the investigation
of how the instability in the yield of a
model can be distributed to various sources
of instability in the model input [17]. An
essential factor for the pseudo-random
generation is the sensitivity on the key. In
other words, a small changing in the
starting seeds should cause a large change
in the pseudo-random sequences.
Figure 3 Histogram of Pearson's correlation
coefficient values on interval [-0.10, 0.10] for the
1000 sequences
0.726128320880061
0.592148885856078
0.843894535051766
Success
Success
Success
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
86
Figure 4 Histogram of Hamming distance on
interval [0:435; 0:565] for the 1000 sequences
This means that a small difference on seed
values, the output sequences should be
completely uncorrelated.
Actually in the test of correlation, the key
sensitivity was already tested due to the
successive seed values. To ensure the
sensitivity of the key, additional analyses
have been done using Pearson's correlation
coefficients and Hamming distance. Four
large pseudo-random sequences of size N
=500,000 bits S1, S2, S3, S4 produced from
slightly different initial seeds are
considered.
A sequence S1 is produced by using
the seed values X0=0.2344587645985498,
K0=0.5123678943210314,
α0=2.8231406754308769.
A sequence S2 is produced by using the
seed values X1=X0+8×10-16, K1=K0+8× 10-
16, α10+8×10-16.
A sequence S3 is produced by using the
seed values X2=X1+8×10-16, K2=K1+8× 10-
16, α21+8×10-16.
A sequence S4 is produced by using the
seed values X3=X2+8×10-16, K3=K2+8× 10-
16, α32+8×10-16.
The analysis is done using the linear
correlation coefficient of Pearson and the
Hamming distance between the four
pseudo-random sequences produced with
slightly different seed. The results show
that, the sequences are highly correlated
from each other as shown in Table 3.
6.3 Attacks of proposed PRNG
Any new PRNG must be analyzed against
attacks to check if the generator cannot be
Tests
S1/S2
S1/S3
S1/S4
S2/S3
S2/S4
S3/S4
Pearson Corr.
Coef.
-0.00089
-0.00104
-0.00163
0.00166
0.001881
0.001594
Hamming
Distance
0.500012
0.50062
0.500818
0.499150
0.499050
0.499200
Table 3 Correlation Coefficients between four pseudorandom sequences produced
with slightly different seeds
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
87
broken. Here, the resistance of the
generator against two basic attacks as the
brute-force attack and differential attack is
analyzed.
a) Brute-force attack.
The size of the key space must be large
enough to prevent a brute-force attack [18].
This attack consists in checking
systematically all possible keys until the
correct key is found. In the worst case, all
the combinations are tested, that
necessitates trying all the key space.
When it is not possible to detect any
weakness in the algorithm, such an attack
might be utilized that would make the task
easier. To resist this kind of attack, the size
of the key space must be large. It is
generally accepted that a key space of size
larger than 2128 is computationally secure
against such attack. In the proposed PRNG,
the size of the key space
is around 2184 [1], which clearly allows
resisting the brute force-attack.
b) Differential Attacks
This attack is similar to the chosen-
plaintext attack; its principle is studying
how differences in an input can affect the
resultant difference at the output in an
attempt to derive the key [18].Trying to
make a slight change on the input pair,
attacker observes the change of the
produced sequences. Such technique of
cryptanalysis was introduced by Biham and
Shamir [19]. Given two inputs In1 and In2 to
the generator and the corresponding outputs
Out1 and Out2, there are two methods to
find the differences between the two
outputs.
Firstly, the difference can be computed
between the two pseudo-random sequences
relatively to the bits or blocks of bits by
subtraction method. This can be done by
∆in =│ In1-In2│ and ∆out = │Out1
Out2│, respectively.
Secondly, the difference between the two
output sequences can be computed by
in = In1 In2
and
out = Out1 Out2
Differential probability is then used to
measure the diffusion aspect on the initial
conditions. In proposed PRNG, we iterate
the jacobain maps 100 times before the
beginning of the generation. In addition, the
results of the analyses showed that even
with a slight difference on the seeds, the
produced outputs are almost uncorrelated
from each other. So, the proposed PRNG is
designed to avoid this kind of cryptanalysis.
7
8 7. Comparative Results of proposed
PRNG
The proposed CRNG is compared with
the PRNG proposed by et al [8]. The
deference between the proposed PRNG and
the M. François PRNG is made on numbers
of factors which include key space, number
of bits in each iteration, the result of NIST
test and the result of correlation
coefficients. Table 4 shows the result of
comparison.
The key space of proposed PRNG is
larger than that of M. François PRNG. It is
by and large acknowledged that a key space
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
88
of size bigger than 2128 is computationally
secure against brute-force attack [8].
The number of bits in each iteration of
proposed PRNG is randomly in the rang
[64..80] bits in each iteration. This means
that the proposed PRNG is faster than M.
François PRNG.
8. Conclusions
In this paper, a novel pseudo-random
number generator based on the Jacobian
elliptic chaotic map types sn,cn and
standard map. The initial condition x0 and
the control parameters k and α is the input
to the Jacobian elliptic chaotic map to
produce binary sequence. Chaotic standard
map is used to diffuse the binary sequence.
Such a generator has shown its ability to
produce a very large number of pseudo-
random sequences which can be useful in
several cryptographic applications because
it has many properties which are the
adaptive size of the key space, the
sensitivity to the initial inputs (keys), the
quality of pseudo-random sequences, the
security level against several attacks.
It can be used as pseudo random bit
generator or as pseudo random number
generator.
The quality of the output sequences
randomness is evaluated through NIST tests
which are 15 tests. Table 4 shows that the
output sequence of proposed PRNG is
random with large values for the tests than
that for M. François PRNG.
References
[1] G. Alvarez, S. Li, “Some Basic Cryptographic
Requirements for Chaos-Based Cryptosystems”,
International Journal of Bifurcation and Chaos,
World Scientific, Vol. 16, 2006, pp 2129-2151.
[2] F. Zheng, X. Tian, J. Song and X. Li, “Pseudo-
random sequence generator based on the
generalized Henonmap”, The Journal of China
Universities of Posts and Telecommunications,
vol. 15, no. 3, 2008, pp. 6468.
[3] V. Patidar and K.K. Sud, “A pseudo random bit
generator based on chaotic logistic map and its
statistical testing”, Informatics, 33, 2009, pp.
441452.
[4] N. Pareek, V. Patidar, and K. Sud, “A Random
Bit Generator Using Chaotic Maps”,
International Journal of Network Security,
vol.10, No.1, 2010, pp. 32-38.
[5] C. E. Shannon. “Communication theory of
secrecy systems”. Bell System Technical
Journal, July, 1948, p.623.
key
space
number
of bits at
each
iteration
Freq.
Block
Freq.
Runs
Longest
Run
Rank
FFT
Non-
Over-
lapping
Serial
(1)
Serial
(2)
Cumu-
lative
Sums
proposed
PRNG
2160+224
Randoml
y in the
range
[64..80]
bits.
0.994
0.988
0.991
0.993
0.993
0.989
0.984
0.989
0.993
0.957
M.
François
PRNG
2147
32 bits.
0.991
0.991
0.989
0.989
0.988
0.987
0.993
0.989
0.990
0.991
Table 4 Comparison between the proposed PRNG and M. Francois PRNG
IJCCCE Vol.15, No.3, 2015
Ekhlas Abass Albhrany et. al.
New Pseudo-Random Number Generator System
Based on Jacobian Elliptic maps and Standard map
89
[6] M. Francois, T. Grosges, D. Barchiesi and R.
Erra, “A New Pseudo-Random Number
Generator Based on Two Chaotic Maps”,
INFORMATICA, vol. 24, no. 2, 2013, pp. 181
197 Vilnius University.
[7] Ilyas, A. Vlad and A. Luca, “Statistical Analysis
of Pseudo Random Binary SequencesGenerated
By Using TentMap”, U.P.B. Sci. Bull., Series A,
vol. 75, no. 3, 2013.
[8] M. François, D. Defour and C. Negre, “A Fast
Chaos-Based Pseudo-RandomBit Generator
Using Binary64 Floating-Point Arithmetic”,
Informatica vol. 38, 2014, pp. 115124.
[9] M. A. Jafarizadeh and S.Behnia, “Hierarchy of
one- and many-parameter families of elliptic
chaotic maps of cn and sn types”, Physics
Letters, vol. 310, April 2003, pp. 168176.
[10] E. A. Jackson, Perspectives in nonlinear
dynamics, Cambridge University Press, vol. 1,
Reprint Edition, 1991.
[11] F. Rannou, “Numerical study of discrete plane
area-preserving map”, Astron & Astrophys: vol.
31, 1974, pp. 289301.
[12] J. Fridrich, “Symmetric ciphers based on two-
dimensional chaotic maps”, International Journal
Bifurcation Chaos, vol. 8, no. 6, June 1998,
pp.1259-1284.
[13] J. Soto and L. Bassham, “Randomness Testing of
the Advanced Encryption Standard Finalist
Candidates”, Computer Security Division
National Institute of Standards and Technology,
March 2000.
[14] Rukhin, J. Soto, J. Nechvatal, M. Smid, E.
Barker, S. Leigh, M. Levenson, M. Vangel, D.
Banks, A. Heckert, J. Dray and S. Vo, “A
Statistical Test Suite for Random and
Pseudorandom Number Generators for
Cryptographic Applications”, NIST Special
Publication Revision 1a,vol. 800, April 2010, pp.
131.
[15] V. Patidar, N. K. Pareek, G. Purohit and K. K.
Sud, “A robust and secure chaotic standard map
based pseudorandom permutation-substitution
scheme for image encryption”, Optics
Communications, vol. 284, no. 19, September
2011, pp. 4331- 4339.
[16] W. Janke, “Pseudo random numbers: generation
and quality checks”, Quantum Simulations of
Complex Many-Body Systems, vol. 10, 2002,
pp. 447458.
[17] J.C. Ascough, , T.R. Green, L. Ma and L.R.
Ahjua, “Key Criteria and Selection of Sensitivity
Analysis Methods Applied to Natural Resource
Models”, Research Get, pp. 2463 - 2469.
[18] B. Schneier. Applied Cryptography: Protocols,
Algorithms, and Source Code in C, 2nd Edition,
John Wiley & Sons; 1996.
[19] E. Biham and A. Shamir, “Differential
cryptanalysis of DES-like cryptosystems,”
Journal of Cryptology, vol. 4, no. 1,January
1991, pp. 372.
... The methodology of this attack is easy and includes checking methodically every conceivable key until the first key acquired. Generally the accepted key space size is larger than 2 128 is computationally secure against such attack [20]. In proposed algorithm the key space constructed from the initial values (x 0 , y 0 , z 0 , v 0 , w 0 , s 0 ) that needed for generating the key and permutation operations, Where each of it has precision of 10 −16 and control values (α, β, λ) where α has precision of 10 −2 and β, λ has precision of 10 −3 , the total space of keys for initial conditions and control parameters is 2 346 . ...
... Let E1 and E2 two encrypted images whose corresponding keys are different by one bit, then can calculate the MSE as [28]. (20) Where H,W is the width and height of digital images. If the value obtained using equation (20) for MSE is > 30 dB, quality difference between two images is evident. ...
... (20) Where H,W is the width and height of digital images. If the value obtained using equation (20) for MSE is > 30 dB, quality difference between two images is evident. The result in table 4 shows that all MSE value > 30 db this means difference between encrypted images is clear. ...
Article
Full-text available
Chaos theory has many characteristics, such as ergodicity, mixing, randomness, unpredictability and the sensitivity to initial conditions which can be connected with the well-known confusion and diffusion properties in the classical cryptography. So, new image encryption algorithm based on a combination between RSA and chaotic maps is proposed in this paper. The new encryption algorithm encrypts and decrypts images of different size. In this algorithm, the input image is first permuted by using 1D Skew tent map and 1D Sin maps, then the result is encrypts using RSA encryption algorithm and 3D logistic map and finally, the result is permuted again. The proposed algorithm has been investigated utilizing various tests and the outcomes demonstrate that it has substantial key space, a uniform histogram, low correlation, greater maximum deviation, low irregular value, lower Peak Signal-to-Noise Ratio (PSNR) value and Mean Square Error (MSE) is greater than 30 db.
... These two sequences are created through two logistics maps. The principle of the method in [7] is based on the standard map Jacobian elliptic chaotic maps. The basic work of this method depends mainly on generating a sequence of binary numbers from (cn) and chaotic elliptic maps of syntypes. ...
... If the SAD value is close to the optimal value of 1/3, then the test result shows it is very sensitive to the keys, and it can be highly resistive this kind of attack. The proposed CKNG is compared with the PRBG proposed by Reference [7] which we will name as Refe1 and proposed by Reference [15] which we will name as Refe2. The difference between the proposed CKNG and Refe1 and Refe2 is made on the result of the NIST test, the number of bits in each iteration, and keyspace. ...
... The keyspace of proposed CKNG is greater than that of Refe1 and Refe2, and the number of bits in each iteration of proposed CKNG is 64 bits in each iteration. This number of bits means that the proposed CKNG is faster than Refe [7] and Refe [15]. The quality of the output sequences randomness is evaluated through NIST tests. ...
... The methodology of this attack is easy and includes checking methodically every conceivable key until the first key acquired. Generally the accepted key space size is larger than 2 128 is computationally secure against such attack [20]. In proposed algorithm the key space constructed from the initial values (x 0 , y 0 , z 0 , v 0 , w 0 , s 0 ) that needed for generating the key and permutation operations, Where each of it has precision of 10 −16 and control values (α, β, λ) where α has precision of 10 −2 and β, λ has precision of 10 −3 , the total space of keys for initial conditions and control parameters is 2 346 . ...
... Let E1 and E2 two encrypted images whose corresponding keys are different by one bit, then can calculate the MSE as [28]. (20) Where H,W is the width and height of digital images. If the value obtained using equation (20) for MSE is > 30 dB, quality difference between two images is evident. ...
... (20) Where H,W is the width and height of digital images. If the value obtained using equation (20) for MSE is > 30 dB, quality difference between two images is evident. The result in table 4 shows that all MSE value > 30 db this means difference between encrypted images is clear. ...
Article
Full-text available
Chaos theory has many characteristics, such as ergodicity, mixing, randomness, unpredictability and the sensitivity to initial conditions which can be connected with the well-known confusion and diffusion properties in the classical cryptography. So, new image encryption algorithm based on a combination between RSA and chaotic maps is proposed in this paper. The new encryption algorithm encrypts and decrypts images of different size. In this algorithm, the input image is first permuted by using 1D Skew tent map and 1D Sin maps, then the result is encrypts using RSA encryption algorithm and 3D logistic map and finally, the result is permuted again. The proposed algorithm has been investigated utilizing various tests and the outcomes demonstrate that it has substantial key space, a uniform histogram, low correlation, greater maximum deviation, low irregular value, lower Peak Signal-to-Noise Ratio (PSNR) value and Mean Square Error (MSE) is greater than 30 db.
... The methodology of this attack is easy and includes checking methodically every conceivable key until the first key acquired. Generally the accepted key space size is larger than 2 128 is computationally secure against such attack [20]. In proposed algorithm the key space constructed from the initial values (x 0 , y 0 , z 0 , v 0 , w 0 , s 0 ) that needed for generating the key and permutation operations, Where each of it has precision of 10 −16 and control values (α, β, λ) where α has precision of 10 −2 and β, λ has precision of 10 −3 , the total space of keys for initial conditions and control parameters is 2 346 . ...
... Let E1 and E2 two encrypted images whose corresponding keys are different by one bit, then can calculate the MSE as [28]. (20) Where H,W is the width and height of digital images. If the value obtained using equation (20) for MSE is > 30 dB, quality difference between two images is evident. ...
... (20) Where H,W is the width and height of digital images. If the value obtained using equation (20) for MSE is > 30 dB, quality difference between two images is evident. The result in table 4 shows that all MSE value > 30 db this means difference between encrypted images is clear. ...
Article
Full-text available
Chaos theory has many characteristics, such as ergodicity, mixing, randomness, unpredictability and the sensitivity to initial conditions which can be connected with the well-known confusion and diffusion properties in the classical cryptography. So, new image encryption algorithm based on a combination between RSA and chaotic maps is proposed in this paper. The new encryption algorithm encrypts and decrypts images of different size. In this algorithm, the input image is first permuted by using 1D Skew tent map and 1D Sin maps, then the result is encrypts using RSA encryption algorithm and 3D logistic map and finally, the result is permuted again. The proposed algorithm has been investigated utilizing various tests and the outcomes demonstrate that it has substantial key space, a uniform histogram, low correlation, greater maximum deviation, low irregular value, lower Peak Signal-to-Noise Ratio (PSNR) value and Mean Square Error (MSE) is greater than 30 db.
... Three 1D chaotic maps in [6] are used to create key stream and the key stream correlation propertiesare studied and analyzed. The Jacobian elliptic chaotic maps and standard map are used to create new pseudorandom number generatorby producing binary sequence from cn and sn types of elliptic chaotic maps [7]. This binary sequence location isdiffused utilizing standard map. ...
... All the basic purposes of the cryptosystem and cryptographic necessities should be considered when the examination of theproposed CKSG [7]. The analyzed points are: - ...
... The sensitivity to the change of key parameters is imperative for any key stream generator [7]. The sensitivity on the key is fundamental element for the pseudo-random generation. ...
Article
Full-text available
The key is the important part at any security system because it determines whether the system is strength or weakness. This paper aimed to proposed new way to generate keystream based on a combination between 3D Henoun map and 3D Cat map. The principle of the method consists in generating random numbers by using 3D Henon map and these numbers will transform to binary sequence. These sequence positions is permuted and Xoredusing 3D Cat map. The new key stream generator has successfully passed theNIST statistical test suite. The security analysisshows that it has large key space and its very sensitive initial conditions.
... Then the block is Xored with the key. The key is generated by using the pseudorandom generator discussed in reference [15]. Lastly the resulted block is permitted again. ...
... The key for proposed algorithm is generated by using the pseudorandom number generator PRNG discussed in reference [15]. This PRNG is generated based on the Jacobian elliptic chaotic maps and Standard map. ...
Conference Paper
Full-text available
In this paper, novel block encryption algorithm for audio file is proposed based on two chaotic maps: 2d Standard map and 2D Baker map.. The proposed algorithm encrypts and decrypts a block size of 256 bytes. Each block is input into four transformations: First permutation, Xor adding, Substitution and Last permutation. In First and Last permutation transformations the audio block is permuted using chaotic 2D Standard map. Then the resulted block is Xored with the key block and then the resulted block is substituted using chaotic substitution S-box. This S-box is permitted one time for only even audio block by using chaotic 2D Baker map. This algorithm was performed and analyzed with audio files of varies sizes of a wave file extension. The result from key space analysis, statistical analysis, MSE (mean square error) analyses, PSNR (Peak signal to noise ratio) analyses and entropy analyses showed that the algorithm is not vulnerable to brute force attacks, statistical attacks and achieve higher level of security.
Article
Full-text available
Chaos-based cryptography is widely investigated in recent years, especially in the field of random number generators. The paper describes a novel pseudo-random bit generator (PRBG) based on chaotic logistic maps. Three logistic maps are combined in the algorithmic process, and a block of 32 random bits is produced at each iteration. The binary64 double precision format is used according to the IEEE 754-2008 standard for floating-point arithmetic. This generator provides a considerable improvement of an existing generator in the literature. Rigorous statistical analyses are carefully conducted to evaluate the quality and the robustness of the PRBG. The obtained results showed the relevance of the proposed generator, which is suitable even for real-time applications.
Article
The paper presents a detailed analysis of two types of pseudorandom binary sequence generators obtained by using tent map. The test is performed using a NIST statistical test suite which is widely used for testing the randomness of any random number generator. The binary sequences under investigation are obtained either by considering all the successive iterations of the tent map and choosing a threshold equal to the tent map parameter or by applying a periodical sampling on the tent map values and by choosing a threshold equal to 0.5. Additionally, the paper comes up with a new discussion concerning the elements of the secret key for both of the generators. Based upon the results presented in the paper, both generators can be used for designing a new cipher where the pseudorandom binary sequence is the main ingredient of the cipher.
Article
A new pseudo-random number generator (PRNG) is proposed. The principle of the method consists in mixing chaotic maps produced from an input initial vector. The algorithm uses permutations whose positions are computed and indexed by a chaotic function based on linear congruences. The performance of this scheme is evaluated through statistical analysis. Such a cryptosystem lets appear significant cryptographic qualities for a good security level.
Article
This paper discusses some aspects of selecting and testing random and pseudorandom number generators. The outputs of such generators may be used in many cryptographic applications, such as the generation of key material. Generators suitable for use in cryptographic applications may need to meet stronger requirements than for other applications. In particular, their outputs must be unpredictable in the absence of knowledge of the inputs. Some criteria for characterizing and selecting appropriate generators are discussed in this document. The subject of statistical testing and its relation to cryptanalysis is also discussed, and some recommended statistical tests are provided. These tests may be useful as a first step in determining whether or not a generator is suitable for a particular cryptographic application. However, no set of statistical tests can absolutely certify a generator as appropriate for usage in a particular application, i.e., statistical testing cannot serve as a substitute for cryptanalysis. The design and cryptanalysis of generators is outside the scope of this paper. Key words: random number generator, hypothesis test, P-value
Article
By analysis and comparison of several chaotic systems that are applied to generate pseudo-random sequence, the generalized Henon map is proposed as a pseudo-random sequence generator. A new algorithm is created to solve the problem of non-uniform distribution of the sequence generated by the generalized Henon map. First, move the decimal point of elements in the sequence to the right; then, cut off the integer; and finally, quantify it into a binary sequence. Statistical test, security analysis, and the application of image encryption have strongly supported the good random statistical characteristics, high linear complexity, large key space, and great sensitivity of the binary sequence.
Article
The objective was to introduce the plasma physicists at the Institute of Plasma Physics to some of the many concepts and methods which are presently used to describe nonlinear dynamics. These concepts come from a variety of areas, not always familiar to specialists in other areas, and I hope that this introduction will help to broaden their awareness of these concepts, in this increasingly important area of research.
Article
The Data Encryption Standard (DES) is the best known and most widely used cryptosystem for civilian applications. It was developed at IBM and adopted by the National Bureau of Standards in the mid 1970s, and has successfully withstood all the attacks published so far in the open literature. In this paper we develop a new type of cryptanalytic attack which can break the reduced variant of DES with eight rounds in a few minutes on a personal computer and can break any reduced variant of DES (with up to 15 rounds) using less than 256 operations and chosen plaintexts. The new attack can be applied to a variety of DES-like substitution/permutation cryptosystems, and demonstrates the crucial role of the (unpublished) design rules.