•A novel chaotic system named as UT-CCS is proposed to generate new chaotic maps with excellent performance. A feasible way on how to select UTFs in UT-CCS to generate preferable chaotic maps is ...discussed.•A new chaos-based pseudo-random number generator (CBPRNG) with good randomness is proposed.•A novel digital image encryption algorithm based on CBPRNG is designed and tested.
Chaotic maps are very important for establishing chaos-based image encryption systems. This paper introduces a coupling chaotic system based on a certain unit transform, which can combine any two 1D chaotic maps to generate a new one with better performance in cryptography applications. The chaotic behavior analysis has verified this coupling system’s effectiveness and progress. In particular, we give a specific strategy about selecting an appropriate unit transform function to enhance the chaotic behaviors of generated maps. Besides, a new chaos-based pseudo-random number generator, shorted as CBPRNG, is designed to improve the randomness of chaotic sequences. Moreover, based on CBPRNG, a novel digital image encryption algorithm is introduced, where we design a two-way multi-round transformation network to encrypt the higher bits and lower bits of input images separately. Simulation results and security analysis indicate that the proposed image encryption scheme is competitive with some existing methods.
A new 4D chaotic system with self-excited attractors or hidden attractors is designed and the generation of self-excited attractors and hidden attractors depends on the parameters of the new 4D ...chaotic system. The detailed dynamical properties of the designed new 4D chaotic system have been vividly demonstrated in terms of phase portraits, bifurcation diagrams, and Lyapunov exponents. When fixing the system parameters and changing the initial value, different kinds of coexisting asymmetric attractors are discovered in the new 4D chaotic system. Besides, the corresponding analog electronic circuit of the 4D chaotic system is designed and implemented to verify its feasibility, concurrently the random number generator and an image encryption algorithm based on the designed new 4D chaotic system are provided. Then the effectiveness of the image encryption system is verified by some basic security analysis.
•A new 4D chaotic system with hidden or self-excited attractors is designed.•The chaotic system can produce hidden coexisting asymmetric attractors.•The circuit of the 4D chaotic system is implemented.•Random number generator and image encryption algorithm with this system are provided.
In multiple applications, from Statistics to Particle Physics and notably in Cryptography and Computer Security, it is necessary to obtain long sequences of random numbers. In order to verify the ...properties of these sequences, different statistical tests are commonly applied, which are usually included in the so-called test batteries or test suites. The batteries need to be both effective and efficient. Their effectiveness relates to how well they can spot non-randomness behaviour, the efficiency is related to the computational time they require. It is therefore essential for tests included in batteries to measure their independence features: Test independence is important for good effectiveness, as high correlations between tests could lead to a decreased efficiency (testing for the same features multiple times) and effectiveness (missing an opportunity to test for an orthogonal randomness property when we essentially measure the same twice). Moreover, the related study of test coverage is often based on the assumption that tests are independent. This paper describes a series of experiments aimed at scrutinizing dependencies among the statistical tests in the NIST SP 800-22 suite. In order to do so, sequences of varying lengths from sources of varying entropy have been generated and tested. Afterwards, an inferential study was carried out to find whether significant correlations exist and to present our findings in a statistically sound way.
The design of a low-cost low-power ring oscillator-based truly random number generator (TRNG) macrocell, which is suitable to be integrated in smart cards, is presented. The oscillator sampling ...technique is exploited, and a tetrahedral oscillator with large jitter has been employed to realize the TRNG. Techniques to improve the statistical quality of the ring oscillatorbased TRNGs' bit sequences have been presented and verified by simulation and measurement. A postdigital processor is added to further enhance the randomness of the output bits. Fabricated in the HHNEC 0.13-μm standard CMOS process, the proposed TRNG has an area as low as 0.005 mm 2 . Powered by a single 1.8-V supply voltage, the TRNG has a power consumption of 40 μW. The bit rate of the TRNG after postprocessing is 100 kb/s. The proposed TRNG has been made into an IP and successfully applied in an SD card for encryption application. The proposed TRNG has passed the National Institute of Standards and Technology tests and Diehard tests.
•A new chaotic system is developed for creating S-Box and image encryption algorithm.•Chaos based random number generator is designed with the help of the new chaotic system. NIST tests are run on ...generated random numbers to verify randomness.•A new S-Box design algorithm is developed to create the chaos based S-Box to be utilized in encryption algorithm and performance tests are made.•The new developed S-Box based image encryption algorithm is introduced and image encryption application is carried out.•To show the quality and strong of the encryption process, security analysis are performed and compared with the AES and chaos algorithms.
In this study, an encryption algorithm that uses chaos based S-BOX is developed for secure and speed image encryption. First of all, a new chaotic system is developed for creating S-Box and image encryption algorithm. Chaos based random number generator is designed with the help of the new chaotic system. Then, NIST tests are run on generated random numbers to verify randomness. A new S-Box design algorithm is developed to create the chaos based S-Box to be utilized in encryption algorithm and performance tests are made. As the next step, the new developed S-Box based image encryption algorithm is introduced in detail. Finally, image encryption application is carried out. To show the quality and strong of the encryption process, security analysis are performed. Proposed algorithm is compared with the AES and chaos algorithms. According to tests results, the proposed image encryption algorithm is secure and speed for image encryption application.
The subject matter of the article is pseudo-random number generators. Random numbers play the important role in cryptography. Using not secure pseudo-random number generators is a very common ...weakness. It is also a fundamental resource in science and engineering. There are algorithmically generated numbers that are similar to random distributions but are not random, called pseudo-random number generators. In many cases the tasks to be solved are based on the unpredictability of random numbers, which cannot be guaranteed in the case of pseudo-random number generators, true randomness is required. In such situations, we use real random number generators whose source of randomness is unpredictable random events. Quantum Random Number Generators (QRNGs) generate real random numbers based on the inherent randomness of quantum measurements. The goal is to develop a mathematical model of the generator, which generates fast random numbers at a lower cost. At the same time, a high level of randomness is essential. Through quantum mechanics, we can obtain true numbers using the unpredictable behavior of a photon, which is the basis of many modern cryptographic protocols. It is essential to trust cryptographic random number generators to generate only true random numbers. This is why certification methods are needed which will check both the operation of the device and the quality of the random bits generated. The goal of the research is also to develop the model of a hybrid semi self-testing certification method for quantum random number generators (QRNG). The tasks to be solved are to create the mathematical model of a random number generator, which generates the fast random numbers at a lower cost. To create the mathematical model of a hybrid semi self-testing certification method for quantum random number generators. To integrate a hybrid semi self-testing certification method to the hybrid random number generator. the methods used are mathematical optimization and simulation. The following results were obtained: we present the improved hybrid quantum random number generator, which is based on QRNG, which uses the time of arrival of photons. The model of a hybrid semi self-testing certification method for quantum random number generators (QRNG) is offered in the paper. This method combines different types of certification approaches and is rather secure and efficient. Finally, the hybrid certification method is integrated into the model of the new quantum random number generator. Conclusions. The scientific novelty of the results obtained is as follows: 1. The hybrid quantum random number generator is offered, which is based on QRNG, which uses the time of the arrival of photons. It uses the simple version of the detectors with few requirements. The hybrid QRNG produces more than one random bit per the detection of each photon. It is rather efficient and has a high level of randomness. 2. The hybrid semi self-testing certification method for quantum random number generators (QRNG) is offered. The Self-testing, as well as device-independent quantum random number generation methods, are analyzed. The advantages and disadvantages of both methods are identified. Based on the result the hybrid method is offered. 3. The hybrid semi self-testing certification method for quantum random number generators is integrated into the offered model of the quantum random number generator. The paper analyzes its security and efficiency. The paper offers to use the new random number generator in the crypto-schemes.
Abstract One of the successful practical applications of chaos theory and nonlinear dynamics is chaos-based cryptology studies. In this study, a new chaotic system is proposed. The proposed chaotic ...system generator model has a simple algorithmic structure. In addition to, generated chaotic systems have rich dynamics. It has been examined whether this system has potential advantages, especially for information security applications. As a result of the analysis and experimental studies, it is seen that the study makes many contributions to the literature. The simple mathematical generator structure has the potential to reduce computational complexity, which is an important problem for cryptology applications. One of the most comprehensive studies has been realized for chaos-based substitution box designs. 70,000 different substitution box structures have been generated. It has been known that the highest nonlinearity value that can be achieved for designs that transform chaotic system outputs into substitution box structures is 106.75 today. It has been shown that this value may be higher. The new highest nonlinearity value is calculated as 107. Side channel analysis has been examined for substitution box structures with the highest nonlinearity value among the substitution boxes generated in the study. Analysis results show that the proposed new substitution box structures may have an advantage for application-oriented attacks. Among the generated substitution box structures, 289 substitution box structures with a nonlinearity value of 106 and above are presented as a public dataset for researchers to use. In addition, 3 different random sequences with a length of 1 million-bit were produced with the proposed map, and the NIST SP 800–22 test was applied. Test results for all datasets were successful. In this way, the proposed map can also be used as a random number generator.
Chaotic dynamics is widely used to design pseudo-random number generators and for other applications, such as secure communications and encryption. This paper aims to study the dynamics of the ...discrete-time chaotic maps in the digital (i.e., finite-precision) domain. Differing from the traditional approaches treating a digital chaotic map as a black box with different explanations according to the test results of the output, the dynamical properties of such chaotic maps are first explored with a fixed-point arithmetic, using the Logistic map and the Tent map as two representative examples, from a new perspective with the corresponding state-mapping networks (SMNs). In an SMN, every possible value in the digital domain is considered as a node and the mapping relationship between any pair of nodes is a directed edge. The scale-free properties of the Logistic map's SMN are proved. The analytic results are further extended to the scenario of floating-point arithmetic and for other chaotic maps. Understanding the network structure of a chaotic map's SMN in digital computers can facilitate counteracting the undesirable degeneration of chaotic dynamics in finite-precision domains, also helping to classify and improve the randomness of pseudo-random number sequences generated by iterating the chaotic maps.
Present paper introduces a polynomial combination of one dimensional chaotic maps that is blended in a dynamic image encryption algorithm. It is special because not only this combination has ...butterfly folding effect but also it shows generalization property over any polynomial combination. Hence, the butterfly folding effect is caused by governed parameters of polynomial combination. Moreover, multiple simulations and evaluations show the superiority of the proposed chaotic system. An application of this system, which we propose in cryptography, is a novel image encryption algorithm based on dynamic function generation. Compared to the state of the art algorithms, our image encryption algorithm has higher statistical and cryptanalytic properties. Even though this algorithm is not suitable for real-time applications such as streaming video encryption, it makes a good use of the proposed chaotic system. Uppermost cryptanalytic properties that are proven by statistical/numeric tests show good performance and reliability of proposed algorithm for image encryption tasks while unlike any other chaotic image encryption system, our algorithm uses a string input for secret key.