A novel pseudo-random sequence generator for cryptographic applications using logistic map variants with dynamic thresholding




##plugins.themes.academic_pro.article.main##
Author
-
Tho Nguyen VanThe University of Danang - VN-UK Institute for Research and Executive Education, VietnamDung Le DinhThe University of Danang - VN-UK Institute for Research and Executive Education, VietnamTung Dam MinhThe University of Danang - VN-UK Institute for Research and Executive Education, VietnamPhong Nguyen ThanhThe University of Danang - VN-UK Institute for Research and Executive Education, VietnamBao Ngoc Do ThanhDuy Tan University, Vietnam
Từ khóa:
Tóm tắt
This paper presents an innovative approach for generating pseudo-random sequences for cryptographic applications, utilizing a modified logistic map and a dynamic thresholding mechanism. The generator is defined in terms of a logistic map, where the logistic function value is decomposed into binary values based on a dynamic threshold. A dynamic thresholding technique is introduced to convert the continuous chaotic outputs into binary sequences, ensuring better balance and reduced bias. Analytical and experimental evaluations show that this approach enhances the randomness of the generated sequences while maintaining simplicity and efficiency. Its lightweight nature and high efficiency make it especially suitable for resource-constrained environments such as IoT devices, where secure and efficient cryptographic solutions are critical. The combination of chaotic systems and dynamic thresholding showcases the potential of this approach as a lightweight, efficient, and secure solution for cryptographic sequence generation in modern applications.
Tài liệu tham khảo
-
[1] B. Qi, Y.-M. Chi, H.-K. Lo, and L. Qian, “High-speed quantum random number generation by measuring phase noise of a single-mode laser,” Optics Communications, vol. 325, pp. 165–169, 2010.
[2] M. Bucci et al., “A high-speed IC random-number source for smartcard microcontrollers,” IEEE Trans. Circuits Syst. I: Reg. Papers, vol. 50, no. 11, pp. 1373–1380, Nov. 2003.
[3] C. S. Petrie and J. A. Connelly, “A noise-based IC random number generator for applications in cryptography,” IEEE Trans. Circuits Syst. I: Fundam. Theory Appl., vol. 47, no. 5, pp. 615–621, May 2000.
[4] C. E. Shannon, “Communication theory of secrecy systems,” Bell System Technical Journal, vol. 28, no. 4, pp. 656–715, 1949.
[5] B. M. Gammel, R. Gottfert, and O. Kniffler, “An NLFSR-based stream cipher,” in Proc. IEEE Int. Symp. Circuits Syst. (ISCAS), Kos, Greece, 2006, pp. 2920–2924, doi: 10.1109/ISCAS.2006.1693235.
[6] P. Kumari and B. Mondal, “Lightweight encryption with data and device integrity using NLFSR and PUF for the Internet of Medical Things,” Internet of Things, vol. 25, p. 101041, 2023, doi: 10.1016/j.iot.2023.101041.
[7] NIST, “Recommendation for random number generation using deterministic random bit generators,” NIST Special Publication 800-90A, 2015.
[8] E. Barker, J. Kelsey, and N. Ferguson, “SP 800-90A: Recommendation for random number generation using deterministic random bit generators,” NIST, 2012.
[9] D. Bernstein, T. Lange, and R. Niederhagen, “Dual EC: A Standardized Back Door,” in Cryptography and Security: From Theory to Practice, Springer, 2016, pp. 347–366, doi: 10.1007/978-3-662-49301-4_17.
[10] S. Windarta et al., “Lightweight cryptographic hash functions: Design trends, comparative study, and future directions,” IEEE Access, vol. 10, pp. 82272–82294, 2022, doi: 10.1109/ACCESS.2022.3195572.
[11] R. Kuang et al., “Pseudo quantum random number generator,” in Proc. IEEE Quantum Computing and Engineering Conf. (QCE), 2021, doi: 10.1109/QCE52317.2021.00053.
[12] E. N. Lorenz, “Deterministic Nonperiodic Flow,” Journal of Atmospheric Sciences, vol. 20, no. 2, pp. 130–148, Mar. 1963.
[13] T. N. Van et al., “A method for fast synchronization of chaotic systems and its application to chaos-based secure communication,” J. Sci. Technol. - Univ. Danang, vol. 20, no. 12.2, pp. 1–5, Dec. 2022, doi: 10.31130/ud-jst.2022.541ICT.
[14] G. Alvarez and S. Li, “Some basic cryptographic requirements for chaos-based cryptosystems,” Int. J. Bifurcation Chaos, vol. 16, no. 8, pp. 2129–2151, 2006.
[15] M. Saikia and B. Baruah, “Chaotic map-based image encryption in spatial domain: A brief survey,” in Proc. Int. Conf. Cryptography and Security Applications, 2017, pp. 578–591.
[16] R. Lan et al., “A parameter-selection-based chaotic system,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 65, no. 11, pp. 1796–1800, Nov. 2018, doi: 10.1109/TCSII.2018.2865255.
[17] V. Kumar and A. Girdhar, “A 2D logistic map and Lorenz-Rossler chaotic system-based RGB image encryption approach,” Multimedia Tools Appl., vol. 80, no. 3, pp. 3749–3773, Jan. 2021, doi: 10.1007/s11042-020-09854-x.
[18] T. Stojanovski and L. Kocarev, “Chaos-based random number generators—Part I: Analysis,” IEEE Trans. Circuits Syst. I: Fundam. Theory Appl., vol. 48, no. 3, pp. 281–288, Mar. 2001.
[19] A. Altameem et al., “A hybrid AES with a chaotic map-based biometric authentication framework for IoT and Industry 4.0,” Systems, vol. 11, no. 1, pp. 1–28, Jan. 2023, doi: 10.3390/systems11010028.
[20] H. Ming et al., “A high-performance hybrid random number generator based on a nondegenerate coupled chaos and its practical implementation,” Nonlinear Dynamics, vol. 111, pp. 1083–1096, 2022, doi: 10.1007/s11071-022-07838-0.
[21] T. Hossain et al., “The Internet of Things (IoT): Applications, investments, and challenges for enterprises,” Int. J. Multidisciplinary Research, vol. 6, no. 1, 2024, doi: 10.36948/ijfmr.2024.v06i01.22699.
[22] L. Xu, W. He, and S. Li, “Internet of Things in industries: A survey,” IEEE Trans. Industrial Informatics, vol. 10, pp. 2233–2243, 2014, doi: 10.1109/TII.2014.2300753.
[23] Statista Research Department, “Number of connected IoT devices worldwide 2015–2030,” Statista, 2023. [Online]. Available: https://www.statista.com/statistics/802690/worldwide-connected-devices-by-access-technology/ [Accessed: Nov. 19, 2024].
[24] J. Mohanty et al., “IoT security, challenges, and solutions: A review,” in Handbook of Big Data Technologies, Springer, 2021, pp. 593–615, doi: 10.1007/978-981-15-6353-9_46.
[25] R. Roman, P. Najera, and J. Lopez, “Securing the Internet of Things,” Computer Communications, vol. 57, pp. 1–13, Mar. 2018, doi: 10.1016/j.comcom.2014.12.008.
[26] P. Olubudo, “Cybersecurity Challenges in the Internet of Things (IoT): Analyzing Vulnerabilities and Proposing Solutions for Securing IoT Devices and Networks,” Obafemi Awolowo University, May 2024. [Online]. Available: ResearchGate. [Accessed: Nov. 19, 2024].
[27] D. Sumit, B. Singh, and P. Jindal, “Lightweight cryptography: A solution to secure IoT,” Wireless Personal Communications, vol. 112, pp. 1–34, 2020, doi: 10.1007/s11277-020-07134-3.
[28] R. Shaltiel, “An introduction to randomness extractors,” in Foundations of Cryptography: Volume II, Springer, 2011, pp. 21–41, doi: 10.1007/978-3-642-22012-8_2.
[29] M. Azrour et al., “Internet of Things security: Challenges and key issues,” Security and Communication Networks, vol. 2021, pp. 1–14, 2021, doi: 10.1155/2021/5533843.
[30] M. Chetto, S. El Assad, and M. Farajallah, “A lightweight chaos-based cryptosystem for dynamic security management in real-time overloaded applications,” Int. J. Internet Technology and Secured Transactions, vol. 5, no. 4, pp. 262–275, 2014, doi: 10.1504/IJITST.2014.065187.
[31] N. Gunathilake, A. Al-Dubai, and W. Buchanan, “Recent advances and trends in lightweight cryptography for IoT security,” in Proc. Int. Conf. Communication and Networking Systems, 2020, pp. 1–9, doi: 10.23919/CNSM50824.2020.9269083.
[32] S.-M. Fu, Z.-Y. Chen, and Y.-A. Zhou, “Chaos-based random number generators,” in Proc. IEEE Conf. Circuits and Systems, vol. 41, pp. 749–754, 2004.
[33] A. Banerjee, S. Bose, and S. Das, “Parameter sensitivity and improvements in chaos-based PRNGs,” Chaos Theory and Applications, vol. 7, no. 2, pp. 34–50, Apr. 2018.
[34] W. E. H. Youssef et al., “A secure chaos-based lightweight cryptosystem for the Internet of Things,” IEEE Access, vol. 11, pp. 123279–123294, 2023, doi: 10.1109/ACCESS.2023.3326476.
[35] T. Stojanovski and L. Kocarev, “Chaos-based random number generators—Part II: Applications,” IEEE Trans. Circuits Syst. I: Fundam. Theory Appl., vol. 48, no. 4, pp. 389–395, Apr. 2001.