当前位置: X-MOL 学术Concurr. Comput. Pract. Exp. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Generation of chaotic random binary sequences for cryptographic applications
Concurrency and Computation: Practice and Experience ( IF 2 ) Pub Date : 2021-07-26 , DOI: 10.1002/cpe.6497
Sheela S. 1 , Sathyanarayana S. V. 1
Affiliation  

In stream cipher systems, random key sequence generation is the primary task. The concept of chaotic systems can be considered in generating a random key sequence due to its inherent randomness property. Though the chaotic real sequences are random, the randomness will be lost after converting them to binary sequences. In this context, the authors propose a technique which uses a non-linear feedback system to enhance the randomness of the binary sequences. In this work, three binary chaotic sequences using a logistic map are generated with three different initial conditions and each real value of the chaotic sequence is converted to ‘k’ bit binary value using a thresholding function. Some of the resulting sequences are not random. Hence, in this article a non-linear structure is used to make the resulting sequence random. Here, a non-linear function similar to the structure of the Simplified Data Encryption Standard is used to generate a sequence using two non-random chaotic binary sequences. The resulting sequence is XORed with another non-random chaotic binary sequence to get a random sequence. Sequences obtained from this nonlinear system are subjected to randomness tests and the results indicate that the sequences pass all the randomness tests. Hence, the sequences qualify as random key sequences, which can be used in a stream cipher based system to encrypt the data samples like audio, image, video, and so forth.

中文翻译:

为密码应用生成混沌随机二进制序列

在流密码系统中,随机密钥序列的生成是首要任务。由于其固有的随机性,在生成随机密钥序列时可以考虑混沌系统的概念。混沌实序列虽然是随机的,但将其转换为二进制序列后,随机性就会丢失。在这种情况下,作者提出了一种使用非线性反馈系统来增强二进制序列随机性的技术。在这项工作中,使用逻辑映射生成三个二进制混沌序列,具有三个不同的初始条件,混沌序列的每个实际值都使用阈值函数转换为“k”位二进制值。一些结果序列不是随机的。因此,在本文中,使用非线性结构使结果序列随机化。这里,类似于简化数据加密标准的结构的非线性函数用于使用两个非随机混沌二进制序列生成序列。得到的序列与另一个非随机混沌二进制序列进行异或得到一个随机序列。对该非线性系统得到的序列进行随机性测试,结果表明序列通过了所有的随机性测试。因此,这些序列符合随机密钥序列的要求,可以在基于流密码的系统中使用它来加密音频、图像、视频等数据样本。对该非线性系统得到的序列进行随机性测试,结果表明序列通过了所有的随机性测试。因此,这些序列符合随机密钥序列的要求,可以在基于流密码的系统中使用它来加密音频、图像、视频等数据样本。对该非线性系统得到的序列进行随机性测试,结果表明序列通过了所有的随机性测试。因此,这些序列符合随机密钥序列的要求,可以在基于流密码的系统中使用它来加密音频、图像、视频等数据样本。
更新日期:2021-07-26
down
wechat
bug