2021
DOI: 10.11591/eei.v10i3.2610
|View full text |Cite
|
Sign up to set email alerts
|

A new pseudorandom bits generator based on a 2D-chaotic system and diffusion property

Abstract: A remarkable correlation between chaotic systems and cryptography has been established with sensitivity to initial states, unpredictability, and complex behaviors. In one development, stages of a chaotic stream cipher are applied to a discrete chaotic dynamic system for the generation of pseudorandom bits. Some of these generators are based on 1D chaotic map and others on 2D ones. In the current study, a pseudorandom bit generator (PRBG) based on a new 2D chaotic logistic map is proposed that runs side-by-side… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 29 publications
0
10
0
Order By: Relevance
“…To protect the values of the neighbor pixels from attackers any ciphered algorithm must be reduced the correlation between adjacent pixels [29]. The suggested scheme resists the statistical attackers by making the correlation closer to zero concerning the original image the correlation coefficient was calculated for both ciphered and original images of horizontally, diagonally, and vertically adjacent pixels.…”
Section: Correlation Coefficient Testmentioning
confidence: 99%
“…To protect the values of the neighbor pixels from attackers any ciphered algorithm must be reduced the correlation between adjacent pixels [29]. The suggested scheme resists the statistical attackers by making the correlation closer to zero concerning the original image the correlation coefficient was calculated for both ciphered and original images of horizontally, diagonally, and vertically adjacent pixels.…”
Section: Correlation Coefficient Testmentioning
confidence: 99%
“…Studied the state of controlled synchronization between the Van Der Pol oscillator as master and the Chua's circuit as a slave system. The concurrence of the Chua circuit with another oscillator is elaborated by different researchers [9]. Hou et al offered a model to evaluate the other Van Der Pol's parameter examined.…”
Section: Literature Reviewmentioning
confidence: 99%
“…There are many chaotic communication systems that were proposed at the beginning of the focus on this type of secure communication for information transmission such as including chaotic masking, the information is mixed with the carrier chaotic signal using a nonlinear mixer [5], [6]. The chaotic demeanor of effective systems can be applied in numerous realism implementations like engineering, microbiology, biology, encryption, random generation, modeling of different electrical, laser, mechanical oscillators, washer machines, physics, robotics, mathematics, economics, philosophy, meteorology, computer science, pseudorandom bit generator, Rikitake chaotic system, artificial neural networks, and civil engineering [7]- [9].…”
Section: Introductionmentioning
confidence: 99%
“…The protection of data from unauthorized access, disclosure, alteration, or destruction while ensuring confidentiality, integrity, and availability is very important to information security [1]. As there are unknown risks, threats, and vulnerabilities, there is no 100% guaranteed security [1]- [4]. Cryptography is used to keep data secure while it is in transit (electronic or physical).…”
Section: Introductionmentioning
confidence: 99%