2020
DOI: 10.3390/electronics9010104
|View full text |Cite
|
Sign up to set email alerts
|

Pseudorandom Number Generator (PRNG) Design Using Hyper-Chaotic Modified Robust Logistic Map (HC-MRLM)

Abstract: Robust chaotic systems, due to their inherent properties of mixing, ergodicity, and larger chaotic parameter space, constitute a perfect candidate for cryptography. This paper reports a novel method to generate random numbers using modified robust logistic map (MRLM). The non-smooth probability distribution function of robust logistic map (RLM) trajectories gives an un-even binary distribution in randomness test. To overcome this disadvantage in RLM, control of chaos (CoC) is proposed for smooth probability di… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
19
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 29 publications
(19 citation statements)
references
References 45 publications
0
19
0
Order By: Relevance
“…Several works related to the PRNG design have been proposed; for example, there are strategies that implement PRNGs using linear feedback shift registers (LFSR) [1][2][3][4][5], while other strategies are based on block cipher [6], stream cipher [7], quantum walks [8], cellular automata [9,10], chaotic oscillators and artificial neural networks (ANN) [11], or chaotic maps [12][13][14][15]. There are also PRNG design approaches that combine several of the above strategies [16].…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Several works related to the PRNG design have been proposed; for example, there are strategies that implement PRNGs using linear feedback shift registers (LFSR) [1][2][3][4][5], while other strategies are based on block cipher [6], stream cipher [7], quantum walks [8], cellular automata [9,10], chaotic oscillators and artificial neural networks (ANN) [11], or chaotic maps [12][13][14][15]. There are also PRNG design approaches that combine several of the above strategies [16].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, many cryptographic systems and modules have been proposed based on chaotic systems [22][23][24][25][26][27][28][29][30][31][32][33]. In particular, chaotic maps have been successfully applied in the implementation of PRNGs [14,15,31,[34][35][36][37][38][39][40][41][42].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The resulting map presents more complex chaos related phenomena compared to the classic map as mentioned above, as well as achieves a higher value for its Lyapunov exponent. Furthermore, to showcase the applicability of the map to chaos related applications, the problems of pseudo random bit generation [ 4 , 5 , 10 , 11 , 13 , 29 , 30 , 31 , 32 , 33 , 34 , 35 , 36 , 37 , 38 , 39 , 40 , 41 , 42 , 43 ] and image encryption [ 4 , 7 , 9 , 14 , 15 , 33 , 35 , 39 , 44 , 45 , 46 , 47 , 48 ] are considered. It is seen that the bit sequence generated from the modified map using a simple rule passes all 15 tests of the National Institute of Standards and Technology (NIST) statistical test suite [ 49 ].…”
Section: Introductionmentioning
confidence: 99%