95
Views
2
CrossRef citations to date
0
Altmetric
Original Articles

Design and FPGA Implementation of a Pseudo Random Bit Generator Using Chaotic Maps

, &
Pages 63-73 | Published online: 01 Sep 2014

References

  • M E Yalcin, J A Suykens, and J Vandewalle, “A double scroll based true random bit generator” Circuits and Systems, 2004. ISCAS ‘04’. Proceedings of the 2004 International Symposium on, Vol 4, p. IV-581-4,23-26-May 2004.
  • X Wang, and C Yu, “Cryptanalysis and improvement on a cryptosystem based on a chaotic map”, Computers and Mathematics with Applications (2008), Elsevier, Vol 57, Issue 3, pp. 476–82, Feb. 2009.
  • A J Menezes, P C van Orschot, and S A Vanstone, “Handbook of Aplied Cryptography”, ISBN/ASIN: 0849385237, USA, Publisher.CRC, 1996-10-16.
  • K T Alligood, T D Sauer, and J A Yorke, “Chaos: An Introduction to Dynamical Systems”, Textbooks in Mathematical Sciences, NewYork, NY, USA, Springer; 1997.
  • Y Mao, L Cao, and W Liu, “Design and FPGA Implementation of a Pseudo-Random Bit Sequence Generator Using Spatiotemporal Chaos”, International conference on communication, circuit and system proceeding, Vol. 3, pp. 2114–8, 2006.
  • T Stojanovski, and T Kocarev, “Chaos-based random number generators-part I: Analysis”, IEEE Trans. Circuits and Systems I: Fundamental Theory and Applications, Vol. 48, No.3, pp. 281–8, 2001.
  • G Alvarez, and S Li, “Some basic cryptographic requirements for chaos based cryptosystems”, International Journal of Bifurcation and Chaos Vol. 16, pp. 2129–51, 2006.
  • A Rukhin, J Soto, J Nechvatal, M Smid, E Barker, and S Leigh, et al. Statistical test suite for random and pseudo random number generators for cryptographic applications, NIST special publication 800-22.131 pages, available from: http://www.nist.gov, [Last assessed on August 2008].
  • L Kocarev, “Chaos-based cryptography: A brief overview”. IEEE Circuits and Systems Magazine, Vol. 1, no.3, pp. 6–21, 2001.
  • T Stojanovski, J Pihl, and L Kocarev, “Chaos-based random number generators-part II: Practical realization”, IEEE Trans. Circuits and Systems I: Fundamental Theory and Applications, Vol. 48, no.3, pp. 382–5, 2001.
  • M Andrecut, “Logistic map as a random number generator”, International Journal of Modern Physics B, Vol. 12, no.9, pp. 921–30, 1998.
  • G Alvarez, L Hern’andez, F Montoya, and J Mũnoz, “Cryptanalysis of a novel cryptosystem based on chaotic oscillators and feedback inversion,” J. Sound Vibrat. Vol. 275.pp. 423–30, 2004a.
  • T Addabbo, M Alioto, A Fort, S Rocchi, and S Vignoli, “The Digital Tent Map: Performance Analysis and Optimized Design as a Low-Complexity Source of Pseudorandom Bits”, IEEE, Transactions on instrumentation and measurement, Vol. 55, pp. 1451–8, Oct 2006.
  • S Ergun, and S Ozõguz, “Truly random number generators based on non-autonomous continuous-time chaos”, international journal of circuit theory and applications, 2008.
  • V Patidar, and K K Sud, “A Novel Pseudo Random Bit Generator Based on Chaotic Standard Map and its Testing”, Electronic Journal of Theoretical Physics, Vol. 6, no. 20, pp. 327–44, Feb. 2009.
  • J Oyama, and S Kawamoto, “Generation of Pseudo-Random Numbers by Chaos-Type Function and Its Application to Cryptosystems”, Translated from Denki GakkaiRonbunshi, Vol. 125-C, No. 11, pp. 1715–21, Nov. 2005.
  • C Y Li, J S Chen, and T Y Chang, “A Chaos-Based Pseudo Random Number Generator Using Timing-Based Reseeding Method”, Circuits and Systems, ISCAS, Proceedings. IEEE, Vol. 4. pp-3280, 2006.
  • V Patidar, and K K Sud, “A Pseudo Random Bit Generator Based on Chaotic Logistic Map and its Statistical Testing”, Informatica Vol. 33 pp. 441–52, 2009.
  • R H Brown, “Security requirements for cryptographic modules”, federal information processing standards publication, 11Jan. 1994.
  • G Alvarez, L Hernandez, J Mũnoz, F Montoya, and S Li, “Security analysis of communication system based on the synchronization of different order chaotic systems,” Vol. 345, no. 4–6, pp. 245–50, 2005.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.