Skip to main content
Log in

Security Analysis and Improvement of the Pseudo-random Number Generator Based on Piecewise Logistic Map

  • Published:
Journal of Electronic Testing Aims and scope Submit manuscript

Abstract

In this paper, a security analysis of the pseudo-random number generator based on piecewise logistic map is made, which reveals the existence of a serious problem. Although the assumed safety of this pseudo-random number generator (PRNG) is estimated at 2136, it is possible to carry out successful brute-force attack whose complexity is about 2103. Furthermore, the attack on the analyzed PRNG based on a known sequence of output bits is presented which can reduce the complexity of the brute-attack to about 295. The examples of both attacks are provided in this paper. For the above mentioned reasons, the analyzed PRNG cannot be considered safe for the use in cryptographic systems. An improved version of the analyzed PRNG is proposed, which can eliminate the perceived shortcomings.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Announcing the advanced encryption standard (AES). Federal Information Processing Standards Publication. 197.2001.2

  2. Akhshani A, Akhavan A, Mobaraki A, Lim S-C, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simulat 19:101–111

    Article  MATH  Google Scholar 

  3. Alvarez G, Amigo JM, Arroyo D, Li S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers Lj Kocarev, Lian S (eds)

  4. Arroyo D, Alvarez G, Amigo JM, Li S (2011) Cryptanalysis of a family of self-synchronizing chaotic stream ciphers. Commun Nonlinear Sci Numer Simul 16:805–813

    Article  MathSciNet  MATH  Google Scholar 

  5. Arroyo D, Amigo JM, Li S, Alvarez G (2010) On the inadequacy of unimodal maps for cryptographic applications. In: Ferrer JD, Balleste AM, Roca JC, Gomez AS (eds) XI Reunion Espanola sobre Criptologa y Seguridad de la Informacion (XI RECSI), Universitat Rovira i Virgili, Tarragona, Spain, pp 37–42, ISBN 978–84–693–3304–4

  6. Ecrypt II yearly report on algorithms and keysizes; 2010. http://www.ecrypt.eu.org/documents/D.SPA.13.pdf

  7. Lambić D (2015) A new discrete chaotic map based on the composition of permutations. Chaos, Solitons & Fractals 78:245–248

    Article  MathSciNet  MATH  Google Scholar 

  8. Lambić D (2017) Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn 89:2255–2257

    Article  Google Scholar 

  9. Lambić D (2018) Security analysis and improvement of the pseudo-random number generator based on quantum chaotic map. Nonlinear Dyn 94:1117–1126

    Article  Google Scholar 

  10. Lambić D (2018) Security analysis of the efficient chaos pseudo-random number generator applied to video encryption. J Electron Test 34:709–715

    Article  Google Scholar 

  11. Lambić D (2018) Security analysis of the pseudo-random bit generator based on multi-modal maps. Nonlinear Dyn 91:505–513

    Article  MathSciNet  Google Scholar 

  12. Li C, Li S, Lo KT (2011) Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837–843

    Article  MathSciNet  MATH  Google Scholar 

  13. Li CQ, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78(2):1545–1551

    Article  Google Scholar 

  14. Liu Y, Fan H, Xie EY, Cheng G, Li C (2015) Deciphering an image cipher based on mixed transformed logistic maps. Int J Bifurcation Chaos 25(13):1550188

    Article  MathSciNet  MATH  Google Scholar 

  15. Lorenz EN (1963) Deterministic non-periodic flow. J Atmos Sci 20(2):130–141

    Article  MATH  Google Scholar 

  16. May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261:459–465

    Article  MATH  Google Scholar 

  17. Persohn K, Povinelli R (2012) Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos Solitons & Fractals 45(3):238–245

    Article  Google Scholar 

  18. Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887–1892

    Article  MathSciNet  MATH  Google Scholar 

  19. Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication pp 800–22

  20. Schneier B (1996) Applied Cryptography. Wiley, New York

    MATH  Google Scholar 

  21. Skrobek A (2008) Approximation of a chaotic orbit as a cryptanalytical method on Baptista’s cipher. Phys Lett A 372(6):849–859

    Article  MATH  Google Scholar 

  22. Wang Y, Liu Z, Ma J, He H (2016) A pseudorandom number generator based on piecewise logistic map. Nonlinear Dyn 83:2373–2391

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dragan Lambić.

Ethics declarations

Conflict of interests

The author declares that he has no conflict of interest.

Additional information

Responsible Editor: S. Bhunia

Publisher’s Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lambić, D. Security Analysis and Improvement of the Pseudo-random Number Generator Based on Piecewise Logistic Map. J Electron Test 35, 519–527 (2019). https://doi.org/10.1007/s10836-019-05818-8

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10836-019-05818-8

Keywords

Navigation