Skip to main content
Log in

Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map

  • Original Paper
  • Published:
Nonlinear Dynamics Aims and scope Submit manuscript

Abstract

In this paper, a security analysis of the novel pseudorandom number generator based on pseudorandomly enhanced logistic map is made, which reveals the existence of serious security problem. Although the assumed safety of this pseudorandom number generator (PRNG) is estimated at \(2^{128}\), it is possible to carry out successful brute-force attack with the complexity of about \(2^{70}\). For this reason, analyzed PRNG cannot be considered safe for the use in cryptographic systems.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Xie, E.Y., Li, C., Yu, S., Lu, J.: On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 132, 150–154 (2017)

    Article  Google Scholar 

  2. Lambic, D.: Security analysis and improvement of a block cipher with dynamic S-boxes based on tent map. Nonlinear Dyn. 79, 2531–2539 (2015)

    Article  MathSciNet  Google Scholar 

  3. Murillo-Escobar, M.A., Cruz-Hernandez, C., Cardoza-Avendano, L., Mendez-Ramirez, R.: A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn. 87, 407–425 (2017)

    Article  MathSciNet  Google Scholar 

  4. Zhao, B., Qi, C.: Chaotic signal generator design based on discrete system. J. Inf. Hiding Multimed. Signal Process. 7(1), 50–58 (2016)

    Google Scholar 

  5. Alvarez, G., Amigo, J.M., Arroyo, D., Li, S.: Lessons learnt from the cryptanalysis of chaos-based ciphers. In: Kocarev, Lj, Lian, S. (eds.) Chaos-Based Cryptography: Theory, Algorithms and Applications, pp. 257–295. Springer, Berlin (2011)

    Chapter  Google Scholar 

  6. Li, C.Q., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)

    Article  Google Scholar 

  7. Ulam, S.M., von Neumann, J.: On combination of stochastic and deterministic processes. Bull. Am. Math. Soc. 53(11), 1120 (1947)

    Google Scholar 

  8. Phatak, S.C., Rao, S.S.: Logistic map: a possible random-number generator. Phys. Rev. E 51(4), 3670–3678 (1995)

    Article  Google Scholar 

  9. Baptista, M.: Cryptography with chaos. Phys. Lett. A 240(1C2), 50–54 (1998)

    Article  MathSciNet  MATH  Google Scholar 

  10. Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Phys. Lett. A 289(4–5), 199–206 (2001)

    Article  MathSciNet  MATH  Google Scholar 

  11. Patidar, V., Pareek, N., Sud, K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3056–3075 (2009)

    Article  Google Scholar 

  12. You, L., Wang, J., Yan, B.: A secure finger vein recognition algorithm based on MB-GLBP and logistic mapping. J. Inf. Hiding Multimed. Signal Process. 7(6), 1231–1242 (2016)

    Google Scholar 

  13. Li, S., Li, C., Chen, G., Lo, K.T.: Cryptanalysis of the RCES/RSES image encryption scheme. J. Syst. Softw. 81(7), 1130–1143 (2008)

    Article  Google Scholar 

  14. Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simul. 15(7), 1887–1892 (2010)

    Article  MathSciNet  MATH  Google Scholar 

  15. Li, C., Li, S., Lo, K.T.: Breaking a modified substitution diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 837–843 (2011)

    Article  MathSciNet  MATH  Google Scholar 

  16. Persohn, K., Povinelli, R.: Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos Solitons Fractals 45(3), 238–245 (2012)

    Article  Google Scholar 

  17. Liu, Y., Fan, H., Xie, E.Y., Cheng, G., Li, C.: Deciphering an image cipher based on mixed transformed logistic maps. Int. J. Bifurc. Chaos 25(13), 1550188 (2015)

    Article  MathSciNet  MATH  Google Scholar 

  18. Schneier, B.: Applied Cryptography. Wiley, New York (1996)

    MATH  Google Scholar 

  19. Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16, 2129–2151 (2006)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Dragan Lambić.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Lambić, D. Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn 89, 2255–2257 (2017). https://doi.org/10.1007/s11071-017-3583-1

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11071-017-3583-1

Keywords

Navigation