Abstract
In this paper, a security analysis of the novel pseudorandom number generator based on pseudorandomly enhanced logistic map is made, which reveals the existence of serious security problem. Although the assumed safety of this pseudorandom number generator (PRNG) is estimated at \(2^{128}\), it is possible to carry out successful brute-force attack with the complexity of about \(2^{70}\). For this reason, analyzed PRNG cannot be considered safe for the use in cryptographic systems.
Similar content being viewed by others
References
Xie, E.Y., Li, C., Yu, S., Lu, J.: On the cryptanalysis of Fridrich’s chaotic image encryption scheme. Signal Process. 132, 150–154 (2017)
Lambic, D.: Security analysis and improvement of a block cipher with dynamic S-boxes based on tent map. Nonlinear Dyn. 79, 2531–2539 (2015)
Murillo-Escobar, M.A., Cruz-Hernandez, C., Cardoza-Avendano, L., Mendez-Ramirez, R.: A novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn. 87, 407–425 (2017)
Zhao, B., Qi, C.: Chaotic signal generator design based on discrete system. J. Inf. Hiding Multimed. Signal Process. 7(1), 50–58 (2016)
Alvarez, G., Amigo, J.M., Arroyo, D., Li, S.: Lessons learnt from the cryptanalysis of chaos-based ciphers. In: Kocarev, Lj, Lian, S. (eds.) Chaos-Based Cryptography: Theory, Algorithms and Applications, pp. 257–295. Springer, Berlin (2011)
Li, C.Q., Xie, T., Liu, Q., Cheng, G.: Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn. 78(2), 1545–1551 (2014)
Ulam, S.M., von Neumann, J.: On combination of stochastic and deterministic processes. Bull. Am. Math. Soc. 53(11), 1120 (1947)
Phatak, S.C., Rao, S.S.: Logistic map: a possible random-number generator. Phys. Rev. E 51(4), 3670–3678 (1995)
Baptista, M.: Cryptography with chaos. Phys. Lett. A 240(1C2), 50–54 (1998)
Kocarev, L., Jakimoski, G.: Logistic map as a block encryption algorithm. Phys. Lett. A 289(4–5), 199–206 (2001)
Patidar, V., Pareek, N., Sud, K.: A new substitution-diffusion based image cipher using chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 14(7), 3056–3075 (2009)
You, L., Wang, J., Yan, B.: A secure finger vein recognition algorithm based on MB-GLBP and logistic mapping. J. Inf. Hiding Multimed. Signal Process. 7(6), 1231–1242 (2016)
Li, S., Li, C., Chen, G., Lo, K.T.: Cryptanalysis of the RCES/RSES image encryption scheme. J. Syst. Softw. 81(7), 1130–1143 (2008)
Rhouma, R., Solak, E., Belghith, S.: Cryptanalysis of a new substitution-diffusion based image cipher. Commun. Nonlinear Sci. Numer. Simul. 15(7), 1887–1892 (2010)
Li, C., Li, S., Lo, K.T.: Breaking a modified substitution diffusion image cipher based on chaotic standard and logistic maps. Commun. Nonlinear Sci. Numer. Simul. 16, 837–843 (2011)
Persohn, K., Povinelli, R.: Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos Solitons Fractals 45(3), 238–245 (2012)
Liu, Y., Fan, H., Xie, E.Y., Cheng, G., Li, C.: Deciphering an image cipher based on mixed transformed logistic maps. Int. J. Bifurc. Chaos 25(13), 1550188 (2015)
Schneier, B.: Applied Cryptography. Wiley, New York (1996)
Alvarez, G., Li, S.: Some basic cryptographic requirements for chaos-based cryptosystems. Int. J. Bifurc. Chaos 16, 2129–2151 (2006)
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Lambić, D. Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn 89, 2255–2257 (2017). https://doi.org/10.1007/s11071-017-3583-1
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11071-017-3583-1