Advertisement

Random Sequence Generation Algorithm for Multi-chaotic Systems

  • Xiaodi Chen
  • Hong Wu
Conference paper
Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST, volume 251)

Abstract

The characteristics of chaotic signals, such as pseudorandom and non long term predictability, make it suitable for application to information encryption, digital watermarking and so on. Nevertheless, since the chaotic system is often characterized by its characteristics, attackers can take advantage of these known features to reduce the difficulty of attacks. In contrast, the characteristics of multi-chaotic systems are not uniform, and the complexity of generating sequences is higher than that of single-chaos systems. Hence, the multi-chaotic system increases the security of the sequence to some extent. Therefore, we design a random sequence generation algorithm consisting of multiple chaotic systems that is a chaotic sequence generation algorithm combining Logistic map and Cubic map. And we analyze the sequence of new generation whose the performance, so we can conclude that the new algorithm has better randomness.

Keywords

Multi-chaos system Logistic map Cubic map Chaotic sequence Randomness 

References

  1. 1.
    Vattulainen, I., Kankaala, K.: Physical models as tests of randomness. Phys. Rev. E 52, 3205–3214 (2013)CrossRefGoogle Scholar
  2. 2.
    Li, T.Y., Yorke, J.A.: Entropy and chaos. Adv. Math. 3, 122–128 (2010)Google Scholar
  3. 3.
    Zhang, Y.P., Zuo, F.: A new image encryption algorithm based on multiple chaos system. In: International Symposium on Electronic Commerce and Security, vol. 142, pp. 347–350 (2017)Google Scholar
  4. 4.
    Li, S.J., Cai, Y.L.: Problems with computerized chaos in finite computing precision. Comput. Phys. Commun. 153, 52–55 (2016)CrossRefGoogle Scholar
  5. 5.
    Xue, K.P., Hong, P.L.: Security improvement on an anonymous key agreement protocol based on chaotic maps. Commun. Nonlinear Sci. Number. Simulat. 17, 2969–2977 (2012)MathSciNetCrossRefGoogle Scholar
  6. 6.
    Short, K.M.: Signal extraction from chaotic communications. Int. J. Bifurcat. Chaos 7, 1579–1997 (2010)CrossRefGoogle Scholar
  7. 7.
    Zhai, Y.K., Lin, X.Y.: Improving image encryption using multi-chaotic map. In: Workshop on Power Electronics and Intelligent Transportation System, vol. 106, pp. 143–148 (2015)Google Scholar
  8. 8.
    Habutsu, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991).  https://doi.org/10.1007/3-540-46416-6_11CrossRefGoogle Scholar
  9. 9.
    Alvarez, G., Pastor, G.: Chaotic cryptosystems. IEEE Secur. Technol. 67, 332–338 (2012)Google Scholar
  10. 10.
    Diffie, W., Hellman, M.: New directions in cryptography. IEEE Trans. Inf. Theory 22, 644–654 (2015)MathSciNetCrossRefGoogle Scholar
  11. 11.
    Shannon, C.E.: Communication theory of secrecy systems. Bell Syst. Tech. J. 28, 656–715 (2016)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Kocarev, L.: A brief overview. IEEE Circ. Syst. Mag. 1, 11–21 (2010)Google Scholar
  13. 13.
    Sabery, K.M., Yaghoobi, M.: A new approach for image encryption using chaotic logistic map. In: 2008 International Conference on Advanced Computer Theory and Engineering, vol. 177, pp. 585–590 (2013)Google Scholar
  14. 14.
    Akhavan, A., Samsudin, A.: A symmetric image encryption scheme based on combination of nonlinear chaotic maps. J. Franklin Inst. 348, 1797–1813 (2011)MathSciNetCrossRefGoogle Scholar
  15. 15.
    Lian, S.: Efficient image or video encryption based on spatiotemporal chaos system. Chaos Solitons Fractals 40, 2509–2519 (2014)CrossRefGoogle Scholar

Copyright information

© ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2018

Authors and Affiliations

  1. 1.College of Electronic EngineeringHeilongjiang UniversityHarbinChina

Personalised recommendations