Professional Documents
Culture Documents
net/publication/336804491
CITATIONS READS
0 31
5 authors, including:
SEE PROFILE
Some of the authors of this publication are also working on these related projects:
All content following this page was uploaded by Borislav Stoyanov on 28 October 2019.
© 2019 Author(s).
Two Zaslavsky Maps in Pseudorandom Byte Generation
B. Stoyanova) , M. Todorovab) , T. Ivanovac) , G. Borboryand) and A. Hasanove)
Abstract. We present a novel, two Zaslavsky maps based pseudorandom byte formation function. We evaluated output data theo-
retically and tested by NIST and ENT statistical suites. The results of the cryptographic analysis show that the output bytes behave
like an ideal random source.
INTRODUCTION
Pseudorandom number generators are important cryptographic primitives in the area of contemporary image encryp-
tion algorithms, stream cipher constructions, and software simulations. Chaotic maps play significant role in this kind
of algorithms. They provide more power in security requirements.
Reference [1] proposes shrinking generator based on 1-D piecewise chaotic map. Bent boolean function deci-
mates Rössler map in [2]. In [3], a novel Circle map based pseudorandom generation scheme, is presented.
A novel byte-oriented keystream algorithm is proposed in [4]. By using a linear feedback shift register with byte-
oriented mixer with memories, byte sequences are generated. In [5], a novel cipher architecture which generates one
byte per clock cycle is designed.
Inspired of [6], [7], and [8], the study proposes a novel pseudorandom byte generator based of two Zaslavsky
maps and a combining function.
where
1 − e−r
µ= , (3)
r
r = 3.0, ν = 400/3, and ϵ = 0.3. The Zaslavsky map is plotted in Figure 1.
Sensitivity to initial conditions are shown in Figure 2, where t is discrete time and
√
D = (yn+1 − yn )2 + (zn+1 − zn )2 .
120013-1
0.002
0.001
z
-0.001
-0.002
where µ is from Eq. (3) and y1,0 , z1,0 , y2,0 , and z2,0 , are floating point numbers.
1. The starting values y1,0 , z1,0 , y2,0 , and z2,0 and an output stream length are determined.
2. The first Zaslavsky map (Eq.(4) and Eq.(5)) is iterated initially for L times. The second Zaslavsky map (Eq.(6)
and Eq.(7)) is iterated initially for M times.
3. The iteration of the Zaslavsky maps continue, and four floating-point numbers y1,0 , z1,0 , y2,0 , and z2,0 , are gen-
erated and post-processed as follows:
where integer(x) returns the integer part of x, truncating the value at the decimal point, abs(x) returns the
absolute value of x, and mod(x, y) returns the reminder after division. Four bytes si , s j , ti , and t j , are obtained.
4. Perform XOR operations: between si , s j , ti , and t j , a = si ⊕ s j ⊕ ti ⊕ t j . Output byte a is generated.
5. Return to Step 3 until the byte stream length is reached.
The proposed steps are written directly in C++, using the initial values: y1,0 = −0.19234589676, z1,0 =
0.212944478569, y2,0 = −0.23873247817, z2,0 = 0.189800800800, L = 1042, and M = 273.
120013-2
1
lg D
-1
-2
-3
0 10 20 30 40 50
SECURITY ANALYSIS
Statistical tests
The statistical security tests are based on the statistical packages NIST [15] and ENT [16].
The NIST statistical application includes 15 statistical tests: frequency (monobit), block-frequency, cumulative
sums, runs, longest run of ones, rank, Fast Fourier Transform (spectral), non-overlapping templates, overlapping
templates, Maurer’s “Universal Statistical”, approximate entropy, serial, linear complexity, random excursions, and
random-excursion variant. 2000 × 125000 bytes were processed using the novel scheme. The output results of the
first 13 test are tabulated in Table 2. The minimum pass rate for each statistical test with the exception of the random
excursion (variant) test is approximately = 1966 for a sample size = 2000 binary sequences.
120013-3
The minimum pass rate for the random excursion (variant) test is approximately = 1217 for a sample size = 1240
binary sequences. The random excursion (variant) test outputs 18 randomness probability values: P-values and they
are tabulated in Table 3. The random excursion test outputs 8 P-values which are tabulated in Table 4.
The novel pseudorandom bit generator passed successfully NIST tests.
The ENT software includes 6 tests to pseudorandom sequences. We tested output of 250000000 bytes of the
proposed generator:
120013-4
TABLE 4. NIST Random excursion test
results.
State P-value Pass rate
-4 0.782587 1229/1240
-3 0.023213 1227/1240
-2 0.894779 1226/1240
-1 0.596885 1223/1240
+1 0.242986 1227/1240
+2 0.762288 1229/1240
+3 0.522810 1223/1240
+4 0.413802 1225/1240
ACKNOWLEDGMENTS
The paper is partially supported of the National Scientific Program “Information and Communication Technologies
for a Single Digital Market in Science, Education and Security (ICTinSES)”, financed by the Ministry of Education
and Science. This work partially is supported by the Bulgarian Ministry of Education and Science under the National
Program for Research “Young Scientists and Postdoctoral Students”.
REFERENCES
[1] A. Kanso and N. Smaoui (2009) International Journal of Bifurcation and Chaos 19, 1169–1183.
[2] B. Stoyanov, K. Szczypiorski, and K. Kordov (2017) International Journal of Electronics and Telecommuni-
cations 63, 195–199.
[3] B. Stoyanov, “Using circle map in pseudorandombit generation,” in AMiTaNS’14, AIP CP1629, edited by M.
D. Todorov (American Institute of Physics, Melville, NY, 2014), pp. 460–463.
[4] D. Feng, X. Feng, W. Zhang, X. Fan, and C. Wu, “Loiss: A byte-oriented stream cipher,” in Coding and
Cryptology, Y. M. Chee, Zh. Guo et al (Springer, Berlin-Heidelberg, 2011) pp.109–125.
[5] S. Sen Gupta, K. Sinha, S. Maitra, and Bh. P. Sinha, “One Byte per Clock: A Novel RC4 Hardware,” in
Progress in Cryptology - INDOCRYPT 2010, G. Gong and K. Ch. Gupta (eds) (Springer, Berlin-Heidelberg,
2010), pp. 347–363.
[6] B. Stoyanov and K. Kordov (2014) Applied Mathematical Sciences 8, 8883–8887.
[7] K. Kordov (2015) Applied Mathematical Sciences 9(3), 129–135.
[8] B. Stoyanov (2014) Applied Mathematical Sciences 8, 6205–6210.
[9] G. Zaslavsky (1978) Physics Letters A69, 145–147.
[10] IEEE Std 754-2008 1–70 (2008).
[11] G. Alvarez and S. Li (2006) International Journal of Bifurcation and Chaos 16, 2129–2151.
[12] K. Kordov and B. Stoyanov (2017) International Journal of Electronics and Telecommunications 63, 417–
422.
120013-5
[13] G. Chen, Y. Mao, and C. K. Chui (2004) Chaos, Solitons & Fractals 21, 749–761.
[14] S. Lian, J. Sun, J. Wang, and Z. Wang (2007) Chaos, Solitons & Fractals 34, 851–859.
[15] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A.
Heckert, J. Dray, and S. Vo, A Statistical Test Suite for Random and Pseudorandom Number Generators for
Cryptographic Application (NIST Special Publication 800-22: Revision 1a, Lawrence E. Bassham III, 2010).
[16] J. Walker, ENT: A pseudorandom number sequence test program, 2008.
[17] K. Kordov and L. Bonchev (2017) Mathematical and Software Engineering 3, 183–189.
[18] H. Paraskevov and A. Stefanov (2018) Mathematical and Software Engineering 4, 7–11.
[19] A. Tasheva, Zh. Tasheva, P. Nakov, “Image based steganography using modified LSB insertion method with
contrast stretching,” in Proc. of the 18th International Conf. on Computer Systems and Technologies, Comp-
SysTech’17, Ruse, Bulgaria, (ACM, NY, USA, 2017), pp. 233–240.
120013-6
View publication stats