The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this study a numerical cryptanalysis of a random number generator (RNG) which is built on a continuous-time chaotic oscillator is introduced. In order to scrutinize the security weaknesses of the RNG, a master-slave synchronization approach is presented as the basis of an attack scheme. By proposing this attack scheme, it is aimed to verify whether there exist any possibility to divulge the hidden...
In this work, numerical cryptanalysis of a random number generator (RNG) designed using a continuous time chaotic oscillator is presented. For the purpose of examining the vulnerabilities of the RNG, a master-slave synchronization approach was presented as a basis for an attack scheme. By suggesting this attack scheme, we intend to verify whether there is the possibility of revealing the secret information...
In this article, cryptanalysis and improvement of a chaos-based random number generator (RNG) are described. An attack system was proposed to explore the security weaknesses of the chaos-based RNG. The convergence of the attack system has been proven using the scheme of master-slave synchronization. Future evaluation of the RNG was derived from a scalar time series where the only available information...
This paper is on the security of a true random bit generator (RBG) based on a double-scroll attractor. A clone system is proposed to analyze the security weaknesses of the RBG and its convergence is proved using master slave synchronization scheme. All secret parameters of the RBG are revealed where the only information available are the structure of the RBG and a scalar time series observed from...
This paper presents an algebraic attack on a chaos-based “true” random bit generator (RBG). A clone system is proposed to analyze the security weaknesses of the RBG and its convergence is proved using master slave synchronization scheme. Secret parameters of the RBG are revealed where the only information available are the structure of the RBG and a scalar time series observed from the chaotic oscillator...
Based on a generalized synchronization (GS) theorem of non-autonomous discrete chaotic systems, this paper introduces a 6-dimensional non-autonomous discrete chaotic GS system. Simulations show that the trajectories of the GS system have significant characteristics of chaotic attractor. Using the GS system designs a 216 number string chaotic pseudorandom number generator (CPRNG). SP-800 randomness...
This paper introduce a novel 3-dimensional discrete chaotic map. The calculated Lyapunov exponents of the map are 1.1638, 0.8946 and -0.2177. Numerical simulations show that the dynamic behaviors of the map have chaotic attractor characteristics. Based on the chaotic map and a chaos generalized synchronization (GS) theorem, a 6-dimensional chaotic GS system is constructed. Using the chaotic GS system...
In this paper, a novel 3-dimensional discrete chaotic system is introduced. The calculated Lyapunov exponents of the system are 1.0287, 0.024615 and −0.58505. Numerical simulations show that the dynamic behaviors of the chaotic system have chaotic attractor characteristics. Based on the chaotic system and a chaos generalized synchronization (GS) theorem, a 6-dimensional chaotic generalized synchronic...
Based on a stream encryption scheme with avalanche effect, this paper introduces a block encryption scheme with avalanche effect (BESAE), gives the definition of ideal block pseudo random number generators (BPRNG). Using any key stream generated by an ideal 2d word BPRNG with different seed to decrypt the ciphertext encrypted via the ideal BPRNG and the BESAE will generate an avalanche-liked text...
In this paper, a study of the effects on using a different number of control signals in the synchronization of multi-directional multi-scroll chaos generators is presented. We adopt Generalized Hamiltonian forms approach to synchronize two 3D multi-scroll chaotic attractors. First, it is used only one state-variable (x, y, z) from the master system in order to control only one nonlinear function in...
Abstract-based on a constructive theorem of generalized synchronization (GS) for discrete-time chaos system (DTCS), a GS DTCS is constructed via a Henon-like map. A new DTCS-based pseudorandom number generator (PNG) is introduced. The FIPS 140-2 randomness tests show that the PNG has good pseudo-randomness. Combining the DTCS and the PNG, an image encryption scheme with digital signature is established...
Based on the two-dimensional Arnold's cat map, and a generalized chaos synchronization (GCS) theorem, this paper presents a new six-dimensional discrete chaos map (6DCM) with GCS property. A chaos-based pseudorandom number generator (CPNG) is designed based on the 6DCM. We use the FIPA-140-2 tests issued by the National Institute of Standard and Technology to verify the random properties of the binary...
In this study, the synchronization of the master-slave systems has been achieved and implemented on Field Programmable Gate Array (FPGA). In this paper, the master system and the slave system have been chosen as Lorenz and Rossler systems, respectively. The feedback control rule has been derived by feedback linearization method. By feedback linearization, the coordinate transformation has been achieved...
This paper introduces random number generators based on hybrid cellular automata (HCA). It is shown that by properly mixing CA cells from two categories (two different rules) an automaton generating near maximal length pseudo-random sequences can be easily obtained. The resulting system is similar to the well-known linear feedback shift register (LFSR) but in addition it posses the binary synchronization...
In this paper we propose a new system for achieving synchronization in asynchronous multi-user chaos-based DS-CDMA. The synchronization is made through a binary code used as a pilot signal and the chaotic signal used as spreading data sequence. The study of this process is evaluated under the assumption of an additive white Gaussian noise channel. The probability of detection and probability of false...
According to the specified standard of airborne Photogrammetry, digital airborne cameras must have higher performance than ordinary civil cameras, which must shoot with shorter time interval and will generate huge data stream. In this paper, a digital airborne camera is designed and implemented in a single FPGA chip as a SOPC approach. The functions of image acquisition, storage and display are implemented...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.