Chaos-based Pseudo-Random Number Generators and Chip Implementation

Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today's ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic ps...

Full description

Saved in:
Bibliographic Details
Published inIFAC Proceedings Volumes Vol. 38; no. 1; pp. 1090 - 1094
Main Authors Li, Zhong, Li, Ping, Mao, Yaobin, Halang, W.A.
Format Journal Article
LanguageEnglish
Published 2005
Subjects
Online AccessGet full text
ISSN1474-6670
DOI10.3182/20050703-6-CZ-1902.00838

Cover

Abstract Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today's ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic pseudo-random number generators (CPRNGs) for stream cipher and their chip implementation. The properties of the proposed CPRNG are analyzed.
AbstractList Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today's ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic pseudo-random number generators (CPRNGs) for stream cipher and their chip implementation. The properties of the proposed CPRNG are analyzed.
Author Mao, Yaobin
Halang, W.A.
Li, Ping
Li, Zhong
Author_xml – sequence: 1
  givenname: Zhong
  surname: Li
  fullname: Li, Zhong
  email: zhong.li@fernuni-hagen.de
  organization: Faculty of Electrical and Computer Engineering Fern Universität in Hagen, 58084 Hagen, Germany
– sequence: 2
  givenname: Ping
  surname: Li
  fullname: Li, Ping
  organization: Faculty of Electrical and Computer Engineering Fern Universität in Hagen, 58084 Hagen, Germany
– sequence: 3
  givenname: Yaobin
  surname: Mao
  fullname: Mao, Yaobin
  organization: Department of Automation Nanjing University of Science and Technology Nanjing 210094, P. R. China
– sequence: 4
  givenname: W.A.
  surname: Halang
  fullname: Halang, W.A.
  organization: Faculty of Electrical and Computer Engineering Fern Universität in Hagen, 58084 Hagen, Germany
BookMark eNqNkM1KAzEUhbOoYK19h3mB1JtkJpluBB20FoqK6KabkJ87NNCZlGQq-Pa2VjdudHXgwvm457sgoz72SEjBYCZYza84QAUKBJW0WVM2Bz4DqEU9ImNWqpJKqeCcTHMOFriqGK8qNSZNszExU2sy-uI5495H-mJ6H7vicd9ZTMUCe0xmiCkXh3vRbMKuWHa7LXbYD2YIsb8kZ63ZZpx-54S83d-9Ng909bRYNjcr6rgQA-VWyTl6YTnHunWmrNxcVKJsreDSWA-iBgQlHTLfltbWAqRwbTlXrDSyasWE1CeuSzHnhK3epdCZ9KEZ6KMD_eNAS92s9dGB_nJwqF7_qrpwen5IJmz_A7g9AfAw8D1g0tkF7B36kNAN2sfwN-QTgBJ7oQ
CitedBy_id crossref_primary_10_1109_ACCESS_2019_2956573
crossref_primary_10_23939_ictee2023_02_020
Cites_doi 10.1002/j.1538-7305.1949.tb00928.x
10.1016/S0010-4655(01)00220-X
10.1109/81.557386
10.1103/PhysRevLett.64.821
10.1016/S0375-9601(98)00086-3
10.1023/A:1009652616706
ContentType Journal Article
Copyright 2005 IFAC
Copyright_xml – notice: 2005 IFAC
DBID AAYXX
CITATION
DOI 10.3182/20050703-6-CZ-1902.00838
DatabaseName CrossRef
DatabaseTitle CrossRef
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
EndPage 1094
ExternalDocumentID 10_3182_20050703_6_CZ_1902_00838
S1474667016368501
GroupedDBID ALMA_UNASSIGNED_HOLDINGS
OK1
AAYXX
CITATION
ID FETCH-LOGICAL-c233t-2b769ed3b22e8fca45c93534fb326abd0380e076ce1df4bb83063cf49714a65f3
ISSN 1474-6670
IngestDate Wed Oct 29 21:11:23 EDT 2025
Thu Apr 24 23:01:08 EDT 2025
Thu Aug 18 14:36:18 EDT 2022
IsPeerReviewed false
IsScholarly false
Issue 1
Keywords chip implementation
cryptography
chaos
Chaos-based pseudo-random number generator (CPRNG)
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c233t-2b769ed3b22e8fca45c93534fb326abd0380e076ce1df4bb83063cf49714a65f3
PageCount 5
ParticipantIDs crossref_primary_10_3182_20050703_6_CZ_1902_00838
crossref_citationtrail_10_3182_20050703_6_CZ_1902_00838
elsevier_sciencedirect_doi_10_3182_20050703_6_CZ_1902_00838
PublicationCentury 2000
PublicationDate 2005
2005-00-00
PublicationDateYYYYMMDD 2005-01-01
PublicationDate_xml – year: 2005
  text: 2005
PublicationDecade 2000
PublicationTitle IFAC Proceedings Volumes
PublicationYear 2005
References Baptista (bib1) 1998; 240
Frey (bib2) 1993; 40
Kotulski, Szczepanski (bib3) 2000
Shannon (bib6) 1949; 28
Pecora, Carroll (bib4) 1990; 64
Schneier (bib5) 1996
Szczepanski, Kotulski (bib7) 2000; 7
NIST, National Institute of Standards and Technology (2001), Federal Information Processing Standards Publication FIPS PUB 140-2: Security requirements for Cryptographic Modules, May 25
Wong, Lee, Wong (bib8) 2001; 138
Zhou, Ling (bib9) 1997; 44
Baptista (10.3182/20050703-6-CZ-1902.00838_bib1) 1998; 240
Kotulski (10.3182/20050703-6-CZ-1902.00838_bib3) 2000
Schneier (10.3182/20050703-6-CZ-1902.00838_bib5) 1996
10.3182/20050703-6-CZ-1902.00838_bib10
Pecora (10.3182/20050703-6-CZ-1902.00838_bib4) 1990; 64
Szczepanski (10.3182/20050703-6-CZ-1902.00838_bib7) 2000; 7
Zhou (10.3182/20050703-6-CZ-1902.00838_bib9) 1997; 44
Frey (10.3182/20050703-6-CZ-1902.00838_bib2) 1993; 40
Shannon (10.3182/20050703-6-CZ-1902.00838_bib6) 1949; 28
Wong (10.3182/20050703-6-CZ-1902.00838_bib8) 2001; 138
References_xml – volume: 138
  start-page: 1932
  year: 2001
  end-page: 1934
  ident: bib8
  article-title: “A modified chaotic cryptographic method,”
  publication-title: Computer Physics Communications
– volume: 40
  start-page: 660
  year: 1993
  end-page: 666
  ident: bib2
  article-title: “Chaotic digital encoding: an approach to secure communication,”
  publication-title: IEEE Trans. Circuits and Systems – II
– volume: 64
  start-page: 821
  year: 1990
  end-page: 824
  ident: bib4
  article-title: “Synchronization in chaotic systems,”
  publication-title: Physical Review Letters
– volume: 7
  start-page: 1
  year: 2000
  end-page: 10
  ident: bib7
  article-title: “Chaotic pseudorandom numbers generators based on chaotic dynamical systems,”
  publication-title: Open Sys. And Information Dyn.
– volume: 44
  start-page: 268
  year: 1997
  end-page: 271
  ident: bib9
  article-title: “Problems with the chaotic inverse system encryption approach,”
  publication-title: IEEE Trans. Circuits and Systems – I
– volume: 240
  start-page: 50
  year: 1998
  end-page: 54
  ident: bib1
  article-title: “Cryptography with chaos,”
  publication-title: Physics Letters A
– start-page: 191
  year: 2000
  end-page: 203
  ident: bib3
  article-title: “On constructive approach to chaotic pseudorandom number generators,”
  publication-title: RCMCIS'2000
– year: 1996
  ident: bib5
  publication-title: Applied Cryptography – Protocols, algorithms, and source code in C
– reference: NIST, National Institute of Standards and Technology (2001), Federal Information Processing Standards Publication FIPS PUB 140-2: Security requirements for Cryptographic Modules, May 25
– volume: 28
  start-page: 656
  year: 1949
  end-page: 715
  ident: bib6
  article-title: “Communication theory of secrecy systems,”
  publication-title: Bell Syst. Tech. J.
– year: 1996
  ident: 10.3182/20050703-6-CZ-1902.00838_bib5
– start-page: 191
  year: 2000
  ident: 10.3182/20050703-6-CZ-1902.00838_bib3
  article-title: “On constructive approach to chaotic pseudorandom number generators,”
  publication-title: RCMCIS'2000
– volume: 28
  start-page: 656
  year: 1949
  ident: 10.3182/20050703-6-CZ-1902.00838_bib6
  article-title: “Communication theory of secrecy systems,”
  publication-title: Bell Syst. Tech. J.
  doi: 10.1002/j.1538-7305.1949.tb00928.x
– volume: 138
  start-page: 1932
  year: 2001
  ident: 10.3182/20050703-6-CZ-1902.00838_bib8
  article-title: “A modified chaotic cryptographic method,”
  publication-title: Computer Physics Communications
  doi: 10.1016/S0010-4655(01)00220-X
– volume: 44
  start-page: 268
  issue: 3
  year: 1997
  ident: 10.3182/20050703-6-CZ-1902.00838_bib9
  article-title: “Problems with the chaotic inverse system encryption approach,”
  publication-title: IEEE Trans. Circuits and Systems – I
  doi: 10.1109/81.557386
– volume: 64
  start-page: 821
  issue: 8
  year: 1990
  ident: 10.3182/20050703-6-CZ-1902.00838_bib4
  article-title: “Synchronization in chaotic systems,”
  publication-title: Physical Review Letters
  doi: 10.1103/PhysRevLett.64.821
– ident: 10.3182/20050703-6-CZ-1902.00838_bib10
– volume: 240
  start-page: 50
  year: 1998
  ident: 10.3182/20050703-6-CZ-1902.00838_bib1
  article-title: “Cryptography with chaos,”
  publication-title: Physics Letters A
  doi: 10.1016/S0375-9601(98)00086-3
– volume: 40
  start-page: 660
  issue: 10
  year: 1993
  ident: 10.3182/20050703-6-CZ-1902.00838_bib2
  article-title: “Chaotic digital encoding: an approach to secure communication,”
  publication-title: IEEE Trans. Circuits and Systems – II
– volume: 7
  start-page: 1
  year: 2000
  ident: 10.3182/20050703-6-CZ-1902.00838_bib7
  article-title: “Chaotic pseudorandom numbers generators based on chaotic dynamical systems,”
  publication-title: Open Sys. And Information Dyn.
  doi: 10.1023/A:1009652616706
SSID ssib027512557
ssib036250806
ssib001723113
ssib001723112
ssib046627245
ssib028086724
Score 1.3446411
Snippet Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today's ubiquitous Internet communication,...
SourceID crossref
elsevier
SourceType Enrichment Source
Index Database
Publisher
StartPage 1090
SubjectTerms chaos
Chaos-based pseudo-random number generator (CPRNG)
chip implementation
cryptography
Title Chaos-based Pseudo-Random Number Generators and Chip Implementation
URI https://dx.doi.org/10.3182/20050703-6-CZ-1902.00838
Volume 38
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVAFT
  databaseName: Open Access Digital Library
  issn: 1474-6670
  databaseCode: KQ8
  dateStart: 20020101
  customDbUrl:
  isFulltext: true
  dateEnd: 20141231
  titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html
  omitProxy: true
  ssIdentifier: ssib027512557
  providerName: Colorado Alliance of Research Libraries
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELagXLigIkAUSpUDt8rLJnZsR5xWUauCaAWohbKXyK-oSG1StdsLv54Zx5tkYVFLL9GuJU92PaOZb8bzIOQtpj7ZWhsqrBGU59pS5cBrdQbQv1aCmxRrhw-PxMEJ_3ianw55uqG6ZGEm9tfaupL7cBXWgK9YJfsfnO2JwgJ8Bv7CEzgMzzvxuDzT7TVFQ-RAk_kb19KvunHtxe5RGPQRm0qHgToYIC8xMyv0A76IJUfNGJx-2J-VXeVAsGjXu9-C6upR96dw8z8_a6O165c-_xxWDnUIvv7QWFg26LfzGJf-PplNViIN-UgtcsmpEN2Ij6XeZOov-eiUIOZ6jgwqfOXrlDVoE2z-im9CvUMFLecU8Al2UFWR-Ep_7D_sVp9NCH4M0qqWlCpRlfMKKVWB0kPyKMNoDV7ZfxndEUrAtgOYySRgn3y4A84UeHty6GUPlh7A7HAnzbF1fhamYPfH06WK4Y9596-_tR7_jDDN8SZ5Ep2RZNZJ1lPywDfPSDmSqmRFqpJOqpJBqhJYT1CqklWpek5O9veOywMaR21QmzG2oJmRovCOmSzzqraa57ZgOeO1AXivjZsyNfVTKaxPXc2NUeBpMlvzQqZci7xmL8hG0zb-JUmssKlThnlVOJ5NvZIsL7z1yjMGYNFsEbk8gMrGPvQ4DuW8uo2PWyTtd152vVjusOf98oyriCk7rFiBFN66-9U93viaPA7tfUOYbptsLK5u_BsArguzE-TvNzEuhHE
linkProvider Colorado Alliance of Research Libraries
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Chaos-based+Pseudo-Random+Number+Generators+and+Chip+Implementation&rft.jtitle=IFAC+Proceedings+Volumes&rft.au=Li%2C+Zhong&rft.au=Li%2C+Ping&rft.au=Mao%2C+Yaobin&rft.au=Halang%2C+W.A.&rft.date=2005&rft.issn=1474-6670&rft.volume=38&rft.issue=1&rft.spage=1090&rft.epage=1094&rft_id=info:doi/10.3182%2F20050703-6-CZ-1902.00838&rft.externalDBID=n%2Fa&rft.externalDocID=10_3182_20050703_6_CZ_1902_00838
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1474-6670&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1474-6670&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1474-6670&client=summon