Chaos-based Pseudo-Random Number Generators and Chip Implementation
Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today's ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic ps...
Saved in:
| Published in | IFAC Proceedings Volumes Vol. 38; no. 1; pp. 1090 - 1094 |
|---|---|
| Main Authors | , , , |
| Format | Journal Article |
| Language | English |
| Published |
2005
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 1474-6670 |
| DOI | 10.3182/20050703-6-CZ-1902.00838 |
Cover
| Abstract | Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today's ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic pseudo-random number generators (CPRNGs) for stream cipher and their chip implementation. The properties of the proposed CPRNG are analyzed. |
|---|---|
| AbstractList | Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today's ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic pseudo-random number generators (CPRNGs) for stream cipher and their chip implementation. The properties of the proposed CPRNG are analyzed. |
| Author | Mao, Yaobin Halang, W.A. Li, Ping Li, Zhong |
| Author_xml | – sequence: 1 givenname: Zhong surname: Li fullname: Li, Zhong email: zhong.li@fernuni-hagen.de organization: Faculty of Electrical and Computer Engineering Fern Universität in Hagen, 58084 Hagen, Germany – sequence: 2 givenname: Ping surname: Li fullname: Li, Ping organization: Faculty of Electrical and Computer Engineering Fern Universität in Hagen, 58084 Hagen, Germany – sequence: 3 givenname: Yaobin surname: Mao fullname: Mao, Yaobin organization: Department of Automation Nanjing University of Science and Technology Nanjing 210094, P. R. China – sequence: 4 givenname: W.A. surname: Halang fullname: Halang, W.A. organization: Faculty of Electrical and Computer Engineering Fern Universität in Hagen, 58084 Hagen, Germany |
| BookMark | eNqNkM1KAzEUhbOoYK19h3mB1JtkJpluBB20FoqK6KabkJ87NNCZlGQq-Pa2VjdudHXgwvm457sgoz72SEjBYCZYza84QAUKBJW0WVM2Bz4DqEU9ImNWqpJKqeCcTHMOFriqGK8qNSZNszExU2sy-uI5495H-mJ6H7vicd9ZTMUCe0xmiCkXh3vRbMKuWHa7LXbYD2YIsb8kZ63ZZpx-54S83d-9Ng909bRYNjcr6rgQA-VWyTl6YTnHunWmrNxcVKJsreDSWA-iBgQlHTLfltbWAqRwbTlXrDSyasWE1CeuSzHnhK3epdCZ9KEZ6KMD_eNAS92s9dGB_nJwqF7_qrpwen5IJmz_A7g9AfAw8D1g0tkF7B36kNAN2sfwN-QTgBJ7oQ |
| CitedBy_id | crossref_primary_10_1109_ACCESS_2019_2956573 crossref_primary_10_23939_ictee2023_02_020 |
| Cites_doi | 10.1002/j.1538-7305.1949.tb00928.x 10.1016/S0010-4655(01)00220-X 10.1109/81.557386 10.1103/PhysRevLett.64.821 10.1016/S0375-9601(98)00086-3 10.1023/A:1009652616706 |
| ContentType | Journal Article |
| Copyright | 2005 IFAC |
| Copyright_xml | – notice: 2005 IFAC |
| DBID | AAYXX CITATION |
| DOI | 10.3182/20050703-6-CZ-1902.00838 |
| DatabaseName | CrossRef |
| DatabaseTitle | CrossRef |
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc |
| EndPage | 1094 |
| ExternalDocumentID | 10_3182_20050703_6_CZ_1902_00838 S1474667016368501 |
| GroupedDBID | ALMA_UNASSIGNED_HOLDINGS OK1 AAYXX CITATION |
| ID | FETCH-LOGICAL-c233t-2b769ed3b22e8fca45c93534fb326abd0380e076ce1df4bb83063cf49714a65f3 |
| ISSN | 1474-6670 |
| IngestDate | Wed Oct 29 21:11:23 EDT 2025 Thu Apr 24 23:01:08 EDT 2025 Thu Aug 18 14:36:18 EDT 2022 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Issue | 1 |
| Keywords | chip implementation cryptography chaos Chaos-based pseudo-random number generator (CPRNG) |
| Language | English |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c233t-2b769ed3b22e8fca45c93534fb326abd0380e076ce1df4bb83063cf49714a65f3 |
| PageCount | 5 |
| ParticipantIDs | crossref_primary_10_3182_20050703_6_CZ_1902_00838 crossref_citationtrail_10_3182_20050703_6_CZ_1902_00838 elsevier_sciencedirect_doi_10_3182_20050703_6_CZ_1902_00838 |
| PublicationCentury | 2000 |
| PublicationDate | 2005 2005-00-00 |
| PublicationDateYYYYMMDD | 2005-01-01 |
| PublicationDate_xml | – year: 2005 text: 2005 |
| PublicationDecade | 2000 |
| PublicationTitle | IFAC Proceedings Volumes |
| PublicationYear | 2005 |
| References | Baptista (bib1) 1998; 240 Frey (bib2) 1993; 40 Kotulski, Szczepanski (bib3) 2000 Shannon (bib6) 1949; 28 Pecora, Carroll (bib4) 1990; 64 Schneier (bib5) 1996 Szczepanski, Kotulski (bib7) 2000; 7 NIST, National Institute of Standards and Technology (2001), Federal Information Processing Standards Publication FIPS PUB 140-2: Security requirements for Cryptographic Modules, May 25 Wong, Lee, Wong (bib8) 2001; 138 Zhou, Ling (bib9) 1997; 44 Baptista (10.3182/20050703-6-CZ-1902.00838_bib1) 1998; 240 Kotulski (10.3182/20050703-6-CZ-1902.00838_bib3) 2000 Schneier (10.3182/20050703-6-CZ-1902.00838_bib5) 1996 10.3182/20050703-6-CZ-1902.00838_bib10 Pecora (10.3182/20050703-6-CZ-1902.00838_bib4) 1990; 64 Szczepanski (10.3182/20050703-6-CZ-1902.00838_bib7) 2000; 7 Zhou (10.3182/20050703-6-CZ-1902.00838_bib9) 1997; 44 Frey (10.3182/20050703-6-CZ-1902.00838_bib2) 1993; 40 Shannon (10.3182/20050703-6-CZ-1902.00838_bib6) 1949; 28 Wong (10.3182/20050703-6-CZ-1902.00838_bib8) 2001; 138 |
| References_xml | – volume: 138 start-page: 1932 year: 2001 end-page: 1934 ident: bib8 article-title: “A modified chaotic cryptographic method,” publication-title: Computer Physics Communications – volume: 40 start-page: 660 year: 1993 end-page: 666 ident: bib2 article-title: “Chaotic digital encoding: an approach to secure communication,” publication-title: IEEE Trans. Circuits and Systems – II – volume: 64 start-page: 821 year: 1990 end-page: 824 ident: bib4 article-title: “Synchronization in chaotic systems,” publication-title: Physical Review Letters – volume: 7 start-page: 1 year: 2000 end-page: 10 ident: bib7 article-title: “Chaotic pseudorandom numbers generators based on chaotic dynamical systems,” publication-title: Open Sys. And Information Dyn. – volume: 44 start-page: 268 year: 1997 end-page: 271 ident: bib9 article-title: “Problems with the chaotic inverse system encryption approach,” publication-title: IEEE Trans. Circuits and Systems – I – volume: 240 start-page: 50 year: 1998 end-page: 54 ident: bib1 article-title: “Cryptography with chaos,” publication-title: Physics Letters A – start-page: 191 year: 2000 end-page: 203 ident: bib3 article-title: “On constructive approach to chaotic pseudorandom number generators,” publication-title: RCMCIS'2000 – year: 1996 ident: bib5 publication-title: Applied Cryptography – Protocols, algorithms, and source code in C – reference: NIST, National Institute of Standards and Technology (2001), Federal Information Processing Standards Publication FIPS PUB 140-2: Security requirements for Cryptographic Modules, May 25 – volume: 28 start-page: 656 year: 1949 end-page: 715 ident: bib6 article-title: “Communication theory of secrecy systems,” publication-title: Bell Syst. Tech. J. – year: 1996 ident: 10.3182/20050703-6-CZ-1902.00838_bib5 – start-page: 191 year: 2000 ident: 10.3182/20050703-6-CZ-1902.00838_bib3 article-title: “On constructive approach to chaotic pseudorandom number generators,” publication-title: RCMCIS'2000 – volume: 28 start-page: 656 year: 1949 ident: 10.3182/20050703-6-CZ-1902.00838_bib6 article-title: “Communication theory of secrecy systems,” publication-title: Bell Syst. Tech. J. doi: 10.1002/j.1538-7305.1949.tb00928.x – volume: 138 start-page: 1932 year: 2001 ident: 10.3182/20050703-6-CZ-1902.00838_bib8 article-title: “A modified chaotic cryptographic method,” publication-title: Computer Physics Communications doi: 10.1016/S0010-4655(01)00220-X – volume: 44 start-page: 268 issue: 3 year: 1997 ident: 10.3182/20050703-6-CZ-1902.00838_bib9 article-title: “Problems with the chaotic inverse system encryption approach,” publication-title: IEEE Trans. Circuits and Systems – I doi: 10.1109/81.557386 – volume: 64 start-page: 821 issue: 8 year: 1990 ident: 10.3182/20050703-6-CZ-1902.00838_bib4 article-title: “Synchronization in chaotic systems,” publication-title: Physical Review Letters doi: 10.1103/PhysRevLett.64.821 – ident: 10.3182/20050703-6-CZ-1902.00838_bib10 – volume: 240 start-page: 50 year: 1998 ident: 10.3182/20050703-6-CZ-1902.00838_bib1 article-title: “Cryptography with chaos,” publication-title: Physics Letters A doi: 10.1016/S0375-9601(98)00086-3 – volume: 40 start-page: 660 issue: 10 year: 1993 ident: 10.3182/20050703-6-CZ-1902.00838_bib2 article-title: “Chaotic digital encoding: an approach to secure communication,” publication-title: IEEE Trans. Circuits and Systems – II – volume: 7 start-page: 1 year: 2000 ident: 10.3182/20050703-6-CZ-1902.00838_bib7 article-title: “Chaotic pseudorandom numbers generators based on chaotic dynamical systems,” publication-title: Open Sys. And Information Dyn. doi: 10.1023/A:1009652616706 |
| SSID | ssib027512557 ssib036250806 ssib001723113 ssib001723112 ssib046627245 ssib028086724 |
| Score | 1.3446411 |
| Snippet | Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today's ubiquitous Internet communication,... |
| SourceID | crossref elsevier |
| SourceType | Enrichment Source Index Database Publisher |
| StartPage | 1090 |
| SubjectTerms | chaos Chaos-based pseudo-random number generator (CPRNG) chip implementation cryptography |
| Title | Chaos-based Pseudo-Random Number Generators and Chip Implementation |
| URI | https://dx.doi.org/10.3182/20050703-6-CZ-1902.00838 |
| Volume | 38 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library issn: 1474-6670 databaseCode: KQ8 dateStart: 20020101 customDbUrl: isFulltext: true dateEnd: 20141231 titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html omitProxy: true ssIdentifier: ssib027512557 providerName: Colorado Alliance of Research Libraries |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1Lb9QwELagXLigIkAUSpUDt8rLJnZsR5xWUauCaAWohbKXyK-oSG1StdsLv54Zx5tkYVFLL9GuJU92PaOZb8bzIOQtpj7ZWhsqrBGU59pS5cBrdQbQv1aCmxRrhw-PxMEJ_3ianw55uqG6ZGEm9tfaupL7cBXWgK9YJfsfnO2JwgJ8Bv7CEzgMzzvxuDzT7TVFQ-RAk_kb19KvunHtxe5RGPQRm0qHgToYIC8xMyv0A76IJUfNGJx-2J-VXeVAsGjXu9-C6upR96dw8z8_a6O165c-_xxWDnUIvv7QWFg26LfzGJf-PplNViIN-UgtcsmpEN2Ij6XeZOov-eiUIOZ6jgwqfOXrlDVoE2z-im9CvUMFLecU8Al2UFWR-Ep_7D_sVp9NCH4M0qqWlCpRlfMKKVWB0kPyKMNoDV7ZfxndEUrAtgOYySRgn3y4A84UeHty6GUPlh7A7HAnzbF1fhamYPfH06WK4Y9596-_tR7_jDDN8SZ5Ep2RZNZJ1lPywDfPSDmSqmRFqpJOqpJBqhJYT1CqklWpek5O9veOywMaR21QmzG2oJmRovCOmSzzqraa57ZgOeO1AXivjZsyNfVTKaxPXc2NUeBpMlvzQqZci7xmL8hG0zb-JUmssKlThnlVOJ5NvZIsL7z1yjMGYNFsEbk8gMrGPvQ4DuW8uo2PWyTtd152vVjusOf98oyriCk7rFiBFN66-9U93viaPA7tfUOYbptsLK5u_BsArguzE-TvNzEuhHE |
| linkProvider | Colorado Alliance of Research Libraries |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Chaos-based+Pseudo-Random+Number+Generators+and+Chip+Implementation&rft.jtitle=IFAC+Proceedings+Volumes&rft.au=Li%2C+Zhong&rft.au=Li%2C+Ping&rft.au=Mao%2C+Yaobin&rft.au=Halang%2C+W.A.&rft.date=2005&rft.issn=1474-6670&rft.volume=38&rft.issue=1&rft.spage=1090&rft.epage=1094&rft_id=info:doi/10.3182%2F20050703-6-CZ-1902.00838&rft.externalDBID=n%2Fa&rft.externalDocID=10_3182_20050703_6_CZ_1902_00838 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1474-6670&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1474-6670&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1474-6670&client=summon |