Analysis of efficient random permutations generation for security applications

In this paper, random permutation generation algorithms namely, Fisher-Yates algorithm, its variant Sattolo algorithm and Josephus algorithm are discussed. Both chaos and non-chaos based approaches have been analyzed and compared. Their efficiency has been tested against three criteria: no ideally f...

Full description

Saved in:
Bibliographic Details
Published in2015 International Conference on Advances in Computer Engineering and Applications (ICACEA) pp. 337 - 341
Main Authors Nasim, Zeba, Bano, Zohra, Ahmad, Musheer
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.03.2015
Subjects
Online AccessGet full text
DOI10.1109/ICACEA.2015.7164726

Cover

Abstract In this paper, random permutation generation algorithms namely, Fisher-Yates algorithm, its variant Sattolo algorithm and Josephus algorithm are discussed. Both chaos and non-chaos based approaches have been analyzed and compared. Their efficiency has been tested against three criteria: no ideally fixed points, no un-separated pairs and shift factor greater than one third the degree of permutation. A random permutation algorithm should successfully satisfy the above criteria. Incorporating chaotic behavior increases the randomness of the generated permutation. Chaotic maps are used for the generation of key-dependent and deterministic random behavior. The ones chaos based are attracting more attention as they produce less predictive permutations. A slight change in input parameters prompt a significant change in the resulting outcome thereby making it suitable for security applications. The performance test has been done on samples consisting of 10000, 50000 and 100000 permutations. In each sample, every individual permutation has (I) 50000 elements (II) 100,000 elements. The experimental results demonstrate that the chaos-based approach outperforms other approaches and generates more efficient random permutations.
AbstractList In this paper, random permutation generation algorithms namely, Fisher-Yates algorithm, its variant Sattolo algorithm and Josephus algorithm are discussed. Both chaos and non-chaos based approaches have been analyzed and compared. Their efficiency has been tested against three criteria: no ideally fixed points, no un-separated pairs and shift factor greater than one third the degree of permutation. A random permutation algorithm should successfully satisfy the above criteria. Incorporating chaotic behavior increases the randomness of the generated permutation. Chaotic maps are used for the generation of key-dependent and deterministic random behavior. The ones chaos based are attracting more attention as they produce less predictive permutations. A slight change in input parameters prompt a significant change in the resulting outcome thereby making it suitable for security applications. The performance test has been done on samples consisting of 10000, 50000 and 100000 permutations. In each sample, every individual permutation has (I) 50000 elements (II) 100,000 elements. The experimental results demonstrate that the chaos-based approach outperforms other approaches and generates more efficient random permutations.
Author Ahmad, Musheer
Nasim, Zeba
Bano, Zohra
Author_xml – sequence: 1
  givenname: Zeba
  surname: Nasim
  fullname: Nasim, Zeba
  email: snasim.zeba@gmail.com
  organization: Dept. of Comput. Eng., Jamia Millia Islamia, New Delhi, India
– sequence: 2
  givenname: Zohra
  surname: Bano
  fullname: Bano, Zohra
  email: zohra.kabir.92@gmail.com
  organization: Dept. of Comput. Eng., Jamia Millia Islamia, New Delhi, India
– sequence: 3
  givenname: Musheer
  surname: Ahmad
  fullname: Ahmad, Musheer
  email: musheer.cse@gmail.com
  organization: Dept. of Comput. Eng., Jamia Millia Islamia, New Delhi, India
BookMark eNotj8tOwzAURI0EErT0C7rxD6T4FV9nGUUFKlWwAYld5TjXyChxIjtd5O9BtKuZxdHozIrcxjEiIVvOdpyz6unQ1M2-3gnGyx1wrUDoG7LiSoPUFedf92ST8w9jjIMGpcwDeauj7ZccMh09Re-DCxhnmmzsxoFOmIbzbOcwxky_MWL679SPiWZ05xTmhdpp6oO7QI_kzts-4-aaa_L5vP9oXovj-8uf3LEIgpm5AGhbBawEwWSnjZLYgRWtZiW61nfglDHWd633UlaAUIEplS8lE9ajU0quyfayGxDxNKUw2LScrpflL_bpUKI
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICACEA.2015.7164726
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 146736911X
9781467369114
EndPage 341
ExternalDocumentID 7164726
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADFMO
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
IEGSK
IERZE
OCL
RIE
RIL
ID FETCH-LOGICAL-i208t-77bb47057203d6843ed7a2b605ecbfd7c488afdbff3397e797854f5302afec443
IEDL.DBID RIE
IngestDate Wed Aug 27 02:18:23 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i208t-77bb47057203d6843ed7a2b605ecbfd7c488afdbff3397e797854f5302afec443
PageCount 5
ParticipantIDs ieee_primary_7164726
PublicationCentury 2000
PublicationDate 20150301
PublicationDateYYYYMMDD 2015-03-01
PublicationDate_xml – month: 03
  year: 2015
  text: 20150301
  day: 01
PublicationDecade 2010
PublicationTitle 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA)
PublicationTitleAbbrev ICACEA
PublicationYear 2015
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0001767448
Score 1.5874027
Snippet In this paper, random permutation generation algorithms namely, Fisher-Yates algorithm, its variant Sattolo algorithm and Josephus algorithm are discussed....
SourceID ieee
SourceType Publisher
StartPage 337
SubjectTerms Algorithm design and analysis
Arrays
chaos based algorithm
Chaotic communication
Computers
Fisher-Yates
Josephus algorithm
logistic map
Prediction algorithms
Random permutation
Security
Title Analysis of efficient random permutations generation for security applications
URI https://ieeexplore.ieee.org/document/7164726
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ07b8IwEMdPwNQufUDVtzx0bEISO7YZEQLRSqAORWJDsXOuqqoEQbL009dOwqNVh26WpcSRLef-9t39DuBBUm0ossgzghqPSc09q6qZp5EqHmuuecnunEz5eMae5_G8AY-7XBhELIPP0HfN0pefZrpwV2Vdp-1FxJvQFJJXuVr7-xRHpWGyBguFQa_7NOgPhn0XvRX79ZM_SqiUFmR0ApPt2FXgyIdf5MrXX7-wjP_9uFPo7HP1yMvOCp1BA5fncHyAGWzDdEseIZkhWDIj7KuItVJp9klW9t9cVA75DXkrKdSuTayaJZu6uh059HN3YDYavg7GXl1HwXuPAplbAa0UE1aYRQFNuWQUU5FEyh5kUCuTCm03cWJSZQy16gSFPVjGzLhyQolBzRi9gNYyW-IlEGa0CVSQYM-B_MJAaqFSgwxDFfBeyK6g7WZmsapQGYt6Uq7_7r6BI7c6VUjXLbTydYF31sbn6r5c3G-_Yqiq
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ07T8MwEMdPpQzAwqNFvPHASNI0vjw6VlWrFtqKoZW6VbFzRgjRVDRZ-PTYSfoAMbBZlhJHtpz723f3O4CHkEvFCV1LBVxZGErf0qoaLUlc-J70pZ-zO0djvz_Fp5k3q8DjJheGiPLgM7JNM_flx4nMzFVZw2j7wPX3YN9DRK_I1treqBguDYYlWqjptBqDTrvTbZv4Lc8un_1RRCW3Ib1jGK1HL0JH3u0sFbb8-gVm_O_nnUB9m63HXjZ26BQqtDiDox3QYA3Ga_YISxSjnBqhX8W0nYqTD7bUf-escMmv2GvOoTZtpvUsW5X17diup7sO01530ulbZSUF6811wlRLaCEw0NLMdXjsh8gpDiJX6KMMSaHiQOptHKlYKMW1PqFAHy09VKagUKRIIvJzqC6SBV0AQyWVI5yIWgbl13RCGYhYEVJTOH6riZdQMzMzXxawjHk5KVd_d9_DQX8yGs6Hg_HzNRyalSoCvG6gmn5mdKstfiru8oX-BsHfq_c
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+International+Conference+on+Advances+in+Computer+Engineering+and+Applications+%28ICACEA%29&rft.atitle=Analysis+of+efficient+random+permutations+generation+for+security+applications&rft.au=Nasim%2C+Zeba&rft.au=Bano%2C+Zohra&rft.au=Ahmad%2C+Musheer&rft.date=2015-03-01&rft.pub=IEEE&rft.spage=337&rft.epage=341&rft_id=info:doi/10.1109%2FICACEA.2015.7164726&rft.externalDocID=7164726