Analysis of efficient random permutations generation for security applications
In this paper, random permutation generation algorithms namely, Fisher-Yates algorithm, its variant Sattolo algorithm and Josephus algorithm are discussed. Both chaos and non-chaos based approaches have been analyzed and compared. Their efficiency has been tested against three criteria: no ideally f...
Saved in:
| Published in | 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA) pp. 337 - 341 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.03.2015
|
| Subjects | |
| Online Access | Get full text |
| DOI | 10.1109/ICACEA.2015.7164726 |
Cover
| Abstract | In this paper, random permutation generation algorithms namely, Fisher-Yates algorithm, its variant Sattolo algorithm and Josephus algorithm are discussed. Both chaos and non-chaos based approaches have been analyzed and compared. Their efficiency has been tested against three criteria: no ideally fixed points, no un-separated pairs and shift factor greater than one third the degree of permutation. A random permutation algorithm should successfully satisfy the above criteria. Incorporating chaotic behavior increases the randomness of the generated permutation. Chaotic maps are used for the generation of key-dependent and deterministic random behavior. The ones chaos based are attracting more attention as they produce less predictive permutations. A slight change in input parameters prompt a significant change in the resulting outcome thereby making it suitable for security applications. The performance test has been done on samples consisting of 10000, 50000 and 100000 permutations. In each sample, every individual permutation has (I) 50000 elements (II) 100,000 elements. The experimental results demonstrate that the chaos-based approach outperforms other approaches and generates more efficient random permutations. |
|---|---|
| AbstractList | In this paper, random permutation generation algorithms namely, Fisher-Yates algorithm, its variant Sattolo algorithm and Josephus algorithm are discussed. Both chaos and non-chaos based approaches have been analyzed and compared. Their efficiency has been tested against three criteria: no ideally fixed points, no un-separated pairs and shift factor greater than one third the degree of permutation. A random permutation algorithm should successfully satisfy the above criteria. Incorporating chaotic behavior increases the randomness of the generated permutation. Chaotic maps are used for the generation of key-dependent and deterministic random behavior. The ones chaos based are attracting more attention as they produce less predictive permutations. A slight change in input parameters prompt a significant change in the resulting outcome thereby making it suitable for security applications. The performance test has been done on samples consisting of 10000, 50000 and 100000 permutations. In each sample, every individual permutation has (I) 50000 elements (II) 100,000 elements. The experimental results demonstrate that the chaos-based approach outperforms other approaches and generates more efficient random permutations. |
| Author | Ahmad, Musheer Nasim, Zeba Bano, Zohra |
| Author_xml | – sequence: 1 givenname: Zeba surname: Nasim fullname: Nasim, Zeba email: snasim.zeba@gmail.com organization: Dept. of Comput. Eng., Jamia Millia Islamia, New Delhi, India – sequence: 2 givenname: Zohra surname: Bano fullname: Bano, Zohra email: zohra.kabir.92@gmail.com organization: Dept. of Comput. Eng., Jamia Millia Islamia, New Delhi, India – sequence: 3 givenname: Musheer surname: Ahmad fullname: Ahmad, Musheer email: musheer.cse@gmail.com organization: Dept. of Comput. Eng., Jamia Millia Islamia, New Delhi, India |
| BookMark | eNotj8tOwzAURI0EErT0C7rxD6T4FV9nGUUFKlWwAYld5TjXyChxIjtd5O9BtKuZxdHozIrcxjEiIVvOdpyz6unQ1M2-3gnGyx1wrUDoG7LiSoPUFedf92ST8w9jjIMGpcwDeauj7ZccMh09Re-DCxhnmmzsxoFOmIbzbOcwxky_MWL679SPiWZ05xTmhdpp6oO7QI_kzts-4-aaa_L5vP9oXovj-8uf3LEIgpm5AGhbBawEwWSnjZLYgRWtZiW61nfglDHWd633UlaAUIEplS8lE9ajU0quyfayGxDxNKUw2LScrpflL_bpUKI |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICACEA.2015.7164726 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISBN | 146736911X 9781467369114 |
| EndPage | 341 |
| ExternalDocumentID | 7164726 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADFMO ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK IEGSK IERZE OCL RIE RIL |
| ID | FETCH-LOGICAL-i208t-77bb47057203d6843ed7a2b605ecbfd7c488afdbff3397e797854f5302afec443 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:18:23 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i208t-77bb47057203d6843ed7a2b605ecbfd7c488afdbff3397e797854f5302afec443 |
| PageCount | 5 |
| ParticipantIDs | ieee_primary_7164726 |
| PublicationCentury | 2000 |
| PublicationDate | 20150301 |
| PublicationDateYYYYMMDD | 2015-03-01 |
| PublicationDate_xml | – month: 03 year: 2015 text: 20150301 day: 01 |
| PublicationDecade | 2010 |
| PublicationTitle | 2015 International Conference on Advances in Computer Engineering and Applications (ICACEA) |
| PublicationTitleAbbrev | ICACEA |
| PublicationYear | 2015 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0001767448 |
| Score | 1.5874027 |
| Snippet | In this paper, random permutation generation algorithms namely, Fisher-Yates algorithm, its variant Sattolo algorithm and Josephus algorithm are discussed.... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 337 |
| SubjectTerms | Algorithm design and analysis Arrays chaos based algorithm Chaotic communication Computers Fisher-Yates Josephus algorithm logistic map Prediction algorithms Random permutation Security |
| Title | Analysis of efficient random permutations generation for security applications |
| URI | https://ieeexplore.ieee.org/document/7164726 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ07b8IwEMdPwNQufUDVtzx0bEISO7YZEQLRSqAORWJDsXOuqqoEQbL009dOwqNVh26WpcSRLef-9t39DuBBUm0ossgzghqPSc09q6qZp5EqHmuuecnunEz5eMae5_G8AY-7XBhELIPP0HfN0pefZrpwV2Vdp-1FxJvQFJJXuVr7-xRHpWGyBguFQa_7NOgPhn0XvRX79ZM_SqiUFmR0ApPt2FXgyIdf5MrXX7-wjP_9uFPo7HP1yMvOCp1BA5fncHyAGWzDdEseIZkhWDIj7KuItVJp9klW9t9cVA75DXkrKdSuTayaJZu6uh059HN3YDYavg7GXl1HwXuPAplbAa0UE1aYRQFNuWQUU5FEyh5kUCuTCm03cWJSZQy16gSFPVjGzLhyQolBzRi9gNYyW-IlEGa0CVSQYM-B_MJAaqFSgwxDFfBeyK6g7WZmsapQGYt6Uq7_7r6BI7c6VUjXLbTydYF31sbn6r5c3G-_Yqiq |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjZ07T8MwEMdPpQzAwqNFvPHASNI0vjw6VlWrFtqKoZW6VbFzRgjRVDRZ-PTYSfoAMbBZlhJHtpz723f3O4CHkEvFCV1LBVxZGErf0qoaLUlc-J70pZ-zO0djvz_Fp5k3q8DjJheGiPLgM7JNM_flx4nMzFVZw2j7wPX3YN9DRK_I1treqBguDYYlWqjptBqDTrvTbZv4Lc8un_1RRCW3Ib1jGK1HL0JH3u0sFbb8-gVm_O_nnUB9m63HXjZ26BQqtDiDox3QYA3Ga_YISxSjnBqhX8W0nYqTD7bUf-escMmv2GvOoTZtpvUsW5X17diup7sO01530ulbZSUF6811wlRLaCEw0NLMdXjsh8gpDiJX6KMMSaHiQOptHKlYKMW1PqFAHy09VKagUKRIIvJzqC6SBV0AQyWVI5yIWgbl13RCGYhYEVJTOH6riZdQMzMzXxawjHk5KVd_d9_DQX8yGs6Hg_HzNRyalSoCvG6gmn5mdKstfiru8oX-BsHfq_c |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2015+International+Conference+on+Advances+in+Computer+Engineering+and+Applications+%28ICACEA%29&rft.atitle=Analysis+of+efficient+random+permutations+generation+for+security+applications&rft.au=Nasim%2C+Zeba&rft.au=Bano%2C+Zohra&rft.au=Ahmad%2C+Musheer&rft.date=2015-03-01&rft.pub=IEEE&rft.spage=337&rft.epage=341&rft_id=info:doi/10.1109%2FICACEA.2015.7164726&rft.externalDocID=7164726 |