Skip to main content
Top
Published in: Journal of Electronic Testing 4/2019

09-08-2019

Security Analysis and Improvement of the Pseudo-random Number Generator Based on Piecewise Logistic Map

Author: Dragan Lambić

Published in: Journal of Electronic Testing | Issue 4/2019

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In this paper, a security analysis of the pseudo-random number generator based on piecewise logistic map is made, which reveals the existence of a serious problem. Although the assumed safety of this pseudo-random number generator (PRNG) is estimated at 2136, it is possible to carry out successful brute-force attack whose complexity is about 2103. Furthermore, the attack on the analyzed PRNG based on a known sequence of output bits is presented which can reduce the complexity of the brute-attack to about 295. The examples of both attacks are provided in this paper. For the above mentioned reasons, the analyzed PRNG cannot be considered safe for the use in cryptographic systems. An improved version of the analyzed PRNG is proposed, which can eliminate the perceived shortcomings.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Show more products
Literature
1.
go back to reference Announcing the advanced encryption standard (AES). Federal Information Processing Standards Publication. 197.2001.2 Announcing the advanced encryption standard (AES). Federal Information Processing Standards Publication. 197.2001.2
2.
go back to reference Akhshani A, Akhavan A, Mobaraki A, Lim S-C, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simulat 19:101–111CrossRefMATH Akhshani A, Akhavan A, Mobaraki A, Lim S-C, Hassan Z (2014) Pseudo random number generator based on quantum chaotic map. Commun Nonlinear Sci Numer Simulat 19:101–111CrossRefMATH
3.
go back to reference Alvarez G, Amigo JM, Arroyo D, Li S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers Lj Kocarev, Lian S (eds) Alvarez G, Amigo JM, Arroyo D, Li S (2011) Lessons learnt from the cryptanalysis of chaos-based ciphers Lj Kocarev, Lian S (eds)
4.
go back to reference Arroyo D, Alvarez G, Amigo JM, Li S (2011) Cryptanalysis of a family of self-synchronizing chaotic stream ciphers. Commun Nonlinear Sci Numer Simul 16:805–813MathSciNetCrossRefMATH Arroyo D, Alvarez G, Amigo JM, Li S (2011) Cryptanalysis of a family of self-synchronizing chaotic stream ciphers. Commun Nonlinear Sci Numer Simul 16:805–813MathSciNetCrossRefMATH
5.
go back to reference Arroyo D, Amigo JM, Li S, Alvarez G (2010) On the inadequacy of unimodal maps for cryptographic applications. In: Ferrer JD, Balleste AM, Roca JC, Gomez AS (eds) XI Reunion Espanola sobre Criptologa y Seguridad de la Informacion (XI RECSI), Universitat Rovira i Virgili, Tarragona, Spain, pp 37–42, ISBN 978–84–693–3304–4 Arroyo D, Amigo JM, Li S, Alvarez G (2010) On the inadequacy of unimodal maps for cryptographic applications. In: Ferrer JD, Balleste AM, Roca JC, Gomez AS (eds) XI Reunion Espanola sobre Criptologa y Seguridad de la Informacion (XI RECSI), Universitat Rovira i Virgili, Tarragona, Spain, pp 37–42, ISBN 978–84–693–3304–4
7.
8.
go back to reference Lambić D (2017) Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn 89:2255–2257CrossRef Lambić D (2017) Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map. Nonlinear Dyn 89:2255–2257CrossRef
9.
go back to reference Lambić D (2018) Security analysis and improvement of the pseudo-random number generator based on quantum chaotic map. Nonlinear Dyn 94:1117–1126CrossRef Lambić D (2018) Security analysis and improvement of the pseudo-random number generator based on quantum chaotic map. Nonlinear Dyn 94:1117–1126CrossRef
10.
go back to reference Lambić D (2018) Security analysis of the efficient chaos pseudo-random number generator applied to video encryption. J Electron Test 34:709–715CrossRef Lambić D (2018) Security analysis of the efficient chaos pseudo-random number generator applied to video encryption. J Electron Test 34:709–715CrossRef
11.
go back to reference Lambić D (2018) Security analysis of the pseudo-random bit generator based on multi-modal maps. Nonlinear Dyn 91:505–513MathSciNetCrossRef Lambić D (2018) Security analysis of the pseudo-random bit generator based on multi-modal maps. Nonlinear Dyn 91:505–513MathSciNetCrossRef
12.
go back to reference Li C, Li S, Lo KT (2011) Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837–843MathSciNetCrossRefMATH Li C, Li S, Lo KT (2011) Breaking a modified substitution–diffusion image cipher based on chaotic standard and logistic maps. Commun Nonlinear Sci Numer Simul 16:837–843MathSciNetCrossRefMATH
13.
go back to reference Li CQ, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78(2):1545–1551CrossRef Li CQ, Xie T, Liu Q, Cheng G (2014) Cryptanalyzing image encryption using chaotic logistic map. Nonlinear Dyn 78(2):1545–1551CrossRef
14.
go back to reference Liu Y, Fan H, Xie EY, Cheng G, Li C (2015) Deciphering an image cipher based on mixed transformed logistic maps. Int J Bifurcation Chaos 25(13):1550188MathSciNetCrossRefMATH Liu Y, Fan H, Xie EY, Cheng G, Li C (2015) Deciphering an image cipher based on mixed transformed logistic maps. Int J Bifurcation Chaos 25(13):1550188MathSciNetCrossRefMATH
16.
go back to reference May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261:459–465CrossRefMATH May RM (1976) Simple mathematical models with very complicated dynamics. Nature 261:459–465CrossRefMATH
17.
go back to reference Persohn K, Povinelli R (2012) Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos Solitons & Fractals 45(3):238–245CrossRef Persohn K, Povinelli R (2012) Analyzing logistic map pseudorandom number generators for periodicity induced by finite precision floating-point representation. Chaos Solitons & Fractals 45(3):238–245CrossRef
18.
go back to reference Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887–1892MathSciNetCrossRefMATH Rhouma R, Solak E, Belghith S (2010) Cryptanalysis of a new substitution-diffusion based image cipher. Commun Nonlinear Sci Numer Simul 15(7):1887–1892MathSciNetCrossRefMATH
19.
go back to reference Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication pp 800–22 Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication pp 800–22
20.
21.
go back to reference Skrobek A (2008) Approximation of a chaotic orbit as a cryptanalytical method on Baptista’s cipher. Phys Lett A 372(6):849–859CrossRefMATH Skrobek A (2008) Approximation of a chaotic orbit as a cryptanalytical method on Baptista’s cipher. Phys Lett A 372(6):849–859CrossRefMATH
22.
Metadata
Title
Security Analysis and Improvement of the Pseudo-random Number Generator Based on Piecewise Logistic Map
Author
Dragan Lambić
Publication date
09-08-2019
Publisher
Springer US
Published in
Journal of Electronic Testing / Issue 4/2019
Print ISSN: 0923-8174
Electronic ISSN: 1573-0727
DOI
https://doi.org/10.1007/s10836-019-05818-8

Other articles of this Issue 4/2019

Journal of Electronic Testing 4/2019 Go to the issue

EditorialNotes

Editorial