DOI QR코드

DOI QR Code

PRaCto: Pseudo Random bit generator for Cryptographic application

  • Received : 2018.03.15
  • Accepted : 2018.07.05
  • Published : 2018.12.31

Abstract

Pseudorandom numbers are useful in cryptographic operations for using as nonce, initial vector, secret key, etc. Security of the cryptosystem relies on the secret key parameters, so a good pseudorandom number is needed. In this paper, we have proposed a new approach for generation of pseudorandom number. This method uses the three dimensional combinational puzzle Rubik Cube for generation of random numbers. The number of possible combinations of the cube approximates to 43 quintillion. The large possible combination of the cube increases the complexity of brute force attack on the generator. The generator uses cryptographic hash function. Chaotic map is being employed for increasing random behavior. The pseudorandom sequence generated can be used for cryptographic applications. The generated sequences are tested for randomness using NIST Statistical Test Suite and other testing methods. The result of the tests and analysis proves that the generated sequences are random.

Keywords

References

  1. Petrie, Craig S., and J. Alvin Connelly. "A noise-based random bit generator IC for applications in cryptography," in Proc. of Circuits and Systems, 1998. ISCAS'98. Proceedings of the 1998 IEEE International Symposium on. Vol. 2. IEEE, 1998.
  2. Brederlow, Ralf, Ramesh Prakash, Christian Paulus, and Roland Thewes. "A low-power true random number generator using random telegraph noise of single oxide-traps," in Proc. of Solid-State Circuits Conference, 2006. ISSCC 2006. Digest of Technical Papers. IEEE International, pp. 1666-1675. IEEE, 2006.
  3. Bucci, Marco, Lucia Germani, Raimondo Luzzi, Alessandro Trifiletti, and Mario Varanonuovo. "A high-speed oscillator-based truly random number source for cryptographic applications on a smart card IC." IEEE transactions on computers 52, no. 4, p. 403-409, 2003. https://doi.org/10.1109/TC.2003.1190581
  4. Zeng, Kencheng, C-H. Yang, D-Y. Wei, and T. R. N. Rao. "Pseudorandom bit generators in stream-cipher cryptography," Computer 24, no. 2, p. 8-17, 1991. https://doi.org/10.1109/2.67207
  5. Liu, Lingfeng, Suoxia Miao, Hanping Hu, and Yashuang Deng. "Pseudorandom bit generator based on non-stationary logistic maps," IET Information Security 10, no. 2, p. 87-94, 2016. https://doi.org/10.1049/iet-ifs.2014.0192
  6. Kocarev, Ljupco, and Goce Jakimoski. "Pseudorandom bits generated by chaotic maps," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 50, no. 1, p. 123-126, 2003. https://doi.org/10.1109/TCSI.2002.804550
  7. Stojanovski, Toni, and Ljupco Kocarev. "Chaos-based random number generators-part I: analysis [cryptography]," IEEE Transactions on Circuits and Systems I: Fundamental Theory and Applications 48, no. 3, p. 281-288, 2001. https://doi.org/10.1109/81.915385
  8. Pellicer-Lostao, Carmen, and Ricardo Lopez-Ruiz. "Pseudo-random bit generation based on 2D chaotic maps of logistic type and its applications in chaotic cryptography," in Proc. of International Conference on Computational Science and Its Applications, pp. 784-796. Springer, Berlin, Heidelberg, 2008.
  9. Hu, Yue, Xiaofeng Liao, Kwok-wo Wong, and Qing Zhou. "A true random number generator based on mouse movement and chaotic cryptography," Chaos, Solitons & Fractals 40, no. 5,p. 2286-2293, 2009. https://doi.org/10.1016/j.chaos.2007.10.022
  10. Yalcin, Mustak E., Johan AK Suykens, and Joos Vandewalle. "True random bit generation from a double-scroll attractor," IEEE Transactions on Circuits and Systems I: Regular Papers51, no. 7, p. 1395-1404, 2004. https://doi.org/10.1109/TCSI.2004.830683
  11. Andrecut, M. "Logistic map as a random number generator," International Journal of Modern Physics B 12, no. 09, p. 921-930, 1998. https://doi.org/10.1142/S021797929800051X
  12. Szczepanski, Janusz, Zbigniew Kotulski, Karol Gorski, Andrzej Paszkiewicz, and Anna Zugaj. "On some models of pseudorandom number generators based on chaotic dynamical systems," in Proc. of RCMCIS 99, p. 213-220, 1999.
  13. Li, S. J., X. Q. Mou, and Yuan-Long Cai, "Pseudo-random bit generator based on couple chaotic systems and its application in stream-ciphers cryptography," in Proc. of Progress in Cryptology-INDOCRYPT 2001: Second International Conference on Cryptology in India Chennai, India, December 16 C20, 2001 Proceedings, pp. 316-329. 2001.
  14. Lu, Huaping, Shihong Wang, and Gang Hu, "Pseudo-random number generator based on coupled map lattices," International Journal of Modern Physics B 18, no. 17n19, p. 2409-2414, 2004. https://doi.org/10.1142/S0217979204025440
  15. Li, Ping, Zhong Li, Wolfgang A. Halang, and G. R. Chen. "A novel multiple pseudorandom bits generator based on spatiotemporal chaos," in Proc. of World Congress, vol. 16, no. 2, p. 836. 2005.
  16. Patidar, Vinod, Krishan K. Sud, and Narendra K. Pareek. "A pseudo random bit generator based on chaotic logistic map and its statistical testing," Informatica 33, no. 4, 2009.
  17. Guyeux, Christophe, Qianxue Wang, and Jacques M. Bahi. "A pseudo random numbers generator based on chaotic iterations: application to watermarking," in Proc. of International Conference on Web Information Systems and Mining, pp. 202-211. Springer, Berlin, Heidelberg, 2010.
  18. Cristina, Dascalescu Ana, Boriga Radu, and Racuciu Ciprian. "A new pseudorandom bit generator using compounded chaotic tent maps," in Proc. of Communications (COMM), 2012 9th International Conference on, pp. 339-342. IEEE, 2012.
  19. Wang, Xing-Yuan, and Lei Yang. "Design of pseudo-random bit generator based on chaotic maps," International Journal of Modern Physics B 26, no. 32, 1250208, 2012. https://doi.org/10.1142/S0217979212502086
  20. Walker, John. "HotBits: Genuine random numbers, generated by radioactive decay," Online: http://www.fourmilab.ch/hotbits, 2001.
  21. Jakobsson, Markus, Elizabeth Shriver, Bruce K. Hillyer, and Ari Juels. "A practical secure physical random bit generator," in Proc. of Proceedings of the 5th ACM Conference on Computer and Communications Security, pp. 103-111. ACM, 1998.
  22. Jun, Benjamin, and Paul Kocher. "The Intel random number generator," Cryptography Research Inc. white paper, 1999.
  23. Gutterman, Zvi, Benny Pinkas, and Tzachy Reinman. "Analysis of the linux random number generator," in Proc. of Security and Privacy, 2006 IEEE Symposium on, pp. 15-pp. IEEE, 2006.
  24. Ruehle, Michael. "Hash-based pseudo-random number generator," U.S. Patent Application 09/963,857, filed March 27, 2003.
  25. Bertoni, Guido, Joan Daemen, Michael Peeters, and Gilles Van Assche. "Sponge-based pseudorandom number generators," in Proc. of International Workshop on Cryptographic Hardware and Embedded Systems, pp. 33-47. Springer, Berlin, Heidelberg, 2010.
  26. Barker, Elaine, and John Kelsey. "NIST special publication 800-90A: Recommendation for random number generation using deterministic random bit generators." 2012.
  27. Pincus, Steve, and Burton H. Singer. "Randomness and degrees of irregularity," Proceedings of the National Academy of Sciences 93, no. 5, p. 2083-2088, 1996. https://doi.org/10.1073/pnas.93.5.2083