An Improved Random Number Generator Based on Chaotic Map

Article Preview

Abstract:

This paper pointed out that we can determine the initialization x0 when the random sequence is generated by the piecewise linear chaotic map in finite precision, and aimed at solving this objection, an improved measure of perturbing the system variable timely is proposed, and an improved random number generator based on chaotic map is designed and realized. Meanwhile, their working process and theory are analyzed, and the simulation, validation and test of the whole system is finished, and the result indicated that the bit rates is up to 20 MHz and the random number could pass the FIPS140-2 randomness test.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2730-2734

Citation:

Online since:

November 2012

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Jun Yu, Haibin Shen and Xiaolang Yan. Journal of semiconductors. 2004.25(8): 1013-1018(In Chinese)

Google Scholar

[2] L.AZZINNARI,A.MOZSARY,K.KROL, and V.PORRA.A Simple Digital FPGA Pseudo-Chaos Generator: European Conference on Circuit Theory and Design, 2001 [C].Finland

Google Scholar

[3] Jianxia Liu. One chaotic ciphers' security analysis under finite precision and its application[D]. Peking: Graduate school of Chinese academy of sciences, (2004)

Google Scholar

[4] Xin Wang, Tong Zhou, Yongsheng Wang and Mingyan Yu. Microel electronics & computer. 2009. 26(2): 135-139

Google Scholar

[5] D.WHEELER. Problems with Chaotic Cryptosystems.Cryptologia,1989[C].vol.13:243-250

DOI: 10.1080/0161-118991863934

Google Scholar

[6] Haitao Feng. Design and application of chaos-based random number generator[D]. Chengdu: Southwest jiaotong university, 2006(In Chinese)

Google Scholar

[7] Nini RAO, Dong Zeng. Electronic Science and Technology of China.2004.3(In Chinese)

Google Scholar

[8] Ganmin Zhou, Shengguang Yang, Zhaoyu Jiang and Minglun Gao. Journal of electronics & information technology. 2005.27(7): 1152-1156(In Chinese)

Google Scholar

[9] Zheng Xiaoyue, Shen Haibin. Journal of southern Yangtze university(natural science edition). 2006.5(5): 522-525(In Chinese)

Google Scholar

[10] DONALD L.EVANS, PHILLIP J.BOND,ARDEN L.BEMENT. 20899-8900 Security Requirements for Cryptographic Modules (FIPS PUB 140-2)[S].Washington:U.S Government Printing Office ,(2001)

Google Scholar