A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
The information transmission domain had well been extended by the recent and fast developments in the telecommunication technologies specifically, the mobile networks and internet services. These new developments in turn, had come up with cutting-edge resolutions to secure information from being wir...
Saved in:
Main Authors: | , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
American Scientific Publisher
2018
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/19613/1/21.%20A%20New%20Trend%20of%20Pseudorandom%20Number%20Generator%20using%20Multiple%20Chaotic%20Systems1.pdf http://umpir.ump.edu.my/id/eprint/19613/ https://doi.org/10.1166/asl.2018.12949 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | The information transmission domain had well been extended by the recent and fast developments in the telecommunication technologies specifically, the mobile networks and internet services. These new developments in turn, had come up with cutting-edge resolutions to secure information from being wiretapped. Countless in-depth studies in the field of cryptography had been carried out with the intent to propose a revolutionary solution for data protection of cryptographic techniques. This paper had proposed a new pseudo-random number generator (PRNG) design that had employed two chaotic systems which were logistics and tent maps, both of which had various operational and initialization values, which had subsequently contributed to the sequential distinction of the statistical properties. A compilation of a well- formulated assessment that had been provided by the National Institute of Standard Technology (NIST) was the foundation to ascertain the accuracy and exclusivity of the generated sequence and features with regards to this area of study. Moreover, a security analysis on key space and key sensitivity had been performed and it was concluded that the proposed PRNG was relevant for the implementation of cryptography. |
---|