Applied Mathematical Sciences, Vol. 7, 2013, no. 55, 2719 - 2734 HIKARI Ltd, www.m-hikari.com
A Pseudo Random Number Generator Based on the Chaotic System of Chua’s Circuit, and its Real Time FPGA Implementation Lahcene Merah1, Adda Ali-Pacha2, Naima Hadj Said3 and Mustafa Mamat4 1, 2
Department of Electronics Department of Computer Sciences University of Science and Technology of Oran (USTO) BP 1505 El M’Naouer Oran 31036, Algeria 4 Department of Mathematics, Universiti Malaysia Terengganu 21300 K.Terengganu, Malaysia Corresponding authors e-mails:
[email protected],
[email protected] 3
Copyright © 2013 Lahcene Merah et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Abstract Due to its attractive proprieties for data encryption; chaotic systems becomes an active research area in this last dedicate. Applying chaos proprieties in cryptography has taken many ways and approaches, using chaotic systems as pseudo random number generators is the most known technic. In this paper we present a fitting way to generate a strong pseudo random number sequence (PRNS) that satisfy the cryptography requirements from the chaotic system of Chua’s circuit. The PRNS randomness then evaluated using the NIST-800-22 statistical tests, and used to encrypt an image. A hardware implementation of the chaotic system was done using a FPGA. Keywords: Chaos, cryptography, PRNG, Chua’s circuit, FPGA, NIST
2720
Lahcene Merah et al
1. Introduction
Today, the massive revolution of media exchange and the increase of computing speed make information security one of the major problems that worry researchers of cryptographic field. Many Actual cryptographic algorithms that considered as effective suffer now from the rise of the computing power of computers and the advent of quantum computers could spell the end of these algorithms. Naturally, as an inseparable part of the secure systems, random number generators (RNGs) have more prominently positioned into the focal point of research [9]. Random numbers are extensively used in many cryptographic operations: for key generation in both asymmetric and symmetric algorithms, as challenges in authentication protocols, padding bytes, blinding values and in many counter measures against side-channel attacks [8]. Since RNGs are implemented on finite-state machines we call them pseudo random generators (PRNGs). PRNGs are capable to generating sequences of numbers which appear random-like from many aspects [17]. PRNGs, suitable for use in cryptographic applications may need to meet stronger requirements than for other applications [18], a perfect randomly generated key leads to the highest system security [19]. The randomness requirements in cryptographic applications are not very rigorous, since PRNGs possess periodicity and can be mathematically predictable [12]. Since the discovery of chaos synchronization there has been an increasing interest in using chaotic signals to implement a level of security for communication systems [4].Chaos is not a complete disorder, it is a disorder in a deterministic dynamic system which is always foreseeable in a short-term [2]. Chaotic signals are derived from nonlinear dynamic systems, they are aperiodic, uncorrelated, broadband and deterministic and appear random in the time domain [1]; furthermore, cryptographic researchers prefer chaotic systems properties, such as aperiodicity, sensitivity to initial conditions and system parameters [16] which any small perturbation can grow exponentially in the system and can result in a non-predictive chaotic behavior [7]. With the increasing demand for various services such as encrypted digital TV, credit cards, etc., it became necessary to manufacture encryption systems (RNGs, algorithms) on chips. The main drawback of chaos-based RNG integrated circuits (ICs) is the system robustness [12]. FPGA technology is a growing area of research that has the potential to provide the performance benefits of ASICs and the flexibility of processors [21], FPGAs are a reconfigurable hardware, and there are potential advantages of reconfigurable hardware in cryptographic applications: algorithm agility, algorithm upload, architecture efficiency, resource efficiency, algorithm modification, throughput, and cost efficiency [23].
Pseudo random number generator
2721
2. Random number generators Random number generators (RNGs) are essential in statistical studies in several fields. They may be based on physical noise sources or on mathematical algorithms, but in both cases truly random numbers are not obtained because of data acquisition systems in the first case or because machine precision in the second case. Instead, any real implementation actually produces a pseudorandom number generator (PRNG) [10]. The need for random and pseudorandom numbers arises in many cryptographic applications. For example, common cryptosystems employ keys that must be generated in a random fashion [18]. In many cryptographic schemes the compromise of the random number generator leads to the collapse of the overall security. As the security of the overall system rests on these secrets, it is natural to set high standards for random number generators that produce them [22].
3. Chaos based cryptography A chaotic system is a non-linear, dynamic system. A dynamic system is simply a set of functions (rules, equations) that specify how variables change overtime. A system is considered non-linear if one or more functions specifying the change in variables are non-linear [20]. There are two kinds of chaotic systems; continuous chaotic systems (CCS) and discrete chaotic systems (DCS); the first kind can be represented by multi-dimensional differential equations systems and the second one by iterative maps. Since the CCS loses its dynamical proprieties when it is implemented on finite precision machines, the DCS have more interest by researchers. Since 1990s, many researchers have found that there exists some interesting relationship between chaos and cryptography [4]. The possibility for self-synchronization of chaotic oscillations has sparked an avalanche of works on the application of chaos in cryptography. The random behavior and sensitivity to initial conditions and parameter settings allows chaotic systems to fulfill the classic Shannon requirements of confusion and diffusion [5]. The chaos-based secure communication has become an important and significant research direction. Now various methods for chaos-based secure transmission of private information signals have been proposed, some popular methods are additive masking, chaotic switching, chaotic parameter modulation, chaos shift keying and chaotic frequency modulation [14].
4. The Chaotic system of Chua’s circuit Chua's circuit is a simple electronic circuit that exhibits a wide variety of nonlinear dynamical phenomena such as bifurcations and chaos. Because of its
2722
Lahcene Merah et al
simplicity and universality, Chua's circuit has attracted much interest and has become a standard primer on investigations of chaos [11]. It was introduced in 1983 by Leon O. Chua, who was a visitor at Waseda University in Japan at that time. Chua’s circuit is an autonomous third order nonlinear electronic circuit. To obtain a chaotic behavior from a simple autonomous circuit that constructed from standard components (resistors, capacitors, inductors) 4.1 Chaotic criteria An autonomous circuit made from standard components (resistors, capacitors, inductors) must satisfy three criteria before it can display chaotic behavior. It must contain one or more nonlinear elements, one or more locally active resistors and three or more energy-storage elements. Chua's circuit is the simplest electronic circuit meeting these criteria. As shown in the figure 1, the energy storage elements are two capacitors (labeled C1 and C2) and an inductor (labeled L1). There is an active resistor (labeled R). There is a nonlinear resistor made of two linear resistors and two diodes. At the far right is a negative impedance converter made from three linear resistors and an operational amplifier. The section to the right simulates Chua's diode, a component that is currently not sold commercially [25].
Figure.1: A version of Chua's circuit without Chua's Diode.
4.2 Modeling Chua’s circuit The Chua’s circuit can be modeled mathematically by a system of three dimensions of nonlinear ordinary differential equations as follow:
(1)
Pseudo random number generator
2723
With The variables x(t), y(t) and z(t)presents respectively the voltages across the capacitors C1and C2 and the intensity of the current the inductor L1.The function f(x) describes the electrical response of the nonlinear resistor and parameters α and βare determined by the particular values of the circuit components. It should be noted that the study of the behavior of Chua’s system is out of scope of this paper, but the internet is rich with studies and documents about Chua’s system, just put Chua’s circuit on Google browser and you get a lot of pages and document about it.
5. Implementation of the Chua’s system In this section we will implement the Chua’s system through two steps, in the first step we simulate the system using Xilinx System Generator tool (XSG) and Matlab/Simulink. After the evaluation of the system and using it for encrypting an image we pass to the second step that consists of the hardware FPGA implementation of Chua’s system. 5.1 Simulation of the Chua’s system The Chua’s system was simulated using Xilinx System Generator (XSG). XSG is a DSP design tool from Xilinx that enables the use of the Math Works model-based Simulink design environment for FPGA design. Previous experience with Xilinx FPGAs or RTL design methodologies are not required when using System Generator. Designs are captured in the DSP friendly Simulink modeling environment using a Xilinx specific block set. All of the downstream FPGA implementation steps including synthesis and place and route are automatically performed to generate an FPGA programming file [24], except, the user can configure the appropriate timing of his design and specify the pins of the inputs and outputs of the design on the target FPGA chip. The following figure presents the design of Chua’s equations system of (1) using XSG, each integrator x, y and z contain a register/adder multiplied by dt (the system step). The blocks surrounded by framework presents the f(x) function.
2724
Lahcene Merah et al
Figure.2: Chua’s system design using XSG.
The system parameters are fixed as follow:α =15.6, β =-36, m0= -9/7 and m1 =-4/7 . The initial conditions are chosen randomly as follow: x 0=0.9654454, y0 =1.0029554 and z0=1.4597855. With these parameters the system has a chaotic behavior and unpredictability in long term with a high sensitivity to the initial parameters. The different time evolutions of the XSG Chua’s system are presented on the following figure:
1.5
15
15
1
10
10
0.5
5
5
8 6 4
0
X(t)
X(t)
2 0
0
0
-5
-5
-2 -0.5
-4 -6
-1
-8 1.5 1
-4
-2
0 Y(t)
2
4
-10
-15 -6
6
-4
-2
0 Z(t)
2
-15 -1.5
-1
-0.5
0
0.5
1
1.5
1 0
-0.5
-1
-1 6
-2 -3
-1.5
10
2
0.5
5
0
-2
Z(t)
15
1
Y(t)
1.5
4
0
-0.5
-4
1000
1500
2000
2500 Time
3000
3500
4000
4500
5000
-1.5 0
0
-5
-1
500
6
2
0
-6 0
4
3
0.5
X(t)
-10
-1.5 -6
-10
500
1000
1500
2000
2500 Time
3000
3500
4000
4500
5000
Figure.3: Different XSG Chua’s system outputs
-15 0
500
1000
1500
2000
2500 Time
3000
3500
4000
4500
5000
Pseudo random number generator
2725
6. Chua’s system based PRNG In fact, the desired quality of randomness may and do differ from one application domain to another, pseudo random number generators (PRNGs) intended for cryptographic applications must be strong and presents some statistical characteristics, PRNGs in this case are called Cryptographically secure PRNGs. The most common method for testing random number generators is based on the statistical analysis of their output. Statistical test suites play a very important role in assessing the randomness quality of sequences produced by random number generators. And while these sequences constitute an essential input for applications requiring unpredictability, irreproducibility, uniform distribution or other specific properties of random number sequences [13]. The most known statistical test suite is the NIST 800-22 (National Institute of Standards and Technology). It contains 15 tests applicable to the output of the PRNG, each test computes what known α (the level of significance), if α> 0.01 then the test is considered passed. For more information of the NIST test suite please refer to [18]. If all the 15 tests are passed for a sequence, we can say that this sequence is cryptographically secured. 6.1 Application of the NIST statistical tests to the Chua’s system outputs The following table presents the NIST statistical tests application results to each binary sequences of signal x(t), y(t) and z(t) of the Chua’s system (the taken length of sequences was 2 million for each one): Test Frequency Block Frequency (m = 256) Cusum-Forward Cusum-Reverse Runs Long Runs of Ones Rank Spectral DFT NonOverlapping Templates (m = 9, B = 000000001) Overlapping Templates (m = 9) Universal Linear Complexity (M = 500) Approximate Entropy (m = 10) Serial (m = 16, ∇ ) Random Excursions (x = +1) Random Excursions Variant (x = -1)
Signal x(t) p_value Status 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0001 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail
Signal y(t) p_value Status 0.0000 Fail 0.0000 Fail 0.0078 Fail 0.0018 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.1845 Pass 0.0000 Fail 0.0000 Fail 0.7243 Pass 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.5441 Pass
Table.1: NIST statistical tests application results to the outputs of the Chua’s system
Signal z(t) p_value Status 0.0000 Fail 0.0000 Fail 0.0004 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0247 Pass 0.0000 Fail 0.0000 Fail 0.3287 Pass 0.0000 Fail 0.0000 Fail 0.0000 Fail 0.0000 Fail
2726
Lahcene Merah et al
It is clear from the table that any sequence (x, y or z ) of the Chua’s system is not qualified as cryptographically secured pseudo random sequence. This is may be due to the fact that the integer part of these sequences is not ideally distributed, and presents certain regularity as presented on the following figure:
Figure.4:Binary sequences of each signal x(t), y(t) and z(t).
6.2 The proposed idea for generating CSPRNG from the Chua’s system The idea is very simple, instead of using the entire sequence; we take only the fraction part of each signal, then assemble the three fraction parts to construct one sequence as shown in the following figure: The Chua’s chaotic system
Signal x (32 bits)
Signal y (32 bits)
Signal z (32 bits)
22 LSBs of x
21 LSBs of y
21 LSBs of z
Pseudo random sequence of 64 bits of length Figure.5: The proposed idea to generate CSPRNS from the Chua’s system
Pseudo random number generator
2727
With this scheme, we can generate a sequence of 64 bits of size and can be considered as CSPRNS because it can satisfy all the NIST statistical tests as shown in the following table: Statistical Test Frequency Block Frequency (m = 256) Cusum-Forward Cusum-Reverse Runs Long Runs of Ones Rank Spectral DFT NonOverlapping Templates (m = 9, B = 000000001) Overlapping Templates (m = 9) Universal Approximate Entropy (m = 10) Random Excursions (x = +1) Random Excursions Variant (x = -1) Linear Complexity (M = 500) Serial (m = 16, ∇ )
Status Pass Pass Pass Pass Pass Pass Pass Pass Pass Pass Pass Pass Pass Pass Pass Pass
P_value 0.15036 0.57441 0.21229 0.14769 0.49962 0.14303 0.52539 0.18775 0.19331 0.46844 0.36058 0.24749 0.55378 0.45061 0.45124 0.36665
Table.2: NIST statistical tests application results of the proposed scheme.
7. Simulation and analyses This section is attendedd for evaluating the performance of the proposed scheme, in which we encrypt and decypt two diffents images, the same previous parameters of the Chua’s system are used for encryption. As mentionned previously, Chua’s system with the proposed scheme delivers one data of 64 bits of size in each cycle; this means that 8 pixels can be encrypted in each cycle. The encrypted image of figure.6 (b) is completely differentfrom the original image and cannot be recognized. This can justify the effectiveness of the proposed scheme for image encryption. The image in figure.6 (c) is the decrypted version of the encrypted image; it is clear that decrypted image is the same as the original image (figure.6 (a)).
7.1 Histogram analyses To prevent the leakage of information to an opponent, it is also advantageous if the cipher-image bears little or no statistical similarity to the plain-image. An image histogram illustrates how pixels in an image are distributed by graphing the number of pixels at each color intensity level [3]. Although the pixel permutation will make the content of image unrecognized, the attacker will get some information by the histogram analysis to rebuild the image. Therefore, doing only the pixel permutation is not enough. Therefore, the pixel substitution is adapted to change the image histogram [6].
2728
Lahcene Merah et al
By looking to the histogram of the encrypted image (fig.6 (b)), it is clear that is uniform and different completely to the original image histogram. This means that there is no statistical similitude of the encrypted image and the original one.
1500
1500
250
200 1000
1000
150
100
500
500
50
0
0
0
50
100
150
200
250
0
0
50
100
150
200
250
0
(a) (b) Figure.6Simulation results of the proposed scheme: (a) the original image and its histogram; (b) the encrypted image and its histogram; (c) the decrypted image and its histogram
50
100
150
(c)
7.2 Sensitivity to the initial parameters
In this section, the evaluation of the sensitivity of the proposed scheme to the initial parameters is achieved in this section. The precision used for implementing the Chua’s system was 32 bits (fixed precision); 1 bit for the sign, 6 bits for the integer part and 25 bits for the fraction part. The system key is constructed by all the control parameters and the initial conditions; 25 bits mean that the system will be sensitive to a small variation of 2.98*10-8 on its key. The following figure presents the encryption process of an image and its decryption with different initial conditions and control parameters:
200
250
Pseudo random number generator
000
(a)
2729
(b)(c)
300
(d) 300
300
250
250
250
200
200
200
150
150
150
200
100
100
100
100
50
50
50
0
0
0
600
500
400
300
0
50
100
150
200
250
(e)
300
0
50
100
150
200
250
(f)(g)
300
0 0
50
100
150
200
250
0
50
100
150
200
250
50
100
150
200
250
(h)
300
600 250
250
250
200
200
200
150
150
150
100
100
100
50
50
50
0
0
0
0
50
100
150
200
250
500
400
0
50
100
150
200
250
300
200
100
0 0
50
100
150
200
250
0
Figure.7 Decryption of the image with different changes on the initial parameters and the histogram on each image, a) the original image, b) the encrypted image, c) decrypted image by changing of the value x0 by 2.98*10-8, d) decrypted image by changing of the value y0 by 2.98*10-8, e) decrypted image by changing of the value z0 by 2.98*10-8, , f) decrypted image by changing of the value m0 by 2.98*10-8, g) decrypted image by changing of the value α by 2.98*10-8, h) decrypted image the same parameters used for encryption
8. FPGA hardware implementation In this section, the FPGA hardware implementation of the proposed scheme is achieved. One of recent families of FPGAs technology was used; it’s the SPARTAN 6 XC6SLX45 chip from XILINX, embedded on ATLYS complete circuit board from DIGILENT INC (fig.8).
2730
Lahcene Merah et al
Spartan-6 LX FPGAs are optimized for applications that require the absolute lowest cost. Now with up to 42% less power consumption and a 12% increase in performance [26]. The hardware implementation VHDL code was generated automatically from the XSG blocks, then after certain steps using the ISE tool a bitstream file also generated and targeted to the FPGA chip. The Figure.9 presents the design and timing summary of the design FPGA implementation, it is clear that the design has a low cost hardware implementation. The XC6SLX45 chip with its low cost is still has enough space to implement more additional designs if necessary; like communication protocols to make connection with the outside [15]. In order to visualize the analog real time outputs of the Chua’s system FPGA circuit; we use a DAC (digital to analog converter), in this case we used the Pmod-DA1 chip that designed by DIGILENT INC and has 2 analog outputs. The Pmod-DA1 chip contains two DAC121S101 12-bit D/A converter chips from National Semiconductor INC (fig.8). The maximum estimated frequency (fig.9) is f =30.02 MHz, since the Chua’s system FPGA circuit gives 32 bits of data key per clock cycle, it is easy to compute the throughput: Throughput = output word length × f = 64 bits × 30.02 MHz = 1921.28 Mbps = 1.9Gbps This is a high throughput and may be covers the most actual cryptography applications requirements.
Figure.8 the ATLYS complete circuit board (include the SPARTAN 6 XC6SLX45 FPGA chip) used for implementation.
Pseudo random number generator
2731
Figure.9the design and timing summaries of the Chua’s system FPGA implementation.
(a) (b)
(c)
(d)
(e)
Figure.10 the different real time FPGA outputs of the Chua’s system; a) the real time x-z plane output, b) the real time x-y plane output, c) the real time x signal output, d) the real time y signal output and e) the real time z signal output.
The real time outputs of the FPGA; shows that all the signals obtained are identical to those obtained by simulation of the Chua’s system.
9. Performance of the proposed scheme based on Chua’s system Our proposed scheme offers the following advantages:
2732
Lahcene Merah et al
The length of the secret key: the system has 7 initial value, each value is presented by 32 bits, so the length of the initial parameters is 2(32x7) = 2224, this is a big size which can certainly resist the brute force attacks. The pseudo random sequence (PRS) is constructed by the fractional part of the 3 signals x, y and z, so the Known Plaintext attacks has no effect because of the complexity of the PRS. The binary output of the system is ideally distributed and passed all the NIST statistical tests which confirm its effectiveness for cryptographic purposes. The high throughput of the hardware FPGA circuit can covers any actual cryptographic requirements.
10. Conclusion We proposed in this paper an appropriate way to generate a cryptographically secured pseudo random sequence from a chaotic system. With this new scheme the Chua’s system shows better chaotic performance by inheriting the high sensitivity to the initial conditions and expanding the range of parameters. In addition, the generated sequence passes all the NIST statistical tests which confirm its effectiveness for cryptographic issues. The FPGA implementation results show that the design has a low cost implementation and a cheap FPGA circuit (Spartan6 LX45familly in our case) is sufficient to implement our design. In addition the hardware implementation offers a throughput of 1.9 Gbps which is sufficient for the most actual cryptographic requirements.
References [1]
[2]
[3]
[4]
A. Abel, Chaos communications-principles, schemes, and system analysis, IEEE, Proceedings of the IEEE, pp.691 – 710, Vol. 90, Issue 5, ISSN: 0018-9219. A. Ali-Pacha and al, Lorenz’s attractor applied to the stream cipher (Ali-Pacha generator), Science direct, Chaos Solitons & Fractals journal, Vol.33, Issue 5, August 2007, Pages 1762–1766. S. Amany, and al, C8. An Efficient Approach for Image Cryptosystem based on Chaotic Confusion-Diffusion Mechanisms, IEEE Conference Publications, 29th National Radio Science Conference (NRSC), 2012, 10-12 April 2012, Tanta, Egypt, pp.211 – 221, P.ISBN: 978-1-4673-1884-6. S. Amini and A.L. Steele, Digital Chaos Generator for Use within Chaos Encrypted Communication Systems, IEEE Conference Publications,2nd International Workshop on Nonlinear Dynamics and Synchronization,
Pseudo random number generator
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
2733
2009. INDS '09, 20-21 July 2009, Klagenfurt, pp.54 – 59, E-ISBN: 978-3-8322-7943-1. P. Amit and J. Zambreno, Design and Hardware Implementation of a Chaotic Encryption Scheme for Real-time Embedded, IEEE Conference Publications, International Conference on Signal Processing and Communications (SPCOM), 18-21 July 2010,pp. 1- 5, Bangalore. L. Baoa and al, A New Chaotic System for Image Encryption, IEEE Conference Publications, International Conference on System Science and Engineering (ICSSE), 2012, June 30 2012, Dalian, Liaoning, pp.69 – 73, E-ISBN : 978-1-4673-0943-1. A. Beirami, H. Nejati and Y. Massoud, A Performance Metric for Discrete-Time Chaos-Based Truly Random Number Generators, IEEE Conference Publications, 51st Midwest Symposium on Circuits and Systems, 2008. MWSCAS 2008, 10-13 Aug. 2008, Knoxville, TN, pp.133 – 136, E-ISBN: 978-1-4244-2167-1. M. Bucci and R. Luzzi, Digital post-processing for testable random bit generators, IEEE Conference Publications, 18th European Conference on Circuit Theory and Design, 2007. ECCTD 2007. 27-30 Aug. 2007, Seville, LA, pp. 623 - 626, E.ISBN: 978-1-4244-1342-3. S. Ergun and S. Ozoguz, A Chaos-Modulated Dual Oscillator-Based Truly Random Number Generator, IEEE Conference Publications, IEEE International Symposium on Circuits and Systems, 2007. 27-30 May 2007, New Orleans, LA, pp. 2482 - 2485, E.ISBN: 1-4244-0921-7. C.M. Gonzaleza, H.A. Larrondoa and O.A. Rossob, Statistical complexity measure of pseudorandom bit generators, Physica A, 2005, Vol.354, p. 281-300. X. Jiabxioxg, G. Chen and S. Leang. Shieh, Digital Redesign for Controlling the Chaotic Chua’s Circuit, IEEE Journals & Magazines, IEEE Transactions on Aerospace and Electronic Systems, Oct 1996, Vol.32, Issue.4, pp.1488 – 1500. O. Katz, A. Dan. Ramon, A. Israel. Wagner, A Robust Random Number Generator Based on a Differential Current-Mode Chaos, IEEE Transactions on Very Large Scale Integration (VLSI) Systems, 16 (2008), Issue.12, pp.1677 – 1686, ISSN: 1063-8210. M. Kinga and al, Generation and Testing of Random Numbers for Cryptographic Application, Romanian Academy publication, PROCEEDINGS OF THE ROMANIAN ACADEMY, Series A,Vol.13, Number 4/2012, pp. 368–377. G. Kun, A Synchronization Controller for the Unified Chaotic System and Its Application in Secure Communication, IEEE Conference Publications, International Conference on Consumer Electronics, Communications and Networks (CECNet), 2011, 16-18 April 2011, XianNing, pp.4700 – 4703, P.ISBN: 978-1-61284-458-9. M. Lahcene, A. Ali-Pacha and N. H. Said, Generating a Cryptographically Secure Pseudo-Random Sequence from the Quadratic
2734
[16]
[17]
[18]
[19]
[20]
[21] [22] [23]
[24] [25] [26]
Lahcene Merah et al
Chaotic Map Study and Real Time FPGA Implementation, First International Workshop on Mathematics and Computer Science (IWMCS2012) December 16-17, 2012, Tiaret, Algeria. W. Li and Y. Yuan, Improving Security of an Image Encryption Algorithm based on Chaotic Circular Shift, IEEE Conference Publications, IEEE International Conference on Systems, Man and Cybernetics, 2009. SMC 2009, 11-14 Oct. 2009, San Antonio, TX, pp.3694 – 3698, E-ISBN: 978-1-4244-2794-9. K. Ljupco, J. Goce, T. Zarko, “Chaos and Pseudo-Randomness, Springer, Lecture Notes in Control and Information Science, 292 (2003), 247-264, ISBN: 978-3-540-44986-7. National Institute of Standards and Technology, U.S Department of Commerce, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, Revision 1a, April 2010. F. Pareschi and al, Power analysis of a chaos-based Random Number Generator for cryptographic security, IEEE Conference Publications, IEEE International Symposium on Circuits and Systems, 2009. ISCAS 2009, 24-27 May 2009, Taipei, pp.2858 – 2861, E-ISBN: 978-1-4244-3828-0. H. Shun-Cheng and al, The Cycle Length, Statistical and Key Sensitivity Properties of a Perturbed Couple Chaotic PRBG, IEEE Conference Publications, International Conference on Multimedia Technology (ICMT), 2011, 26-28 July 2011, Hangzhou, pp.3268 – 3272, P.ISBN: 978-1-61284-771-9. K. Viktor, Prasanna and A. Dandalis, FPGA Internet Security, Online Symposium for Electronic Engineers, November 2000. Verbauwhede and M. R. Ingrid, Secure Integrated Circuits and Systems, Springer, 1st Edition, 2010, 246 p. 92 illus. T. Wollinger and P. Christof, Security Aspects of FPGAs in Cryptographic Applications, chapter 1 in New Algorithms, Architectures, and Applications for Reconfigurable Computing, Wolfgang Rosenstiel and Patrick Lysaght (eds.), Kluwer, 2004. Xilinx Inc, System Generator for DSP, Getting Started Guide, UG639 (v 12.4) December 14, 2010. Chua's circuit; available online at http://en.wikipedia.org/wiki/Chua's_circuit Available online at: www.xilinx.com
Received: March 12, 2013