
Sådhanå Ó (2021) 46:8 Indian Academy of Sciences https://doi.org/10.1007/s12046-020-01537-5Sadhana(0123456789().,-volV)FT3](0123456789().,-volV) A modernistic approach for chaotic based pseudo random number generator secured with gene dominance SATHYA KRISHNAMOORTHI1,* , PREMALATHA JAYAPAUL2 and VANI RAJASEKAR3 1 Department of Computer Technology-UG, Kongu Engineering College, Perundurai, India 2 Department of Information Technology, Kongu Engineering College, Perundurai, India 3 Department of Computer Science and Engineering, Kongu Engineering College, Perundurai, India e-mail: [email protected]; [email protected]; [email protected] MS received 18 March 2020; revised 25 September 2020; accepted 17 November 2020 Abstract. Random numbers play a key role in diverse fields of cryptography, stochastic simulations, gaming, etc. Random numbers used in cryptography must satisfy additional properties of forward secrecy. Chaotic systems have been a potential source of random number generators. Both lower (One-dimension) and higher (two, three-dimension) chaotic systems are popularized in the generation of random bit sequences. Higher-order chaotic systems have a higher resistance to attacks owing to multiple dimensional outputs. Logistic map initially designed in one-dimension has been extended to two- dimensions to improve security. This paper proposes to use the concept of biological Gene Dominance to further improvise the randomness of 2D Logistic map. The sequences X and Y are considered to be parent genes that determine the value of parameter ‘r’ for the next iteration. The scatter plot of the proposed 2D Logistic Map with Gene Dominance (2DLMGD) shows almost uniform distribution of points in the region. The generated sequences are statistically tested using NIST SP 800-22 test suite and the results show that all sequences pass the tests. The random sequences are analysed for key sensitivity, information entropy, linear complexity, correlation to verify their conformity for use in cryp- tographic applications. Keywords. Random number generator; chaotic systems; 2D logistic map; gene dominance; statistical test for randomness; security analysis. 1. Introduction impractical for many applications. This lead to the popularization of the use of deterministic algorithms to A sequence of random numbers or random bits plays an produce random-like (pseudo) number sequences with the imperative role in assorted scientific fields of Monte Carlo above-mentioned properties [10–12]. Implementations of Simulations [1, 2], cryptography [3–5], stochastic simula- these deterministic algorithms are effective and platform- tions, gaming [6]. independent. Researchers are then challenged with the Random numbers with a higher degree of disorder find question of choosing good quality seeds and various tech- helpful in generation of keys for symmetric cryptography, niques were proposed to effectively garner the seeds for initialization vector and salt in hashing, the nonce in good results [13–17]. challenge-response. Random number generators are Pseudorandom numbers are generated in many ways for required to possess the following properties: use in various applications. Cryptographic algorithms need random numbers produced from a secure source. It can 1. Uniform distribution of all possible numbers in the either be from a hardware system or a software system. keyspace. Most of the hardware components utilize natural random- 2. The present number generated does not depend on the ness inherent with them and securely process them to past generated sequence. produce a random sequence of bits. Such an example would To produce random number sequence a source of entropy be the use of ring oscillators, Field Programmable Gate is needed. Entropy needs to be truly random like atmo- Array (FPGA) implementations. They were not found to spheric noise, thermal noise and the like [7–9]. Imple- efficient for fast cryptographic applications. mentations of such true random number generators are Researchers started focusing on software-based random number generation. Many ideas were proposed using mathematical systems like de Burjin sequences, Linear *For correspondence Congruential Generators, Mersenne Twister, etc. These 8 Page 2 of 12 Sådhanå (2021) 46:8 systems possess the vulnerability of being more dimension to make the system more complex. 2D Logistic predictable even when a single element in the sequence is map have the parameter ‘r’, that determines the behaviour exposed. Later advancements developed to harness the of the chaotic system. Instead of using single ‘r’ value, this random behaviour of chaotic systems. paper proposes to have two ‘r’ values and at any iteration, Dynamic systems exhibiting chaotic behaviour and being the ‘r’ value to be used is determined by gene dominance. reactive to any slight variations in initial parameters make them a potential candidate for Pseudo Random Number Generators (PRNG). Researchers from around the world 2. Genes and alleles devised the exploitation of various chaotic systems like Logistic map [18], Lorentz chaotic system [19–22], skew Every living organism is made up of cells. Cells carry the tent map [23, 24], saw tooth map [25], quantum chaotic genetic material in the form of chromosomes. The number map [26–28], Henon map [29], zigzag map [30] for pro- of chromosomes in a cell is specific to a species. For an duction of random numbers and in the encryption of digital instance, human beings have 23 pairs of chromosomes in a images. cell that determine every minuscule characteristic of an Of all the chaotic maps in use, Logistic maps were most individual. In the case of eukaryotic amphimixis, an prevalent owing to their simple formulation defined in one organism begins from a single cell ‘zygote’ resulting from dimension [31]. In later stages, a range of solutions was the fertilization of male and female gametes. Gametes are proposed to overcome the downside of the Logistic map haploid cells with half number (n/2) of chromosomes. that are cryptanalyzed in [32–35]. Haploid cells are produced in the process of Mitosis cell In [36]Liet al proposed a reseeding technique in the use division. During fertilization, the chromosomes pair up of the Logistic map to extend the periodicity of the gen- from each parent gamete. erator. The reseeding technique causes small perturbations The chromosomes contain Deoxyribo Nucleic Acid periodically to eliminate the low period and improve the (DNA) that encodes the gene traits for all characteristics. randomness. They also optimized the period selection to For each trait, the zygote carries two genes each from two reseed the generator and their hardware implementation parents. The trait to be expressed is determined by genetic showed a higher throughput of 250 Mbit/s. dominance. A gene can be dominant or recessive. The Chen et al [37] propositioned the design of PRNG based presence of dominant and recessive alleles determines the on digitalization of modified nonlinear Logistic map. They character to be expressed. reduced the computation cost with one multiplication Punnett Square is a helpful tool to show all possible cases operation to compute the orbit. To increase the length of of parents being dominant or recessive. From figure 1 ‘A’ is cycle, the output sequences are scrambled by noise from an a dominant gene, ‘a’ is a recessive gene. Whenever a external PRNG namely Linear Feedback Shift Register dominant gene ‘A’ is present only its character is expres- (LFSR). The generated random bit sequence passed the sed. When both genes are recessive, the recessive gene tests of NIST SP800-22. character is expressed. Murillo-Escobar et al [38] improved the performance of From figure 1, four possible offspring can be inferred as the Logistic map by including a multiplication and modulo 1 operation to the modified logistic map. The histograms AA – Expression of Dominant Allele. and Lyapunov exponents of modified Logistic map have Aa – Expression of Dominant Allele. higher results compared to conventional logistic map. Their results had considerable improvement in terms of statistical tests, security analysis. Multimodal maps were introduced in [39] by Garcı´a- Parent ♂ (Male) Martı´nez et al to generate key streams for digital image genotype encryption. This technique produced probabilistic encryp- tion in which encrypting the same image twice produced A a two different cipher texts. Liu et al [40] constructed a non-stationary time-varied A AA Aa Logistic map by continuously varying the parameter ‘r’ of the chaotic system. This non-stationary logistic map can resist the attack of phase space reconstruction. The value of ‘r’ is driven randomly from the interval [3.5699, 4]. a aA aa In this paper, we propose to use the natural phenomena (Female) of gene dominance in the Logistic Map to improvise the ♀ randomness. Two-dimensional (2D) Logistic Map has been long used in producing random numbers. 2D Logistic map Figure 1. Punnett square. is an extension of traditional Logistic map into a second Sådhanå (2021) 46:8 Page 3 of 12 8 aA – Expression of Dominant Allele. map. The 2D Logistic Map with Gene Dominance aa - Expression of Recessive Allele. (2DLMGD) considers the X and Y sequence as two parents and their genes determine the next value to be expressed for When two different dominant genes are present, a con- ‘r’ parameter. dition called ‘co-dominance’ exists, where the two char- Since Cases 2 and 4 produce plots in a different pattern, acters are expressed equally. this paper proposes to use both values of r i.e. r1 and r2. However, to have a better outcome with improved ran- domness, the values of ‘r’ to be used is determined 3. Two-dimensional logistic map genetically. The point (X, Y) generated in each iteration genetically determine the next ‘r’ value. X and Y sequence One dimensional Logistic map is given by Eq. (1) where ‘r’ have the genes to determine the character ‘r’. The proposed is the parameter that determines the behaviour of a chaotic system is depicted in a block diagram in figure 2. system. When ‘r’ ranges in (3.5699, 4] the system exhibit Initially, X0 and Y0 are assigned a seed value (typically dynamic behaviour.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages12 Page
-
File Size-