A Pseudo-Random Bit Generator Using Three Chaotic Logistic Maps
A Pseudo-Random Bit Generator Using Three Chaotic Logistic Maps
A Pseudo-Random Bit Generator Using Three Chaotic Logistic Maps
Logistic Maps
Mickael Francois, David Defour
Abstract
A novel pseudo-random bit generator (PRBG) using three chaotic
logistic maps is proposed. The algorithm generates at each iteration
sequences of 32 bit-blocks by starting from randomly chosen initial
seeds. The impact of relying on IEEE 754-2008 floating-point representation format for the generator is also taken into account. The
performance of the generator is evaluated through various statistical
analyses. The results show that the produced sequences possess high
randomness statistical properties and good security level which make
it suitable for cryptographic applications.
Introduction.
focuses primarily on the description of these systems that are often very
simple to define, but whose dynamics appears to be very confused. Indeed,
chaotic systems are characterized by their high sensitivity to initial conditions and some properties like ergodicity, pseudo-random behaviour and high
complexity [Alvarez, 2006]. The extreme sensitivity to the initial conditions
(i.e. a small deviation in the input can cause a large variation in the output)
makes chaotic system very attractive for pseudo-random number generators.
Moreover, during this last decade several pseudo-random number generators
have been successfully developed [Guyeux, 2010, Zheng, 2008, Pareek, 2010,
Patidar, 2009a, Or
ue, 2010]. However, a rigorous analysis is necessary to
evaluate the randomness level and the global security of the generator.
In this paper, a new PRBG using a standard chaotic logistic map is
presented. It combines three logistic maps involving binary64 floating-point
arithmetic and generates block of 32 random bits at each iteration. An efficient process based on permutations among values produced by the three
logistic maps and xor operation anyhilate the collision problem that may
appear while using several logistic map based on the same function. The
produced pseudo-random sequences have successfully passed the various statistical tests. The assets of the generator are: high sensitivity to initial seed
values, high level of randomness and good throughput. The paper is structured as follows, a brief introduction of floating-point arithmetic and the
used chaotic logistic map is given in Sec. 2. Section 3, presents a detailed
description of the algorithm. The statistical analysis applied on two groups
of generated pseudo-random sequences is given in Sec. 4. The global security
analysis of the PRBG is achieved in Sec. 5, before concluding.
2
2.1
Background
IEEE 754-2008 standard.
Digital computers represent numbers in sets of binary digits. For real numbers, two formats of representations can be distinguished : fixed-point format and floating-point format. The fixed-point format is designed to represent and manipulate integers or real numbers with a fixed precision. In
the case of real numbers with variable precision, the representation is made
through the floating-point format. There exists a standard that defines the
arithmetic formats, the rounding rules, the operations and the exception
handling for floating-point arithmetic.
The IEEE 754-2008 [IEEE, 2008] is the current version of the technical
standard used by hardware manufacturer to implement floating-point arithmetic. Among them, binary32 and binary64 which correspond to single and
double precision format are the two most widely used and implemented formats. As the generator described herein relies exclusively on binary64, we
will only consider this format in the rest of this article.
2
Binary64 comprises two infinities, two kinds of NaN (Not a Number) and
the set of finite numbers. Each finite number is uniquely described by three
integers: s a sign represented on 1 bit, e a biased exponent represented on
11 bits and m a mantissa represented on 52 bits where the leading bit of
the significand is implicitly encoded in the biased exponent (see figure 1).
To make the encoding unique, the value of the significand m is maximized
by decreasing e until either e = emin or m 1. After this process is
done, if e = emin and 0 < m < 1, the floating-point number is subnormal.
Subnormal numbers (and zero) are encoded with a reserved biased exponent
value. Interested readers will find a good introduction to floating point
arithmetic and issues that arise while using it in [Goldberg, 1991]
sign
exponent
mantissa
mantissa0
63
62
52
mantissa1
51
32 31
2.2
(1)
with between 3.57 and 4.0 [Bose, 1999]. This function have been widely
studied [Weisstein, Eric W.] and several pseudo-random number generators
have already used this logistic map [Bose, 1999, Baptista, 1998, Patidar, 2009a,
Cecen, 2009, Xuan, 2011]. To avoid non-chaotic behavior (island of stability, oscillations, ...), the value of is fixed to 3.9999 which corresponds to a
highly chaotic case [Pareek, 2006]. The chaotic logistic map is used under
the iterative form:
Xn+1 = 3.9999Xn (1 Xn ), n 0,
(2)
where the initial seed X0 is a real number belonging to the interval ]0, 1[.
All the output elements Xn are also real numbers in the interval ]0, 1[.
The main idea of the proposed PRBG is to combine several chaotic logistic
maps and carefully arrange them in the same algorithm in order to increase
the security level compared to others PRBG such as [Patidar, 2009a]. It
generates a block of 32 random bits per iteration using the following three
logistic maps :
Xn+1 = 3.9999Xn (1 Xn ), n 0,
(3)
Yn+1 = 3.9999Yn (1 Yn ), n 0,
(4)
Zn+1 = 3.9999Zn (1 Zn ), n 0.
(5)
For the three chaotic maps, the same value of is chosen to maintain its
surjectivity in the same interval. For each computed value Xn , Yn and Zn ,
we used binary64 floating-point representation format as in Fig. 1.
The technical details of the implementation in C using definitions from
the file ieee754.h are given in Algorithm 1. The algorithmic principle of the
PRBG consists in three steps:
1. Line 2; Three different starting seed values X0 , Y0 and Z0 are carefully
chosen to avoid colision (see section 3.1).
2. Line 3-8; The results of the 30 first iterations of the three chaotic
logistic maps are discared to have sufficient chaotic behavior among
them (see section 3.2).
3. Line 9-50; Iterate N times, N being the length of the output sequence
in blocks of 32 bits to:
(a) Line 10-12; Compute the three logistic maps.
(b) Line 13-21; For each logistic map, save the bits of mantissa0 and
mantissa1 in two different variables.
(c) Line 23-48; Start another loop of length 32 on the bits of mantissa1
and in each case, select one bit at a time using the value of
mantissa0. For more security, the value of the mantissa0 of the
element Zn is used to index the bits of the mantissa1 of Xn , the
value of the mantissa0 of Xn to index the bits of mantissa1 of Yn
and the value of mantissa0 of Yn to index those of the mantissa1
in Zn . The three selected bits are combined by a xor operator
to give the output bit (Line 35-46). The selected bit is then permuted with the bit at the end of chain to not be used again. At
the end of the last loop, a 32-bit bloc is generated.
3.1
Seeds selection.
The choice of the starting seed values should not be neglected. We are using
a logistic map where input and ouput value belong to the interval ]0, 1[. The
main idea of this article is to use three identical logistic maps in order to
increased the robustness of the generator. To preserve such robustness, we
have to avoid collision that may occur with incorrect initial values that will
leads to identical series of numbers.
4
(6)
Yn+1 = Yn (1 Yn ),
(7)
which is equivalent to
Yn+1
2Xn 2 Xn
= Xn+1 1 +
.
(1 Xn )
1 2Xn
,
Xn
which means that when = X1n 2, then at the next iteration we will have
Yn+1 = Xn+1 corresponding to a collision. To avoid this case the selection
of the three seeds has to be done in the interval ]0, 21 [.
The difference at the next iteration is minimal when Xn is close to 21 .
In this case, the difference between Xn+1 and Yn+1 is :
Yn+1 Xn+1 = Xn (1 Xn 2Xn ),
and its limit as Xn approaches 21 is
lim (Yn+1 Xn+1 ) =
Xn 21
2
.
4
3.2
We have plotted in figure 2 the obtained trajectory of the logistic map with a
small seed (X0 = 1015 ). One can observe that for the first iterations of the
process, the trajectory is not chaotic. This is because, the initial difference
between two successive values, spreads slowly toward the leading bit of the
mantissa. Thus, to decorrelate the beginning of the output sequences among
the three logistic maps, it is necessary to discard the first iterations before
starting the generation.
We have exhaustively tested for each input values X0 in the interval
53
]2 , 21 [ and Y0 = X0 (1+225 ), the minimum
number
of iterations k which
|Xk Yk |
is necessary to reach the condition log2
> 1. This condition
Xk
corresponds to loose all the initial leading bits of correlation between X0 and
Y0 . We measured that on average 25.4 iterations are required. Therefore,
to decorrelate the beginning of the considered sequences and increase the
security level of the PRBG, we choose that the generation will start from
the 31st iteration.
Statistical analysis.
For any secure PRBG, the output sequences must have a high level of randomness and be completely decorrelated from each other. Therefore, a statistical analysis based on the randomness level and correlation should be
carefully conducted to prove the quality of the sequences.
4.1
Randomness evaluation.
Evolution of positions X n
1
0.8
0.6
0.4
0.2
0
0
20
40
60
80
100
120
140
160
180
200
Iteration n
Figure 2: Trajectory of the chaotic logistic map given in Eq. 2 for n = 200
and X0 = 1015 .
generators [Rukhin, 2010]. For each statistical test, a set of pvalue is produced and is compared to a fixed significance level = 0.01. A pvalue of
zero indicates that, the tested sequence appears to be not random. A pvalue
larger than means that, the tested sequence is considered to be random
with a confidence level of 99%. Therefore, a sequence passes a statistical
test for pvalue and fails otherwise. If at the same time more than one sequence is tested, each statistical test defines a proportion as the ratio of sequences passing successfully the test relatively to the total number of tested
sequences T (i.e. = n[pvalue 0.01]/T ). The proportion is compared to
an acceptable proportion accept which corresponds to the ratio of sequences
that should pass the test. The range of acceptable proportions, excepted
for the tests Random Excursion-(Variant)
p is determined by using the confidence interval defined as (1 0.01) 3 0.01(1 0.01)/T [Rukhin, 2010].
To analyse several aspects of the sequences, the NIST tests are applied on:
individual sequences, concatenated sequence and resulting sequences.
1. Individual sequences: all the produced sequences are individually tested
and the results are given as ratio of success relatively to the threshold
accept . Such test indicates the global randomness level of generated
sequences.
2. Concatenated sequence: a new sequence of binary size 32 N T is
constructed by concatenating all the individual sequences. The randomness level of the constructed sequence is also analysed with the
NIST tests. In the case of truly decorrelated random sequences, the
7
4.2
Correlation evaluation.
The correlation evaluation is done in two different ways. Firstly, the correlation between generated sequences is analysed globally by computing the
Pearsons correlation coefficient of each pair of sequences [Patidar, 2011].
Consider a pair of sequences given by: S1 = [x0 , . . . , xN 1 ] and S2 =
[y0 , . . . , yN 1 ]. Therefore, the corresponding correlation coefficient is:
NP
1
(xi x) (yi y)
CS1 ,S2 =
NP
1
i=0
1/2 N 1
1/2 ,
P
(xi x)2
(yi y)2
i=0
(8)
i=0
NP
1
xi /N and y =
i=0
NP
1
yi /N the
i=0
M
1
X
(xj yj ),
(9)
j=0
where xj (resp. yj ) are the elements of S1b (resp. S2b ). In the case of truly
random binary sequences, such distance is typically around M/2, which gives
a proportion (i.e. d(S1b , S2b )/M ) of about 0.50. For each pair of produced sequences, this proportion is determined and all values are represented through
8
4.3
In the case of very distant seed values, the chaotic trajectories are very
different, which usually allows to obtain good pseudo-random sequences.
That is why the analysis is achieved on sequences produced from nearby or
successive seed values. Here, two groups of pseudo-random sequences are
considered. The binary length of each sequence is 32 N with N = 1024
and the total number of sequences per group is T = 15000. The first group
(GRP1) is generated from the seed values X0 = 11015 , Y0 = 21015 and
Z0 = 3 1015 where each new sequence is obtained with the same values of
X0 , Y0 and by incrementing of 1015 the last seed value Z0 . For the second
group (GRP2), the same strategy is applied to the starting seeds X00 =
0.325873724698325, Y00 = 0.325873724698326 and Z00 = 0.325873724698327.
A simple loop on the latest seed values Z0 and Z00 allows to generate the
two groups of sequences GRP1 and GRP2. The aim is to show whatever the
structure of the initial seeds, the PRBG produces sequences of high quality.
4.3.1
The results of NIST tests obtained on the two groups of 15000 sequences
are presented in Table 1 and Table 2, respectively. For individual sequences
(resp. resulting sequences), the acceptable proportion should lie above
0
accept = 98.75% (resp. accept
= 98.04% ). For the tests Non-Overlapping
and Random Excursions-(Variant), only the smallest percentage of all under
tests is presented. In the case of individual sequences, the Universal test is
not applicable due to the size of sequences. One can remark that for the
two groups GRP1 and GRP2, all the tested sequences pass successfully the
NIST tests. These results show clearly the quality of the produced sequences
from successive seed values.
4.3.2
Concerning the correlation analysis, the Pearsons correlation coefficient between each pair of the 15000 produced sequences is computed. For each
group, the corresponding histogram is presented in Fig. 3. One can see
that, the two histograms have the same shape and show that the computed
coefficients are very close to 0. For the group GRP1 (resp. GRP2), around
99.02% (resp. 99.00%) of the coefficients have an absolute value smaller
than 0.08. The histograms show that the correlation between the produced
sequences is very small.
About the correlation analysis using the Hamming distance, for each pair
of the 15000 produced sequences, the proportion of places where the bits
9
Indiv. Seq.
Result
99.06 Success
99.11 Success
99.08 Success
99.00 Success
98.93 Success
98.99 Success
98.86 Success
98.90 Success
99.26 Success
99.00 Success
98.93 Success
98.75 Success
98.75 Success
98.91 Success
99.06 Success
98.98 Success
10
Concat.
pvalue
0.338497
0.673515
0.589087
0.408891
0.343876
0.417880
0.788352
0.609162
0.012083
0.175000
0.366163
0.138980
0.100729
0.043821
0.158943
0.367717
0.975515
Seq.
Result
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Result. Seq.
0
Result
99.31 Success
98.92 Success
99.21 Success
99.21 Success
99.02 Success
99.02 Success
98.63 Success
98.24 Success
98.04 Success
98.92 Success
98.43 Success
98.14 Success
98.12 Success
97.71 Success
99.12 Success
98.92 Success
98.73 Success
Indiv. Seq.
Result
99.09 Success
99.14 Success
99.16 Success
99.00 Success
98.99 Success
98.92 Success
99.01 Success
98.75 Success
99.27 Success
99.02 Success
99.02 Success
96.29 Success
97.53 Success
98.92 Success
99.04 Success
98.99 Success
11
Concat.
pvalue
0.408718
0.458897
0.239274
0.494016
0.025894
0.281249
0.806842
0.673608
0.012472
0.711625
0.149652
0.532585
0.060350
0.134550
0.291906
0.196383
0.215418
Seq.
Result
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Success
Result. Seq.
0
Result
98.73 Success
98.63 Success
98.63 Success
99.02 Success
98.82 Success
99.12 Success
99.12 Success
98.73 Success
98.04 Success
99.12 Success
98.53 Success
98.33 Success
98.52 Success
98.73 Success
99.60 Success
99.51 Success
99.60 Success
12
GRP1
GRP2
Frequency (in %)
10
8
6
4
2
0
0.05
0.1
0.05
0.1
GRP1
GRP2
Frequency (in %)
12
10
8
6
4
2
0
0.485
0.49
0.495
0.5
0.505
0.51
0.515
Hamming distance
tions show that all the proportions are around 50%. For the group GRP1
(resp. GRP2), around 98.45% (resp. 99.98%) of the coefficients belong to
]0.488, 0.512[. The values for GRP2 are better, because of the entropy of seed
values. Such analysis provides another indication about the decorrelation
between the generated sequences.
12
Security analysis.
5.1
Key space.
It is generally accepted that, today a key space of size smaller than 2128 is
not secure enough. A good generator should have a large key space, to have
a high diversity of choices in the generation of the pseudo-random sequence.
The proposed PRBG combines three chaotic logistic maps.
We have set the conditions for seeds selection in section 3.1. The seed
X0 is a binary64 floating-point number selected from the interval ]253 , 21 [.
This corresponds to 252 different combinations of mantissa times 51 different
values for the exponent, which gives 51 252 different seeds. The seeds Y0
and Z0 are selected such that there is a relative difference of 226 among
each seeds. This means that Y0 is selected in a space of 51252 226 possible
seeds and Z0 in a space of 51 252 227 different numbers. The total space
of seeds is approximately 2173 .
5.2
Key sensitivity.
The sensitivity related to the key (here the seed values) is an essential aspect
for chaos-based PRBG. Indeed, a small deviation in the starting seeds should
cause a large change in the pseudo-random sequences. In other words, even
with a small difference on seed values, the output sequences should be completely uncorrelated. Actually in the test of correlation (Sec. 4.3.2), the seed
sensitivity was already tested due to the successive seed values. To bring an
additional analysis, a large pseudo-random sequences of size N = 5000000
(i.e. 160000000 in binary) are considered. A sequence S1 is produced by
using the seed values X0 = 1 1015 , Y0 = 2 1015 and Z0 = 4 1015 .
Two others sequences S2 and S3 are produced with X00 = X0 , Y00 = Y0 , Z00 =
00
00
00
3 1015 and X0 = X0 , Y0 = Y0 , Z0 = 5 1015 , respectively. The set
of the three produced sequences is denoted KS1. The same approach is
achieved from another set of sequences denoted KS2. The first sequence
is generated with X0 = 0.328964524728163, Y0 = 0.423936234268352 and
Z0 = 0.267367904037358. The two supplementary sequences are obtained
by decrementing and incrementing of 1015 the last seed. In both cases, the
13
analysis is done using the linear correlation coefficient of Pearson, the correlation coefficient of Kendall [Kendall, 1970] and the Hamming distance. The
same analysis is conducted on the sets KS1 and KS2 by using the algorithm
proposed by Patidar et al [Patidar, 2009a], with the parameter = 3.9999.
As the algorithm uses only two chaotic logistic maps, for each set of sequences only the last two seed values are considered. The results are given
in Table 3 and show that, for the proposed algorithm the correlation coefficient values are close to 0 and the proportion of elements that differ in
sequences are around 50%. The results show also that, the sequences are
highly correlated for the Patidars algorithm.
Table 3: Pearsons and Kendalls correlation coefficients and Hamming
distance (in term of proportion) between large output sequences S1 , S2 , S3
produced from slightly different initial seeds.
PRBG
Set
KS1
Proposed
algorithm
KS2
KS1
Patidar et al.
algorithm
KS2
Tests
Pearson Corr.
Kendall Corr.
Ham. Dist.
S1 /S2
0.000422
0.000150
0.499985
S1 /S3
0.000201
0.000437
0.500064
S2 /S3
0.000127
0.000141
0.500033
Pearson Corr.
Kendall Corr.
Ham. Dist.
Pearson Corr.
Kendall Corr.
Ham. Dist.
0.000423
0.000116
0.500002
0.329043
0.233170
0.333416
0.000235
0.000025
0.500055
0.329214
0.231704
0.333362
0.000583
0.000199
0.499931
0.329024
0.231653
0.333366
Pearson Corr.
Kendall Corr.
Ham. Dist.
0.329542
0.231709
0.333284
0.329417
0.232413
0.333324
0.330055
0.231693
0.333354
14
Frequency
Block-Frequency
Cumulative Sums (1)
Cumulative Sums (2)
Runs
Longest Run
Rank
FFT
Non-Overlapping
Overlapping
Universal
Approximate Entropy
Random Excursions
Random Ex-Variant
Serial (1)
Serial (2)
Linear Complexity
Proposed algo.
KS1
KS2
pvalue
pvalue
0.888272 0.189097
0.013966 0.409511
0.851269 0.250461
0.723802 0.375858
0.239428 0.196619
0.341867 0.124501
0.690933 0.468857
0.704824 0.837336
0.014372 0.017263
0.544746 0.513071
0.693543 0.467674
0.534042 0.087565
0.016321 0.014831
0.014383 0.013285
0.532881 0.383964
0.508815 0.828262
0.956706 0.189871
15
Patidar et al algo.
KS1
KS2
pvalue
pvalue
0.218594 0.933359
1.000000 1.000000
0.343496 0.679001
0.284913 0.757413
0.000000 0.000000
0.000000 0.000000
0.611764 0.788756
0.000000 0.000000
0.000000 0.000000
0.000000 0.000000
0.000000 0.000000
0.000000 0.000000
0.013588 0.000622
0.125754 0.038526
0.000000 0.000000
0.000000 0.000000
0.817657 0.400909
5.3
5.4
A crucial element for any PRBG based chaos, is to ensure that the sequences
are always generated from strong keys. Therefore, a careful study of the
chaotic regions in the space of initial seeds is necessary in order to avoid weak
or degenerate keys. The first task is to choose a logistic map, with parameter
that contributes to have an excellent chaotic behaviour of the function. To
avoid redundancy on the chaotic trajectories, initial seed values have to be
taken in the interval ]253 , 21 [ with a difference > 226 between them. To
prove the quality of outputs, two groups consisting of 15000 sequences are
produced using successive seed values. The seeds close to the interval bound
expected to be weak are also tested. The various statistical tests clearly
show the quality of tested sequences. Thus, these regions are considered as
homogeneously chaotic, allowing to choose independently the seed values in
the interval ]253 , 21 [. Therefore, the proposed generator does not present
weak or degenerate keys.
5.5
Speed analysis.
5.6
Speed (Mbit/s)
44.1120
40.0000
0.4844
Attacks.
Brute-force attack.
Differential attack.
Such technique of cryptanalysis was introduced by Biham and Shamir [Biham, 1993].
As a chosen-plaintext attack, its principle is to analyse and exploit the effect of a small difference in input pairs on the difference of corresponding
output pairs. This strategy allows to find the most probable key that was
used to produce the pseudo-random sequence. Given two inputs I and I 0
17
(e.g. X0 , Y0 , Z0 and X00 , Y00 , Z00 ) and the corresponding outputs O and O0 ,
the most commonly used differences are:
1. Subtraction modulus: the differences related to both inputs and outputs are defined by in = |I I 0 | and out = |O O0 |, respectively.
Here, for inputs the difference can be computed between (X0 , X00 ),
(Y0 , Y00 ) and (Z0 , Z00 ) and for outputs, the difference can be computed
between the two pseudo-random sequences relatively to the bits or
blocks of bits.
2. Xor difference: defined by in = I I 0 and out = O O0 .
The diffusion aspect on the initial conditions is then measured by a differential probability. However, in the design of the algorithm, the decorrelation
of outputs was taken into account by choosing the initial seed values in
]253 , 21 [ (with > 226 ) and by making 30 iterations before the beginning of the generation. Moreover, the results of the analyses showed that
even with a small difference on the seeds, the produced outputs are almost
independent from each other. Thus, the proposed PRBG should resist to
the differential attack.
5.6.3
Guess-and-determine attack.
18
Conclusions.
References
[Sun, 2009] Sun, F., and S. Liu (2009). Cryptographic pseudo-random sequence from the spatial chaotic map. Chaos Solitons Fractals, 41(5),
22162219.
[Weisstein, Eric W.] Weisstein, Eric W. Logistic Map. From MathWorld
A Wolfram Web Resource., http://mathworld.wolfram.com/
LogisticMap.html.
[Goldberg, 1991] Goldberg, D. (1991). What every computer scientist
should know about floating-point arithmetic ACM Computing Surveys,
23(1),548.
[Miyazaki, 2010] Miyazaki, T. and Araki, S. and Uehara, S. (2010). A study
on differences in properties of the logistic maps over integers affected
by rounding. Information Theory and its Applications (ISITA), 2010
International Symposium on, 10830835.
19
[Pareek, 2010] Pareek, N.K., Patidar, V., and K.K. Sud (2010). A Random
Bit Generator Using Chaotic Maps. International Journal of Network
Security, 10(1), 3238.
[Patidar, 2009a] Patidar, V., and K.K. Sud (2009a). A Pseudo Random Bit
Generator Based on Chaotic Logistic Map and its Statistical Testing.
Informatica 33, 441452.
[Or
ue, 2010] Or
ue, A.B., Alvarez,
G., Guerra, A., Pastor, G., Romera, M.,
and F. Montoya (2010). Trident, a new pseudo random number generator based on coupled chaotic maps. Computational Intelligence in Security for Information Systems, Advances in Intelligent and Soft Computing, 85, 183190.
[Bose, 1999] Bose, R., and A. Banerjee (1999). Implementing Symmetric
Cryptography Using Chaos Functions, in: Proceedings of the 7th International Conference on Advanced Computing and Communications
318321.
[Baptista, 1998] Baptista, M.S. (1998). Cryptography with chaos. Physics
Letters A, 240(1-2), 5054.
[Cecen, 2009] Cecen, S., Demirer, R.M., and C. Bayrak (2009). A new hybrid nonlinear congruential number generator based on higher functional power of logistic maps. Chaos, Solitons and Fractals, 42(2), 847
853.
[Xuan, 2011] Xuan, S., Zhang, G., and Y. Liao (2011). Chaos-based true
random number generator using image. in: IEEE International Conference on Computer Science and Service System (CSSS), Nanjing, China,
21452147.
[Pareek, 2006] Pareek, N.K., Patidar, V. and K.K. Sud (2006). Image encryption using chaotic logistic map. Image and Vision Computing,
24(9), 926934.
[IEEE, 2008] IEEE Standard for Floating-Point Arithmetic. IEEE Std 7542008, 158.
[Rukhin, 2010] Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker,
E., Leigh, S., Levenson, Vangel, M., Banks, D., Heckert, A., Dray, J.,
and S. Vo (2010). A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special
Publication Revision 1a.
[Patidar, 2011] Patidar, V., Pareek, N.K., Purohit, G., and K.K. Sud
(2011). A robust and secure chaotic standard map based pseudorandom
20
21
22