Volume 129, Number 3, February 2020
|Number of page(s)||7|
|Published online||26 February 2020|
Security analysis of a random number generator based on a chaotic hyperjerk system
TÜBİTAK - Informatics and Information Security Research Center - PO Box 74, Gebze, Kocaeli, 41470, Turkey
Received: 12 November 2019
Accepted: 11 February 2020
This paper analyzes the security of a random number generator (RNG) based on a 4-D chaotic hyperjerk system. An attack system is designed to reveal the security weaknesses of the proposed chaotic RNG. Knowing the structure of the RNG and observing one of the state variables of the chaotic system, convergence between attack and target systems is demonstrated by applying linear continuous coupling in master-slave synchronization scheme. Output bit sequence of the chaotic RNG is identically reproduced. The feasibility of the attack system is verified through numerical simulations. In this paper, a specific continuous-time chaos-based RNG is targeted as a case study. However, the cryptanalysis method presented in this paper is applicable to any continuous-time or discrete-time chaos-based RNGs. Therefore, this study highlights the security vulnerabilities of chaos-based RNGs and underlines that deterministic chaos itself cannot be considered as an entropy source for generation of random numbers.
PACS: 05.45.-a – Nonlinear dynamics and chaos / 89.70.-a – Information and communication theory / 03.67.Dd – Quantum cryptography and communication security
© EPLA, 2020
Current usage metrics show cumulative count of Article Views (full-text article views including HTML views, PDF and ePub downloads, according to the available data) and Abstracts Views on Vision4Press platform.
Data correspond to usage on the plateform after 2015. The current usage metrics is available 48-96 hours after online publication and is updated daily on week days.
Initial download of the metrics may take a while.