New key-stream generation scheme based on Hénon chaotic system

Fang-jun Huang , Yu-qian Zhao

Journal of Central South University ›› 2013, Vol. 20 ›› Issue (7) : 1904 -1908.

PDF
Journal of Central South University ›› 2013, Vol. 20 ›› Issue (7) : 1904 -1908. DOI: 10.1007/s11771-013-1689-2
Article

New key-stream generation scheme based on Hénon chaotic system

Author information +
History +
PDF

Abstract

As known to all that Hénon chaotic system is not appropriate for generating the key-streams because it has non-uniformly distributed output signal, a new key-stream generation scheme based on Hénon chaotic system is presented. In order to get the key-streams with good statistics and long enough cycle length, a specific method for dividing the Hénon attractor into numerous non-overlapping sub-regions, and a new one-to-one mapping strategy between the divided sub-regions and elements of dynamically generated matrix consisting of 0’s and 1’s are proposed. Experimental results demonstrate that the generated key-streams are with long enough cycle length and very sensitive to the initial values and secret keys. For example, key-streams with the cycle length of 1032 can easily be obtained. Moreover, even if the fluctuation to the initial values or secret keys is as small as 10−14, uncorrelated key-streams will be generated. Experimental results also demonstrate that the generated key-streams have good randomness and they can pass all the standard criteria specified in FIPS PUB 140-2 with no less than 98%.

Keywords

chaotic system / key-stream / randomness / cycle length

Cite this article

Download citation ▾
Fang-jun Huang, Yu-qian Zhao. New key-stream generation scheme based on Hénon chaotic system. Journal of Central South University, 2013, 20(7): 1904-1908 DOI:10.1007/s11771-013-1689-2

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

HenonM. A two-dimensional mapping with a strange attractor [J]. Communications in Mathematical Physics, 1976, 50(1): 69-77

[2]

ErdmannD, MurphyS. Hénon stream cipher [J]. Electronics Letters, 1992, 28(9): 893-895

[3]

ForreR. The Hénon attractor as a key stream generator [C]. Abstracts of Eurocrypt’91. Brighton, UK, 199176-80

[4]

ZhouL-h, FengZ-jin. A new idea of using one-dimensional PWL map in digital secure communications-Dual resolution approach [J]. IEEE Transactions on Circuits and Systems: Part II, 2000, 47(10): 1107-1111

[5]

SunF-y, LvZ-w, LiuS-tang. A new cryptosystem based on spatial chaotic system [J]. Optics Communications, 2010, 283(10): 2066-2073

[6]

YinR-m, YuanJ, YangQ-h, ShanX-m, WangX-qin. Discretization of coupled map lattices for a stream cipher [J]. Tsinghua Science and Technology, 2011, 16(3): 241-246

[7]

ZhuC-xu. A novel image encryption scheme based on improved hyperchaotic sequences [J]. Optics Communications, 2012, 285(1): 29-37

[8]

AlvarezG, LiS-jun. Some basic cryptographic requirements for chaos-based cryptosystems [J]. International Journal of Bifurcation and Chaos, 2006, 6(8): 2129-2151

[9]

KwokH S, TangW K S. A fast image encryption system based on chaotic maps with finite precision representation [J]. Chaos, Solutions and Fractals, 2007, 32(4): 1518-1529

[10]

GuanZ-h, HuangF-j, GuanW-jie. A general chaos-based key stream generator [J]. Circuits Systems Signal Processing, 2005, 24(5): 549-555

[11]

MayR M. Simple mathematical models with very complicated dynamics [J]. Nature, 1976, 261(10): 459-474

[12]

SangT, WangR-l, YanY-xun. Perturbance-based algorithm to expand cycle length of chaotic key stream [J]. Electronics Letters, 1998, 34(9): 873-874

[13]

Security Requirements for Cryptographic ModulesFIPS PUB 140-2, NIST [EB/OL], 2001

[14]

TongX-j, CuiM-gen. Image encryption with compound chaotic sequence cipher shifting dynamically [J]. Image and Vision Computing, 2008, 26(6): 843-850

[15]

SunF-y, LiuS-tang. Cryptographic pseudo-random sequence from the spatial chaotic map [J]. Chaos, Solitons and Fractals, 2009, 41(5): 2216-2219

[16]

PareekN K, PatidarV, SudK K. A random bit generator using chaotic maps [J]. International Journal of Network Security, 2010, 10(1): 32-38

[17]

ZhuZ-w, ZhouJ-jiang. Super-resolution reconstruction of synthetic-aperture radar image using adaptive-threshold singular value decomposition technique [J]. Journal of Central South University of Technology, 2011, 18(3): 809-815

AI Summary AI Mindmap
PDF

177

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/