CN1921376A - Fake random number generator based on parallel TD-ERCS chaos system - Google Patents

Fake random number generator based on parallel TD-ERCS chaos system Download PDF

Info

Publication number
CN1921376A
CN1921376A CN 200510032050 CN200510032050A CN1921376A CN 1921376 A CN1921376 A CN 1921376A CN 200510032050 CN200510032050 CN 200510032050 CN 200510032050 A CN200510032050 A CN 200510032050A CN 1921376 A CN1921376 A CN 1921376A
Authority
CN
China
Prior art keywords
ercs
user key
pseudorandom
binary
sequence
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN 200510032050
Other languages
Chinese (zh)
Other versions
CN100568797C (en
Inventor
盛利元
曹莉凌
贾伟尧
闻姜
陈良款
李更强
李宏言
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Central South University
Original Assignee
Central South University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Central South University filed Critical Central South University
Priority to CNB2005100320509A priority Critical patent/CN100568797C/en
Publication of CN1921376A publication Critical patent/CN1921376A/en
Application granted granted Critical
Publication of CN100568797C publication Critical patent/CN100568797C/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Landscapes

  • Complex Calculations (AREA)

Abstract

The invention relates to a false random number generator of chaotic system, which comprises user key, password converter and seed distributor, parallel TD-ERCS, state sequence mixer modules. Wherein, user key is 16-mode character string, while the output is false random binary sequence; shifting leftwards for b bits, to convert the user key into seed parameter of TD-ERCS chaotic system, shifting rightwards for b bits, to convert the state sequence of TD-ERCS chaotic system into binary false random sequence. The invention uses TD-ERCS chaotic system as core algorism, with transparent design and better statistic property. And it uses parallel structure, while the user key is between 264 and 2672, with better expandable function and compatibility.

Description

Pseudorandom number generator based on parallel TD-ERCS chaos system
[technical field] the invention belongs to network and field of information security technology, is a kind of pseudorandom number generator of chaos system.
[background technology] pseudorandom number generator PRNG (Pseudo-Random Number Generator) is a kind of important password source and cryptographic algorithm.Pseudo random number claims pseudo-random number sequence again, and the algorithm that produces this pseudo random number is called pseudorandom number generator, can realize by software or hardware.There are many methods to produce pseudo random number, machine word calls the turn the common RAND of having table, linear congruence generator LCG (Linear Congruential Generators), linear feedback shift register LFSR (LinearFeed-back Shift Register), ANSI X9.17 pseudorandom number generator; Study often to have randomizer at present based on chaos system.
With constructing pseudorandom number generator after the chaotic signal discretization and forming new cryptographic algorithm is the new direction that chaology is applied to information security field.These algorithms adopt several famous chaos systems, as Logistic mapping, tent mapping.People such as Jakimoski have done analysis to this class algorithm, think that these algorithms compare with DES and also do not have competitiveness, have proposed serial corrective measure.People such as Wong improve algorithm structure by introducing the Hash function, and people such as Li have also proposed remedial measure.In addition, also have based on the circle mapping, based on the index mapping, based on piecewise linear maps, based on compound discrete chaotic system or the like.These algorithms improve in any case, but analyze from the angle of cryptosecurity and statistical property, and all there is fatal defective in they, are unsafe.Chaos system only is necessary condition rather than the adequate condition of the PRNG of safety on its structure cryptography to the sensitiveness of initial condition.
Along with the computer simulation technique based on Monte Carlo method is used to handle increasing physics and engineering problem, and the fail safe of information encryption is more and more higher to the requirement of pseudorandom number generator, and existing method more and more is difficult to adapt to new operational environment and engineering demand.
Sheng Liyuan etc. deliver " based on elliptical reflecting chamber discrete chaotic system and the performance study thereof of cutting delay " literary composition " Acta Physica Sinica " the 53rd phase in 2004, have constructed the new chaos system of a class for designing novel PRNG---cut delay elliptical reflecting chamber mapped system TD-ERCS (Tangent-DelayEllipse Reflecting Cavity map System).Theoretical research shows, TD-ERCS be universe chaos, universe zero correlation, stable even distribution arranged, huge parameter and initial value space are arranged, extremely strong degeneration ability is arranged, have and the various one to one features of conventional cipher algorithm, be a kind of chaos system with good statistical property and security feature.
[summary of the invention] the purpose of this invention is to provide a kind of is core algorithm with the TD-ERCS chaos system, has the pseudorandom number generator of parallel organization.
8. the objective of the invention is to realize with the following methods: on the theoretical research basis of TD-ERCS chaos system, with TD-ERCS is the algorithm that core develops a kind of pseudorandom number generator, comprise user key, password conversion and seed dispenser, parallel TD-ERCS, four parts such as status switch blender.The canonical form of user key is 16 system digit collection; Password conversion and seed dispenser convert user key to the initial condition and the parameter of TD-ERCS chaos system; Parallel TD-ERCS 1~4 TD-ERCS independently arranged side by side, iteration produces 1~4 group of independently status switch under the driving of 1~4 group of different initial condition and parameter respectively, with the original series of these status switches as pseudo random number stream, the password conversion determines that with seed dispenser the parallel counting method of TD-ERCS is: user key length is 16~42 16 system characters, adopts 1 TD-ERCS; User key length is 43~84 16 system characters, adopts 2 TD-ERCS; User key length is 85~126 16 system characters, adopts 3 TD-ERCS; User key length is 127~168 16 system characters, adopts 4 TD-ERCS; The status switch blender with 1~4 group independently status switch become one or two separate pseudorandom binary sequence by certain principle combinations, the pseudorandom binary sequence can further convert numeral, printable character or directly binary sequence output to.This organization plan, provide huge free key space to the user, had good statistical property and security feature, the speed of service is fast, simple in structure, easy to use, and make PRNG have compatibility, extensibility, be used for information encryption and also have upgradability.
[description of drawings]
Fig. 1. pseudorandom number generator algorithm structure schematic diagram of the present invention;
Fig. 2 .IEEE754 standard real number representation method.
The present invention is described in further detail below in conjunction with accompanying drawing.
Execution mode
Among Fig. 1, at first determine password as requested by the user.Again by password conversion and seed dispenser, according to definite parameter μ (0<μ≤1), the initial value x that uses 1~4 TD-ERCS and user key difference assignment is given each TD-ERCS through the b operation of shifting left of the length of user key 0(1≤x 0≤ 1) and α (0<α<π), cut postpone m (m=2,4,5,6 ...).Claim (μ, x 0, α m) is the kind subparameter of TD-ERCS.Each TD-ERCS is under given kind subparameter, by the generation status switch (x separately independently that iterates Ij, k Ij).The status switch blender is earlier with (x Ij, k Ij) normalization, convert standard binary sequence (θ to through dextroposition b operation Ij, β Ij), because θ IjAnd β IjAlso be separate, can be combined into pseudo random streams output by different way.Respectively each part is done detailed explanation below.
(1) user key
User key is represented with K, 16 system digit collection
H={0,1,2,3,4,5,6,7,8,9,a,b,c,d,e,f} (1)
Be the user key significant character, be called for short the H character.
The H character number of K is called the 16 system length of K, uses L (h)Expression.The number of 2 system digits of K correspondence is called the 2 system length of K, represents with L.
The space size of K is [2 64, 2 672].In this space, desirable any one integer of K, so K is not a regular length, but one long be 16~168 H symbol strings, corresponding binary number symbol string is 64~672bit.
(2) password conversion and seed dispenser
Transformation rule must meet number representation and the TD-ERCS character of C++ simultaneously.
According to the IEEE754 standard code, the double precision binary representation of the real number of C++ is made up of three parts, and as shown in Figure 2: represent the 1-bit sign bit with s, the 11-bit that represents with e has inclined to one side exponent bits, and the 52-bit mantissa position of representing with f is by following formula
(-1) S×2 e-1023×1.f 0<e<2047 (2)
Be converted to decimal number and binary number.Make b=1023-e,, b 〉=1 should be arranged according to the kind subparameter of TD-ERCS chaos system and the domain of definition and the normalization requirement of status switch.The position of establishing the f of mantissa again is b 1, b 2, b 3..., b 52, b wherein i=0 or 1.Therefore, one is shown greater than 0 C++ floating decimal numerical table less than 1
2 - b · ( 1 + b 1 2 + b 2 2 + b 3 2 + Λ + b 52 2 ) - - - ( 3 )
Promptly
1 2 b + b 1 2 1 + b + b 2 2 2 + b + b 3 2 3 + b + Λ + b 52 2 52 + b - - - ( 4 )
A Here it is decimal number that the double-precision floating points correspondence of 53 precision is arranged.So the position that can establish the limited precision binary number of a reality again is B 1, B 2, B 2..., B 53, B wherein i=0 or 1, this corresponding binary number is
0.B 1B 2ΛB 53, (5)
Compare with formula (4), have
B 1=0,B 2=0,…,B b=1,
B b+1=b 1,B b+2=b 2,…,B 53=b 53-b (6)
And b 53-b+1, b 52All be omitted.Formula (6) is the technical foundation that user key is converted to the kind subparameter of TD-ERCS, also is the technical foundation that the TD-ERCS status switch is converted to binary sequence.For explaining conveniently, claim B 1, B 2, B 2... be the standard binary sequence.In order to realize conversion, introduce " b that shifts left operation " and " dextroposition b operation ".
Definition 1: if 51-bit among the f of mantissa, 50-bit ..., (51-b+1)-bit is " 0 ", and (51-b)-bit is " 1 ", the right that then the preceding b position of f is moved on to successively f constitutes the new f of mantissa, and such operation is called the b operation of shifting left.
For example
F:000001010100001111 before the displacement ... 10,
Displacement back f:010100001111 ... 10000001,
Here b=6.
The purpose of the b that shifts left operation is the kind subparameter that the user key with binary code representation is converted to the TD-ERCS chaos system that double-precision floating points represents expediently.
Definition 2: 0-bit is set to " 1 " among the f of mantissa, 1-bit, and 2-bit ..., (b-1)-bit all is set to " 0 ", the left side that then the back b position of f is moved on to successively f constitutes the new f of mantissa, and such operation is called dextroposition b operation.
For example
F:010100001111 before the displacement ... 10011000,
Reset and put f:010100001111 ... 10000001,
Displacement back f:000001010100001111 ... 10,
Here b=6.
The purpose of dextroposition b operation is that the status switch of TD-ERCS chaos system that double-precision floating points is represented is converted to the standard binary sequence expediently.
TD-ERCS and line number are by the user key length L (h)Determine regulation: L (h)=16~42,1 TD-ERCS; L (h)=43~84,2 TD-ERCS; L (h)=85~126,3 TD-ERCS; L (h)=127~168,4 TD-ERCS.
Use K i, i=1,2,3,4 represent to distribute among the K codon piece of i TD-ERCS, then K can be expressed as the serial connection of 4 codon pieces, is defined as
K=K 1K 2K 3K 4, (7)
Here, K 1K 2Expression K 1With K 2Serial connection, non-multiplying each other.
In like manner, use K Ij, j=1,2,3,4 expression K iIn distribute to the codon piece of the kind subparameter of j TD-ERCS, K then iCan be expressed as the serial connection of 4 codon pieces, be defined as
K i=K i1K i2K i3K i4,i=1,2,3,4, (8)
K IjAs follows with the corresponding relation and the assignment method of kind of subparameter:
K I1Get 13 H symbols, long 52bit composes to parameter μ as binary code.
The first step is given the f of μ mantissa assignment, i.e. K I1→ f; Second step, 0 → s; The 3rd step is to shift left b operation of f; The 4th step is if b>30 then make b=30; The 5th step, (1023-b) → e.
K I2Get 13 H symbols, long 52bit composes to initial value α as binary code.
The first step is given the f of α mantissa assignment, i.e. K I2→ f; Second step, 0 → s; The 3rd step is to shift left b operation of f; The 4th step, (1023-b) → e; If K I2=0, then the 0-bit of f composes " 1 ", and " 0 " is composed in all the other positions, again according to the operation of the 3rd step.After assignment finished, it was on duty with π doubly.
K I3Get 13 H symbols, long 52bit composes to initial value x as binary code 0
The first step is given x 0The f of mantissa assignment, i.e. K I3→ f; In second step, give sign bit s with the value of the 0-bit among the f; The 3rd step is to shift left b operation of f; The 4th step, (1023-b) → e; If K I3=0, f=+0 then.
K I4Get 3 H symbols, long 12bit composes to cutting delay m according to following formula with integer form
m = 2 K i 4 = 0 4 K i 4 = 1 K i 4 + 3 2 ≤ K i 4 ≤ 4095 , - - - ( 9 )
Like this, K can be write as and 4 corresponding forms that are connected in series of TD-ERCS seed
K=K 11K 12K 13K 14K 21K 22K 23K 24K 31K 32K 33K 34K 41K 42K 43K 44. (10) are giving x 0, when α and μ assignment, because b 〉=1, so follow the b that shifts left to operate always.The regulation key block distributes the back if insufficient section occurs successively, then uses " 0 " to replenish, and promptly the kind subparameter maximum length of each TD-ERCS is 42 H symbols, if curtailment 42 then uses " 0 " to add to 42.
(3) TD-ERCS chaos system
The iterative algorithm of TD-ERCS chaos system carries out according to following steps:
1) given parameter μ, initial value x 0And α, and after cutting delay m, calculate other initial condition data of TD-ERCS successively
y 0 = μ 1 - x 0 2 , - - - ( 11 )
k 0 ′ = - x 0 y 0 μ 2 , - - - ( 12 )
k 0 = tan α + k 0 ′ 1 - k 0 ′ tan α . - - - ( 13 )
2) other state of calculating TD-ERCS, promptly
x n = - 2 k n - 1 y n - 1 + x n - 1 ( μ 2 - k n - 1 2 ) μ 2 + k n - 1 2 , - - - ( 14 )
k n = 2 k n - m ′ - k n - 1 + k n - 1 k n - m ′ 2 1 + 2 k n - 1 k n - m ′ - k n - m ′ 2 , - - - ( 15 )
n=1,2,3,…,
Wherein
k n - m &prime; = - x n - 1 y n - 1 &mu; 2 n < m - x n - m y n - m &mu; 2 n &GreaterEqual; m - - - ( 13 )
y n=k n-1(x n-x n-1)+y n-1, (14)
Here, the state of n<m is called transition state, and the state of n 〉=m is called normal condition.
3) get status switch
x 2m+1,x 2m+2,x 2m+3,…; (15)
k 2m+1,k 2m+2,k 2m+3,…. (16)
Original series as pseudo random sequence.
(4) status switch blender
Enable 4 parallel TD-ERCS, original series (15), (16) are rewritten into
{x ij|i=1,2,3,4;j=1,2,Λ}, (17)
{k ij|i=1,2,3,4;j=1,2,Λ}, (18)
X wherein IjAnd k IjX value and the k value of representing the 2m+j time iteration of i TD-ERCS.Remake conversion and normalized
&theta; ij = arccos ( x ij ) &pi; , ( 0 &le; &theta; ij &le; 1 ) - - - ( 19 )
&beta; ij = 0.5 + arctan ( k ij ) &pi; , ( 0 < &beta; ij < 1 ) - - - ( 20 )
θ IjAnd β IjBe corresponding x IjAnd k IjThe normalization sequence.
Get θ IjAnd β IjFloating number in exponent e, make b=1023-e; Get θ again IjAnd β IjFloating number in the f of mantissa, and it is carried out dextroposition b operation, the binary code of the f of mantissa that gained is new is corresponding θ IjAnd β IjThe standard binary sequence, totally 52, be designated as
&theta; ij = &theta; ij 1 &theta; ij 2 &theta; ij 3 &Lambda; &theta; ij 51 &theta; ij 52 , - - - ( 21 )
&beta; ij = &beta; ij 1 &beta; ij 2 &beta; ij 3 &Lambda;&beta; ijj 51 &beta; ij 52 , - - - ( 22 )
Wherein &theta; ij l = { 0,1 } , &beta; ij l = { 0,1 } , l=1,2,Λ,52。So θ IjAnd β IjAvailable 13 H symbolic representations respectively.
Sequence (21) and (22) of 4 TD-ERCS are mixed, constitute new codeword block, be designated as κ j, desirable following three kinds of plain modes (other way of output does not exemplify one by one).
First kind of mode: because θ IjAnd β IjBe separate, so sequence (21) and (22) can be used as two independently codeword block, promptly
κ j1jθ 2jθ 3jθ 4j. (23) and κ j1jβ 2jβ 3jβ 4j. (24)
The second way: with the alternate serial connection of independent sequence (23) with (24)
κ j=θ 1jβ 1jθ 2jβ 2jθ 3jβ 3jθ 4jβ 4j. (25)
The third mode: with independent sequence (23) and (24) corresponding XOR serial connection
κ j=(θ 1jβ 1j)(θ 2jβ 2j)(θ 3jβ 3j)(θ 4jβ 4j). (26)
Wherein "  " is xor operator, and " () () " expression piece () is connected in series non-multiplying each other with piece ().
At last, by κ jThe codeword block stream that produces
κ 1κ 2κ 3Λκ jΛ, (27)
Be pseudo random sequence or the pseudo random streams that pseudorandom number generator of the present invention produces, it is a pseudorandom binary sequence, abbreviates the TD-ERCS sequence as.
Obviously, analyze from security standpoint, formula (26) is the safest, and 1 sequence also is safe if only export wherein in formula (23) and the formula (24), and the fail safe of formula (25) is low slightly, but the pseudo random streams generation maximum of formula (25) is the twice of preceding two kinds of output intents.
The present invention is core algorithm with TD-ERCS, and the status switch of TD-ERCS chaos system is converted to pseudo random sequence, therefore, the performance of the determined pseudorandom number generator of character of TD-ERCS chaos system, it has following good characteristic:
1) good statistical property: as stable uniform distribution character, the universe zero correlation, independence etc. have been carried out various the analysis showed that such as harmony, distance of swimming characteristic, correlation to formula (27), and this sequence is all than aforesaid various pseudo random sequence excellences.
2) good security feature: as huge key space; Ultra-long period is not so that also test the effective ways of this sequence period at present; There is not the stable short period, just do not have consequent weak key; Extremely strong degeneration ability is arranged, and promptly the computer truncation error can not cause the short period; Good resisting differential analysis ability is arranged.
3) hardware is realized easily: as realizing that with FPGA particularly adopt parallel organization, the random number formation speed is fast, interface capability is good, and function expansibility can be good, expands to the encryption chip of other different purposes easily.
4) easy to use flexible: as easy upgrading, also can produce multiple independently random sequence, key length is fixing, can be by user's any value in the domain of definition, simple in structure, understand easily, be convenient to statistical analysis and safety analysis, thereby the transparency height of algorithm, the user can relievedly use.
Present invention is described with concrete data below.
(1) user key
Get K=7654321fedcba12345678900983456789fedcba012cba987654321 00000abcdeffed, then L (h)=68, the pairing binary system code length of K L=272.
(2) password conversion and seed dispenser
1) that determine TD-ERCS and line number
Because of 43<L h<84, then adopt two TD-ERCS.
2) determine key block
K=K 11K 12K 13K 14K 21K 22K 23K 24
Wherein
K 11=7654321fedcba,K 12=1234567890098,
K 13=3456789fedcba,K 14=012,
K 21=cba9876543210,K 22=0000abcdeffed,
K 23=0000000000000,K 24=000。
Here K 23, K 24Do not have corresponding key block, replenish with " 0 ".
3) give the μ assignment
K 11Corresponding 52bit binary code is 0,111 0,110 0,101 0,100 0,011 0,010 0,001 1,111 11,101,101 1,100 1,011 1010, try to achieve b=2 thus, so s=0, (decimal system: 1021), f=1101 1,001 0,101 0,000 1,100 1,000 0,111 1,111 1,011 0,111 0,010 1,110 1001. is μ to e=01111111101 1=0.4622222.
K 21Corresponding 52bit binary code is 1,100 1,011 1,010 1,001 1,000 0,111 0,110 0,101 01,000,011 0,010 0,001 0000, try to achieve b=1 thus, so s=0, (decimal system: 1022), f=1001 0,111 0,101 0,011 0,000 1,110 1,100 1,010 1,000 0,110 0,100 0,010 0001 is μ to e=01111111110 2=0.7955560.
4) give the α assignment
K 12Corresponding 52bit binary code is 0,001 0,010 0,011 0,100 0,101 0,110 0,111 1,000 10,010,000 0,000 1,001 1000, try to achieve b=4 thus, so s=0, (decimal system: 1019), f=0010 0,011 0,100 0,101 0,110 0,111 1,000 1,001 0,000 0,000 1,001 10,000 001 is α to e=01111111011 1=0.0711111 * π.
K 22Corresponding 52bit binary code is 0,000 0,000 0,000 0,000 1,010 1,011 1,100 1,101 11,101,111 1,111 1,110 1101, try to achieve b=17 thus, so s=0, (decimal system: 1006), f=0101 0,111 1,001 1,011 1,101 1,111 1,111 1,101 1,010 0,000 0,000 0,000 0001 is α to e=01111101110 2=1.02403 * 10 -5* π.
5) give x 0Assignment
K 13Corresponding 52bit binary code is 0,011 0,100 0,101 0,110 0,111 1,000 1,001 1,111 11,101,101 1,100 1,011 1010, try to achieve b=3 thus, so s=0, (decimal system: 1020), f=1010 0,010 1,011 0,011 1,100 0,100 1,111 1,111 0,110 1,110 0,101 1,101 0001 is x to e=01111111100 10=0.2044443.
K 23Corresponding 52bit binary code is 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 00,000,000 0,000 0,000 0000, try to achieve b=53 thus, so s=0, (decimal system: 970) f=0000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0,000 0000 is x to e=01111001010 20=1.110223 * 10 -16
6) give the m assignment
K 14Corresponding 12bit binary code is 0,000 0,001 0010 (decimal system is 18), so m 1=18+3=21.
K 24Corresponding 12bit binary code is 0,000 0,000 0000 (decimal system is 0), so m 2=2.
(4) TD-ERCS chaos system status switch calculates
1) by parameter μ, initial value x 0With α calculating formula (11), (12) and (13),
y 10=0.452459,k 10′=-0.0965378,k 10=0.127852
y 20=0.795556,k 20′=-1.76649×10 -16,k 20=3.2171×10 -5
2) computing mode sequence.
3) get the status switch of first TD-ERCS
x 43,x 44,x 45,…;k 43,k 44,k 45,…。
Status switch with second TD-ERCS
x 5,x 6,x 7,…;k 5,k 6,k 7,…。
Original series as pseudo random sequence.Preceding 20 iterative value of corresponding (15) and formula (16) are listed in table 1 and table 2.
(5) status switch blender
1) the normalization sequence of corresponding (19) and formula (20) is listed in table 1 and table 2.
2) dextroposition b operation is converted to the standard binary sequence with the normalization sequence, and conversion method is with θ 143And θ 25For example is described as follows
θ 143=0.3272315, the exponential sum mantissa of corresponding floating number is respectively e=01111111101, and (decimal system: 1021), f=0100 1,111 0,001 0,101 1,100 0,111 1,111 1,011 1,110 1,000 0,100 00110100.By index calculate b=2, after the dextroposition b operation θ 143The standard binary sequence: θ 143=01,010,011 1,100 0,101 0,111 0,001 1,111 1,110 1,111 1,010 0,001 0,000 1101.
θ 25=0.4997168, the exponential sum mantissa of corresponding floating number is respectively e=01111111101, and (decimal system: 1021), f=1111 1,111 1,011 0,101 1,100 0,011 1,110 1,110 1,111 1,010 0,101 01011100.By index calculate b=2, after the dextroposition b operation θ 25The standard binary sequence: θ 25=0,111 11,111,110 1,101 0,111 0,000 1,111 1,011 1,011 1,110 1,001 0,101 0111.
In like manner can obtain the θ after the dextroposition 144, θ 145, β 143, β 144, β 145, θ 26, θ 27, β 25, β 26, β 27...
3) output pseudo random streams (first kind of pseudo random streams slightly)
Getting second kind of pseudo random streams that this example produced according to formula (25) is:
θ 143β 143θ 25β 25θ 144β 144θ 26β 26θ 145β 145θ 27β 27ΛΛ.
Corresponding binary pseudo-random is:
0101001111000101011100011111111011111010000100001101
1010001101010101000110010001101100000111110001101001
0111111111101101011100001111101110111110100101010111
1000000000001111011011111000000010010001001000110000
1101001110100001000000110111111000011010000100001001
1101011111011101111011100011000001000011101101110010
1000000000111001010111001111010110101110000001001100
0111111111110000100100000111111101101110110000010100
…………。
Getting the third pseudo random streams that this example produced according to formula (26) is:
143β 143)(θ 25β 25)(θ 144β 144)(θ 26β 26)(θ 145β 145)(θ 27β 27)ΛΛ.
Corresponding binary pseudo-random is:
1111000010010000011010001110010111111101110101100100
1111111111100010000111110111101100101111101101100111
0000010001111100111011010100111001011001101010001011
1111111111001001110011001000101010100000110001011000
…………。
Each quantity of state of first TD-ERCS of table 1
Iterations Quantity of state
x k θ β
43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 …… 0.5165083 -0.8554371 -0.5142549 -0.4311952 0.0338635 -0.1149288 0.4178790 -0.6744337 0.9999944 -0.8116496 -0.9997068 -0.9994556 0.3838242 0.8889620 0.5613054 0.6247357 0.9401510 0.8262750 0.9971645 0.8257646 …… 0.4629781 1.8635410 -9.7937160 1.8900870 6.1906220 1.6499190 0.6968748 0.2047368 -0.1481873 1.3762410 16.1530000 0.2975316 -1.2640270 0.5214306 11.7208900 -0.6449082 -0.9031624 -1.7270710 1.3180670 2.3858330 …… 0.3272315 0.8266756 0.6719315 0.6419080 0.4892189 0.5366640 0.3627736 0.7356122 0.0464995 0.8014243 0.9531043 0.9527591 0.3746069 0.1515691 0.3102993 0.2852067 0.1118953 0.1904664 0.0503526 0.1907544 …… 0.6380172 0.8432301 0.0323892 0.8450986 0.9490223 0.8265575 0.6937315 0.5642814 0.4531713 0.7999845 0.9803192 0.5920522 0.2130461 0.6529940 0.9729081 0.3176761 0.2661824 0.1670638 0.7934050 0.8736636 ……
Second each quantity of state of TD-ERCS of table 2
Iterations Quantity of state
x k θ β
5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 …… 0.0008896 -0.0027498 0.0046100 -0.0029116 -0.0097859 0.0409113 -0.0836065 0.0872325 0.0725527 -0.5347132 0.9840011 -0.9323114 0.2842229 0.3603247 -0.2745875 -0.1745816 -0.8679116 -0.9270055 -0.7670402 -0.3623885 …… 0.0007399 -0.0007399 -0.0006756 0.0050509 -0.0123865 0.0170201 -0.0014476 -0.0637645 0.1995629 -0.3493304 0.2241053 0.8634884 -0.2710813 2.3737010 15.4822300 1.6997760 -11.7362100 -5.0560920 -0.5709890 -0.4491105 …… 0.4997168 0.5008753 0.4985326 0.5009268 0.5031150 0.4869739 0.5266439 0.4721977 0.4768855 0.6795803 0.0670505 0.8813469 0.4082644 0.3826659 0.5885413 0.5558573 0.8344783 0.8769365 0.7782705 0.6180386 …… 0.5002355 0.4997645 0.4997850 0.5016077 0.4960575 0.5054171 0.4995392 0.4797306 0.5626992 0.3930230 0.5701755 0.7267235 0.4157372 0.8730841 0.9794688 0.8307286 0.0270567 0.0621536 0.3348561 0.3656369 ……

Claims (7)

1. the pseudorandom number generator of a chaos system, comprise user key, password conversion and seed dispenser, status switch blender algoritic module, it is characterized in that: user key is with 16 system character representations, password conversion and seed dispenser are determined the also line number of TD-ERCS, user key are converted to the kind subparameter of TD-ERCS; Parallel TD-ERCS is formed side by side by 1~4 TD-ERCS chaos system, produces the status switch of system under given kind subparameter by iterative computation; The status switch that the status switch blender produces TD-ERCS chaos system iteration mixes and is converted to the binary system pseudo random streams to be exported.
2. pseudorandom number generator according to claim 1 is characterized in that: the described user key of the kind subparameter space of TD-ERCS is [2 64, 2 672], user key length is value between 64~672bit or 16~168 16 system characters.
3. pseudorandom number generator according to claim 1 is characterized in that: described TD-ERCS kind subparameter comprises parameter μ, initial condition x 0With α, cut and postpone m, the system mode sequence that the iterative equation of the seed parameter system of TD-ERCS chaos TD-ERCS is produced is as the original series of pseudo random number stream.
4. according to claim 1 or 2 or 3 described pseudorandom number generators, it is characterized in that: password conversion and the parallel number of seed dispenser by the definite TD-ERCS of use of the length chaos system of user key, user key with 16 systems converts binary code to again, has by one then binary fraction is converted to the b operation of shifting left of floating-point system decimal function with the kind subparameter of standard binary sequence for each TD-ERCS.
5. pseudorandom number generator according to claim 1 is characterized in that: the described conversion with seed dispenser by password determines that the method for TD-ERCS arranged side by side and line number is: user key length is 16~42 16 system characters, adopts 1 TD-ERCS; User key length is 43~84 16 system characters, adopts 2 TD-ERCS; User key length is 85~126 16 system characters, adopts 3 TD-ERCS; User key length is 127~168 16 system characters, adopts 4 TD-ERCS.
6. according to claim 1 or 4 described pseudorandom number generators, it is characterized in that: the status switch blender has dextroposition b operation that the floating-point system decimal is converted to the binary fraction function by one the status switch of TD-ERCS is converted to the standard binary sequence, these standard binary sequences is arranged in order as the pseudorandom binary sequence exports again.
7. pseudorandom number generator according to claim 6 is characterized in that: three kinds of methods of described pseudorandom binary sequence output are: export two independently the pseudorandom binary sequence, with two independently the alternate serial connection output of pseudorandom binary sequence or with two independently the corresponding XOR serial connection of pseudorandom binary sequence export.
CNB2005100320509A 2005-08-25 2005-08-25 Pseudorandom number generator based on parallel TD-ERCS chaos system Expired - Fee Related CN100568797C (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CNB2005100320509A CN100568797C (en) 2005-08-25 2005-08-25 Pseudorandom number generator based on parallel TD-ERCS chaos system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CNB2005100320509A CN100568797C (en) 2005-08-25 2005-08-25 Pseudorandom number generator based on parallel TD-ERCS chaos system

Publications (2)

Publication Number Publication Date
CN1921376A true CN1921376A (en) 2007-02-28
CN100568797C CN100568797C (en) 2009-12-09

Family

ID=37778963

Family Applications (1)

Application Number Title Priority Date Filing Date
CNB2005100320509A Expired - Fee Related CN100568797C (en) 2005-08-25 2005-08-25 Pseudorandom number generator based on parallel TD-ERCS chaos system

Country Status (1)

Country Link
CN (1) CN100568797C (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834717A (en) * 2010-04-22 2010-09-15 哈尔滨理工大学 Parallel computing method capable of expanding precision Logistic chaotic sequence
CN102135871A (en) * 2011-03-29 2011-07-27 深圳职业技术学院 Device for generating random number by using chaos theory and dynamic password token thereof
CN106155628A (en) * 2015-04-01 2016-11-23 北京南瑞智芯微电子科技有限公司 A kind of Chaotic Random Number Generator and method for generation
CN106209358A (en) * 2016-07-12 2016-12-07 黑龙江大学 A kind of SM4 key schedule based on long key realize system and method

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101834717A (en) * 2010-04-22 2010-09-15 哈尔滨理工大学 Parallel computing method capable of expanding precision Logistic chaotic sequence
CN102135871A (en) * 2011-03-29 2011-07-27 深圳职业技术学院 Device for generating random number by using chaos theory and dynamic password token thereof
CN106155628A (en) * 2015-04-01 2016-11-23 北京南瑞智芯微电子科技有限公司 A kind of Chaotic Random Number Generator and method for generation
CN106155628B (en) * 2015-04-01 2018-12-28 北京南瑞智芯微电子科技有限公司 A kind of Chaotic Random Number Generator and method for generation
CN106209358A (en) * 2016-07-12 2016-12-07 黑龙江大学 A kind of SM4 key schedule based on long key realize system and method

Also Published As

Publication number Publication date
CN100568797C (en) 2009-12-09

Similar Documents

Publication Publication Date Title
CN1136692C (en) Data conversion apparatus and data conversion method
CN1282325C (en) Cryptographic system and method with fast decryption
CN1530824A (en) Device and method for carrying out montgomery mode multiply
CN1728634A (en) The method and apparatus that multiplies each other in the Galois Field and invert equipment and byte replacement equipment
CN1242321C (en) Power residue arithemic unit using Montgomery algorithm
CN1771688A (en) Apparatus and method for encryption and decryption
CN1921376A (en) Fake random number generator based on parallel TD-ERCS chaos system
CN1338166A (en) Public and private key cryptographic method
CN1163814C (en) Digital data converting method
CN1402920A (en) Generation of mathematically constrained key using one-way function
CN1236582C (en) pseudo-random squence generator and associated method
CN1241352C (en) Encryption method for information in binary code
CN1120592C (en) Method for calculating phase shift coefficients of M sequence
CN1178619A (en) Asymmetrical cryptographic communication method and portable object therefor
CN1281023C (en) Method for block-encryption of discrete data
CN1258148C (en) Encryption, decryption method using high security level symmetry secret key algorithm and its encipherer
CN1251444A (en) Efficient block encryption method
CN101036193A (en) Apparatus and method for securely storing data
CN1735858A (en) Method of constructing hyperelliptic curves suitable for cryptographic purposes and cryptographic apparatus using such a method
CN1536769A (en) Random sequence production equipment, encryption/deeneryption equipment and its method and program
CN1180351C (en) Encrypting method for reinforcing disordered block cipher
CN1426191A (en) Swing type block code enciphering method
CN1231013C (en) Encrypt pin generating circuit
Azzaz et al. Design of a New Hardware IP-HLS for Real-Time Image Chaos-Based Encryption.
CN1245695C (en) Type II public pin and code system based on level function

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
C17 Cessation of patent right
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20091209

Termination date: 20100825