Chaogate Parameter Optimization using Bayesian Optimization and Genetic Algorithm

Chaotic circuits have found application in various research areas, including cryptography. However, more effort has to be made to achieve the properties required for such circuits when it comes to their circuit design. We identify and optimize for regions of chaos in a simple three-transistor system known as a chaogate. We use simulations to study the dynamical behavior of the system treated as a one-dimensional map, and then maximize its chaotic and cryptographic behavior using artificial intelligence. We propose several useful metrics for the chaogate, such as the maximum Lyapunov exponent, and measure these metrics over the transistor parameter space. Finally, we apply Bayesian optimization and Genetic Algorithm to identify various chaogate designs in different technology nodes, which we visualize, compare, and use to propose future research.

[1]  Jan Danckaert,et al.  Simple Two-Transistor Single-Supply Resistor–Capacitor Chaotic Oscillator , 2015, IEEE Transactions on Circuits and Systems II: Express Briefs.

[2]  O. Shoaei,et al.  Design optimization of analog integrated circuits using simulation-based genetic algorithm , 2003, Signals, Circuits and Systems, 2003. SCS 2003. International Symposium on.

[3]  Garrett S. Rose A Chaos-Based Arithmetic Logic Unit and Implications for Obfuscation , 2014, 2014 IEEE Computer Society Annual Symposium on VLSI.

[4]  Sudeshna Sinha,et al.  Chaogates: morphing logic gates that exploit dynamical patterns. , 2010, Chaos.

[5]  Garrett S. Rose,et al.  A two-dimensional chaotic logic gate for improved computer security , 2015, 2015 IEEE 58th International Midwest Symposium on Circuits and Systems (MWSCAS).

[6]  P. Linsay Period Doubling and Chaotic Behavior in a Driven Anharmonic Oscillator , 1981 .

[7]  W L Ditto,et al.  Computing with distributed chaos. , 1999, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[8]  Julien Clinton Sprott,et al.  Simple Autonomous Chaotic Circuits , 2010, IEEE Transactions on Circuits and Systems II: Express Briefs.

[9]  William L. Ditto,et al.  Chaos computing: implementation of fundamental logical gates by chaotic elements , 2002 .

[10]  Takayasu Sakurai,et al.  A simple MOSFET model for circuit analysis , 1991 .

[11]  A. E. Eiben,et al.  Time Efficiency in Optimization with a Bayesian-Evolutionary Algorithm , 2020, Swarm Evol. Comput..

[12]  William L. Ditto,et al.  DYNAMICS BASED COMPUTATION , 1998 .

[13]  Behnam Kia,et al.  A Simple Nonlinear Circuit Contains an Infinite Number of Functions , 2016, IEEE Transactions on Circuits and Systems II: Express Briefs.

[14]  H. Schuster Deterministic chaos: An introduction , 1984 .

[15]  A. Tamasevicius,et al.  Modified Wien-bridge oscillator for chaos , 1995 .

[16]  Igor Mishkovski,et al.  Chaos-Based Public-Key Cryptography , 2011, Chaos-Based Cryptography.

[17]  Mark Mohammad Tehranipoor,et al.  Challenges and Opportunities in Analog and Mixed Signal (AMS) Integrated Circuit (IC) Security , 2017, Journal of Hardware and Systems Security.

[18]  Lars Keuninckx,et al.  Encryption key distribution via chaos synchronization , 2017, Scientific Reports.

[19]  Peter I. Frazier,et al.  A Tutorial on Bayesian Optimization , 2018, ArXiv.

[20]  Piotr Dudek,et al.  Compact discrete-time chaos generator circuit , 2003 .

[21]  Mourad Loulou,et al.  Analog circuit design optimization through the particle swarm optimization technique , 2010 .

[22]  L. Kocarev,et al.  Chaos-based random number generators. Part II: practical realization , 2001 .

[23]  Domenic Forte,et al.  Attack of the Genes: Finding Keys and Parameters of Locked Analog ICs Using Genetic Algorithm , 2020, 2020 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).

[24]  Garrett S. Rose,et al.  Design for Eliminating Operation Specific Power Signatures from Digital Logic , 2019, ACM Great Lakes Symposium on VLSI.

[25]  Garrett S. Rose,et al.  Chaos computing for mitigating side channel attack , 2018, 2018 IEEE International Symposium on Hardware Oriented Security and Trust (HOST).