Cryptanalyzing a novel pseudorandom number generator based on pseudorandomly enhanced logistic map

In this paper, a security analysis of the novel pseudorandom number generator based on pseudorandomly enhanced logistic map is made, which reveals the existence of serious security problem. Although the assumed safety of this pseudorandom number generator (PRNG) is estimated at $$2^{128}$$2128, it is possible to carry out successful brute-force attack with the complexity of about $$2^{70}$$270. For this reason, analyzed PRNG cannot be considered safe for the use in cryptographic systems.

[1]  Safya Belghith,et al.  Cryptanalysis of a new substitution–diffusion based image cipher , 2010 .

[2]  Dragan Lambić,et al.  Security analysis and improvement of a block cipher with dynamic S-boxes based on tent map , 2015 .

[3]  R. Povinelli,et al.  Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation , 2012 .

[4]  Chengqing Li,et al.  Cryptanalyzing image encryption using chaotic logistic map , 2013, Nonlinear Dynamics.

[5]  A Secure Finger Vein Recognition Algorithm Based on MB-GLBP and Logistic Mapping , 2016, J. Inf. Hiding Multim. Signal Process..

[6]  Gonzalo Álvarez,et al.  Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers , 2011, Chaos-Based Cryptography.

[7]  M. Baptista Cryptography with chaos , 1998 .

[8]  S. Li,et al.  Cryptographic requirements for chaotic secure communications , 2003, nlin/0311039.

[9]  Chengqing Li,et al.  Deciphering an Image Cipher Based on Mixed Transformed Logistic Maps , 2014, Int. J. Bifurc. Chaos.

[10]  L. Cardoza-Avendaño,et al.  A novel pseudorandom number generator based on pseudorandomly enhanced logistic map , 2016, Nonlinear Dynamics.

[11]  Baishan Zhao,et al.  Chaotic Signal Generator Design Based on Discrete System , 2016, J. Inf. Hiding Multim. Signal Process..

[12]  Vinod Patidar,et al.  A new substitution–diffusion based image cipher using chaotic standard and logistic maps , 2009 .

[13]  Phatak,et al.  Logistic map: A possible random-number generator. , 1995, Physical review. E, Statistical physics, plasmas, fluids, and related interdisciplinary topics.

[14]  S. M. Ulam,et al.  On Combination of Stochastic and Deterministic Processes , 1947 .

[15]  Shujun Li,et al.  Breaking a modified substitution-diffusion image cipher based on chaotic standard and logistic maps , 2009, ArXiv.

[16]  Guanrong Chen,et al.  Cryptanalysis of RCES/RSES Image Encryption Scheme , 2004, IACR Cryptol. ePrint Arch..

[17]  Jinhu Lu,et al.  On Cryptanalysis of Fridrich's chaotic image encryption scheme , 2016, ArXiv.

[18]  L. Kocarev,et al.  Logistic map as a block encryption algorithm , 2001 .

[19]  Gonzalo Álvarez,et al.  Some Basic Cryptographic Requirements for Chaos-Based Cryptosystems , 2003, Int. J. Bifurc. Chaos.