In the domain of cryptography, an important role is played by PseudoRandom Number Generators (PRNGs). Designing such generators might be complicated for different reasons: an appropriate formal abstract notion of randomness should be formulated, and after that, it may be hard to design an algorithm that produces such random numbers on a finite state machine. A possible approach to tackle this problem has been proposed and studied in recent works (for instance (Guyeux and Bahi, 2012)), where the authors considered to post-operate on existing PRNGs, using the so-called chaotic iterations, i.e., specific iterations of a boolean function and a shift operator that use the inputted generator. This process has at least two positive aspects : boolean functions avoid the problem of numbers representation (e.g. floating point arithmetic), and it is possible to describe the PRNGs based on chaotic iterations as dynamical systems, with a formal mathematical description. This class of PRNGs has been proven to be useful also for cryptographical applications, after a suitable redefinition of the generators in the cryptographical domain. In this article we propose a Markov chain model of the PRNGs based on chaotic iterations and we will use it to compute the entropy of the proposed generators. Moreover we will prove that the security property is preserved when a cryptographic PRNG is post processed with iterations of a suitable boolean functions.
[1]
Cristobal Rojas,et al.
Probability, statistics and computation in dynamical systems
,
2014,
Math. Struct. Comput. Sci..
[2]
Functionality Classes and Evaluation Methodology for Deterministic Random Number Generators
,
2011
.
[3]
Jacques M. Bahi,et al.
Efficient and cryptographically secure generation of chaotic pseudorandom numbers on GPU
,
2015,
The Journal of Supercomputing.
[4]
Jacques M. Bahi,et al.
On the collision property of chaotic iterations based post-treatments over cryptographic pseudorandom number generators
,
2018,
2018 IEEE Middle East and North Africa Communications Conference (MENACOMM).
[5]
Adrien Richard,et al.
On the Link between Strongly Connected Iteration Graphs and Chaotic Boolean Discrete-Time Dynamical Systems
,
2011,
FCT.
[6]
Jacques M. Bahi,et al.
A Topological Study of Chaotic Iterations Application to Hash Functions
,
2016,
Computational Intelligence for Privacy and Security.