Abstract

With the rapid development of communication technology and the popularization of network, information security has been highly valued by all walks of life. Random numbers are used in many cryptographic protocols, key management, identity authentication, image encryption, and so on. True random numbers (TRNs) have better randomness and unpredictability in encryption and key than pseudorandom numbers (PRNs). Chaos has good features of sensitive dependence on initial conditions, randomness, periodicity, and reproduction. These demands coincide with the rise of TRNs generating approaches in chaos field. This survey paper intends to provide a systematic review of true random number generators (TRNGs) based on chaos. Firstly, the two kinds of popular chaotic systems for generating TRNs based on chaos, including continuous time chaotic system and discrete time chaotic system are introduced. The main approaches and challenges are exposed to help researchers decide which are the ones that best suit their needs and goals. Then, existing methods are reviewed, highlighting their contributions and their significance in the field. We also devote a part of the paper to review TRNGs based on current-mode chaos for this problem. Finally, quantitative results are given for the described methods in which they were evaluated, following up with a discussion of the results. At last, we point out a set of promising future works and draw our own conclusions about the state of the art of TRNGs based on chaos.

Highlights

  • In recent years, with the rapid development of the Internet, the requirements for information security in various elds are getting higher and higher, and the security issues are getting more and more attention [1,2,3,4,5]

  • In the previous section we reviewed the existing true random number generators (TRNGs) based on chaos from a literary and qualitative point of view, i.e., Figure 8 shows a graph of the reviewed methods for the TRNGs based on chaos

  • Discrete time chaos has long been used in TRNG, but recent studies have shown that continuous time oscillators can be used in TRNG. e application of discrete time chaos is well known, but there are few experimental reports on integrated circuits, most of them use FPGA to realize TRNGs

Read more

Summary

Introduction

With the rapid development of the Internet, the requirements for information security in various elds are getting higher and higher, and the security issues are getting more and more attention [1,2,3,4,5]. In the eld of information security, encryption algorithm, and key generation are important factors of encryption system; they must be unpredictable [6,7,8,9]. Random number is an indispensable element, and random number generator (RNG) has important applications in the eld of information security, such as generating parameters of public key cryptosystems (such as ECC, RSA) or image encryption [10,11,12]. Compared with PRNs, TRNs have good statistical characteristics and have good unpredictability. Compared with PRNs, TRNs have good statistical characteristics and have good unpredictability. ey could be used in systems with high security requirements

Objectives
Discussion
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.