Abstract

This paper presents an algebraic attack on a chaos-based “true” random bit generator (RBG). A clone system is proposed to analyze the security weaknesses of the RBG and its convergence is proved using master slave synchronization scheme. Secret parameters of the RBG are revealed where the only information available are the structure of the RBG and a scalar time series observed from the chaotic oscillator. Simulation and numerical results verifying the feasibility of the clone system are given. The RBG doesn't fulfill Diehard and NIST-800-22 statistical test suites, not only the next bit but also the same output bit stream of the RBG can be reproduced.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.