Chaotic Real Number Generator with Quantum Wave Equation
Abstract
:1. Introduction
2. Random Number Generators
3. Quantum Wave Function in Science and Engineering
- Contains all measurable information about the particle.
- If there are particles, the probability should be 1. In other words, the probability of a certain particle to be found at a certain time is 1.
- The wave function and its derivative should be continuous to satisfy the conservation of particles and conservation of momentum, respectively.
- Provides three-dimensional probability distribution.
- Allows the calculation of the effective average value of a given variable.
- The wave function for a free particle is a sinus wave. This means that the position is completely uncertain.
- Their norms should be finite, i.e., they can be normed.
- They must be continuous, univalent, and not divergent.
4. Schrödinger Equation-Based Entropy Source
- (I)
- Free Particle Condition:
- (II)
- Particle Condition in a Box:
5. Random Bit Generator Algorithm
Algorithm 1. Prime Number Parameter Frequency Calculator (PNPFC) |
parameters: pList (Prime Number List) P ← pList loop n to range(P) ListFC[n] ← ((1-i√2)Pn-1-(i√2)Pn)/(Pn(-i√2)(1-i√2)(3-i√2)) endloop // ListFC contains complex number loop n to listFC xPrior ← RandomSelector[0,1] /* xPior is a decimal number xNext ← 4*xPrior*(1-xPrior) between 0 and 1 */ if xNext<0.5 ListPNPFC[n] ← ListFC[n].real else ListPNPFC[n] ← ListFC[n].imag xPrior ← xNext endloop return ListPNPFC |
Algorithm 2. Random Number Generator (RNG) |
parameters: ListPNPFC, t, x wList ← ListPNPFC maxhour ← 60 maxminute ← 60 loop t to maxhour loop w to wList loop x to maxminute lmd ← w k ← 2π/lmd frequency ← (1/√2(cos(wt - kx) + sin(wt - kx))).real frequencyBinaryList ← binary(frequency) endloop endloop endloop return frequencyBinaryList |
6. Analysis Results
7. A Practical Application: One-Time Key-Based Image Encryption Algorithm
- The image is selected in M × N size. The M value denotes the number of rows, and the N value indicates the number of columns. The image contains T = M × N pixels. If the image is a color image, it contains T = 3 × M × N pixels.
- T random numbers are generated using the proposed random number generator. These random numbers are placed in an array of 1 × T size.
- A new mixed sequence is obtained by applying the XOR process to the cells of both sequences in the same position.
- The encryption process is completed by converting the 1 × T size array back to the M × N size image.
8. Conclusions and Discussion
- Exploration of Alternative Chaotic Maps: Investigating different chaotic functions to optimize entropy extraction and improve the efficiency of randomness generation.
- Hybridizing Quantum Entropy Sources: Combining quantum randomness with additional entropy sources to further strengthen the statistical properties of the generator.
- Real-Time Hardware Implementations: Developing FPGA- and ASIC-based implementations to improve processing speed and optimize performance for cryptographic applications.
- Extended Security Evaluations: Conducting additional security tests beyond NIST, such as machine-learning-based randomness assessments, to ensure robustness against evolving attack strategies.
- Quantum-Resilient Cryptographic Applications: Exploring post-quantum cryptographic frameworks that integrate the proposed generator to ensure security against future quantum adversaries.
- The proposed random number generator algorithm successfully meets all the requirements for cryptographic applications.
- The proposed generator shows no weakness in terms of statistical randomness, and it has been shown that it can be used in various practical application areas such as simulation, modeling, and games.
- The unpredictable structure of the proposed generator based on both chaos theory and the Schrödinger equation has been shown to meet critical requirements in cryptographic applications, especially the secret key generator.
- Generator design performed specifically for the Schrödinger equation draws attention to the critical role that quantum wave equations will play in the future to address the cryptographic requirements that will change with the widespread use of quantum computers.
- The use of cryptographic components such as hash functions in the proposed generator mathematically proves that security concerns against attacks are addressed with a provable security model in future designs.
- The fast and high-bit output rate of the proposed generator is an important advantage over similar generators.
- It has been evaluated that the image encryption algorithm designed as a practical application example can successfully provide fast encryption performance and security analysis and can be used in successful designs in different applications in the future.
Author Contributions
Funding
Data Availability Statement
Acknowledgments
Conflicts of Interest
References
- Araki, S.; Wu, J.-H.; Yan, J.-J. A Novel Design of Random Number Generators Using Chaos-Based Extremum Coding. IEEE Access 2024, 12, 24039–24047. [Google Scholar] [CrossRef]
- Muhammad, A.S.; Özkaynak, F. SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs. Symmetry 2021, 13, 824. [Google Scholar] [CrossRef]
- Schindler, W. Random Number Generators for Cryptographic Applications. In Cryptographic Engineering; Koç, Ç.K., Ed.; Springer: Berlin, Germany, 2009; pp. 1–25. [Google Scholar]
- Topaloğlu, F. Development of a New Hybrid Method for Multi-Criteria Decision Making (MCDM) Approach: A Case Study for Facility Location Selection. Oper. Res. 2024, 24, 60. [Google Scholar] [CrossRef]
- Yakut, S.; Tuncer, T.; Özer, A.B. A New Secure and Efficient Approach for TRNG and Its Post-Processing Algorithms. J. Circuits Syst. Comput. 2020, 29, 2050244. [Google Scholar] [CrossRef]
- Eröz, E.; Tanyıldızı, E.; Özkaynak, F. A New Method Based on Particle Swarm Optimization Algorithm to Improve Statistical Randomness Properties. In Proceedings of the 2023 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE), Dubai, United Arab Emirates, 9–10 March 2023; pp. 209–214. [Google Scholar] [CrossRef]
- Eröz, E.; Tanyıldızı, E.; Özkaynak, F. Determination of Suitable Configuration Parameters for Linear Feedback Shift Register Using Binary Bat Optimization Algorithm. In Proceedings of the IEEE EUROCON 2021—19th International Conference on Smart Technologies, Lviv, Ukraine, 6–8 July 2021; pp. 348–351. [Google Scholar] [CrossRef]
- Özkaynak, F. Cryptographically Secure Random Number Generator with Chaotic Additional Input. Nonlinear Dyn. 2014, 78, 2015–2020. [Google Scholar] [CrossRef]
- Paul, G.; Basak, B.; Das, S. Evaluating Quantumness, Efficiency and Cost of Quantum Random Number Generators via Photon Statistics. arXiv 2024, arXiv:2405.14085. [Google Scholar]
- Persohn, K.J.; Povinelli, R.J. Analyzing Logistic Map Pseudorandom Number Generators for Periodicity Induced by Finite Precision Floating-Point Representation. Chaos Solit. Fract. 2012, 45, 238–245. [Google Scholar] [CrossRef]
- Prajapati, R.B.; Panchal, S.D. Enhanced Approach to Generate One Time Password (OTP) Using Quantum True Random Number Generator (QTRNG). Int. J. Comput. Digit. Syst. 2024, 15, 279–292. [Google Scholar] [CrossRef]
- Garipcan, A.M.; Erdem, E. A TRNG Using Chaotic Entropy Pool as a Post-Processing Technique: Analysis, Design, and FPGA Implementation. Analog Integr. Circ. Sig. Process. 2020, 103, 391–410. [Google Scholar] [CrossRef]
- Garipcan, A.M.; Erdem, E. Implementation and Performance Analysis of True Random Number Generator on FPGA Environment by Using Non-Periodic Chaotic Signals Obtained from Chaotic Maps. Arab J. Sci. Eng. 2019, 44, 9427–9441. [Google Scholar] [CrossRef]
- Bikos, A.; Nastou, P.E.; Petroudis, G.; Stamatiou, Y.C. Random Number Generators: Principles and Applications. Cryptography 2023, 7, 54. [Google Scholar] [CrossRef]
- Crocetti, L.; Nannipieri, P.; Di Matteo, S.; Fanucci, L.; Saponara, S. Review of Methodologies and Metrics for Assessing the Quality of Random Number Generators. Electronics 2023, 12, 723. [Google Scholar] [CrossRef]
- Zhao, W.; Chang, Z.; Ma, C.; Shen, Z. A Pseudorandom Number Generator Based on the Chaotic Map and Quantum Random Walks. Entropy 2023, 25, 166. [Google Scholar] [CrossRef] [PubMed]
- Fouzar, Y.; Lakhssassi, A.; Mundugar, R. Secure Video Communication Using Multi-Equation Multi-Key Hybrid Cryptography. Future Internet 2023, 15, 387. [Google Scholar] [CrossRef]
- Jiang, Y.; Shang, T.; Tang, Y.; Liu, J. Quantum Obfuscation of Generalized Quantum Power Functions with Coefficient. Entropy 2023, 25, 1524. [Google Scholar] [CrossRef]
- Feng, W.; Yang, J.; Zhao, X.; Qin, Z.; Zhang, J.; Zhu, Z.; Wen, H.; Qian, K. A Novel Multi-Channel Image Encryption Algorithm Leveraging Pixel Reorganization and Hyperchaotic Maps. Mathematics 2024, 12, 3917. [Google Scholar] [CrossRef]
- Feng, W.; Zhao, X.; Zhang, J.; Qin, Z.; Zhang, J.; He, Y. Image Encryption Algorithm Based on Plane-Level Image Filtering and Discrete Logarithmic Transform. Mathematics 2022, 10, 2751. [Google Scholar] [CrossRef]
- Feng, W.; Wang, Q.; Liu, H.; Ren, Y.; Zhang, J.; Zhang, S.; Qian, K.; Wen, H. Exploiting Newly Designed Fractional-Order 3D Lorenz Chaotic System and 2D Discrete Polynomial Hyper-Chaotic Map for High-Performance Multi-Image Encryption. Fractal Fract. 2023, 7, 887. [Google Scholar] [CrossRef]
- Feng, W.; Zhang, J.; Qin, Z. A Secure and Efficient Image Transmission Scheme Based on Two Chaotic Maps. Complexity 2021, 2021, 1898998. [Google Scholar] [CrossRef]
- Feng, W.; Zhang, J.; Chen, Y.; Qin, Z.; Zhang, Y.; Ahmad, M.; Woźniak, M. Exploiting Robust Quadratic Polynomial Hyperchaotic Map and Pixel Fusion Strategy for Efficient Image Encryption. Expert Syst. Appl. 2023, 246, 123190. [Google Scholar] [CrossRef]
- Qian, K.; Xiao, Y.; Wei, Y.; Liu, D.; Wang, Q.; Feng, W. A Robust Memristor-Enhanced Polynomial Hyper-Chaotic Map and Its Multi-Channel Image Encryption Application. Micromachines 2023, 14, 2090. [Google Scholar] [CrossRef] [PubMed]
- Lin, H.; Deng, X.; Yu, F.; Sun, Y. Grid Multi-Butterfly Memristive Neural Network with Three Memristive Systems: Modeling, Dynamic Analysis, and Application in Police IoT. IEEE Internet Things J. 2024, 99, 29878–29889. [Google Scholar] [CrossRef]
- Lin, H.; Deng, X.; Yu, F.; Sun, Y. Diversified Butterfly Attractors of Memristive HNN with Two Memristive Systems and Application in IoMT for Privacy Protection. IEEE Trans. Comput.-Aided Des. Integr. Circuits Syst. 2024, 44, 304–316. [Google Scholar] [CrossRef]
- Jacak, J.E.; Jacak, W.A.; Donderowicz, W.A.; Jacak, L. Quantum Random Number Generators with Entanglement for Public Randomness Testing. Sci. Rep. 2020, 10, 164. [Google Scholar] [CrossRef]
- Jóźwiak, P.; Jacak, J.E.; Jacak, W.A. New Concepts and Construction of Quantum Random Number Generators. Quantum Inf. Process. 2024, 23, 132. [Google Scholar] [CrossRef]
- Marangon, D.G.; Smith, P.R.; Walk, N.; Paraïso, T.K.; Dynes, J.F.; Lovic, V.; Sanzaro, M.; Roger, T.; De Marco, I.; Lucamarini, M.; et al. A Fast and Robust Quantum Random Number Generator with a Self-Contained Integrated Photonic Randomness Core. Nat. Electron. 2024, 7, 396–404. [Google Scholar] [CrossRef]
- Heisenberg, W. Über den anschaulichen Inhalt der quantentheoretischen Kinematik und Mechanik. Z. Phys. 1927, 43, 172. [Google Scholar] [CrossRef]
- Schmidt, H. Quantum-Mechanical Random-Number Generator. J. Appl. Phys. 1970, 41, 2. [Google Scholar] [CrossRef]
- Wheeler, J.A.; Zurek, W.H. The Physical Content of Quantum Kinematics and Mechanics. In Quantum Theory of Measurement; Princeton University Press: Princeton, NJ, USA, 1927. [Google Scholar]
- Gabriel, C.; Wittmann, C.; Sych, D.; Dong, R.; Mauerer, W.; Andersen, U.L.; Marquardt, C.; Leuchs, G. A Generator for Unique Quantum Random Numbers Based on the Vacuum States. Nat. Photonics 2010, 4, 711–715. [Google Scholar] [CrossRef]
- Herrero-Collantes, M.; Garcia-Escartin, J.C. Quantum Random Number Generators. Rev. Mod. Phys. 2017, 89, 015004. [Google Scholar] [CrossRef]
- Wei, W.; Guo, H. Bias-Free True Random-Number Generator. Opt. Lett. 2009, 34, 1876–1878. [Google Scholar] [CrossRef]
- Dereli, T.; Verçin, A. Kuantum Mekaniği: Temel Kavramlar ve Uygulamaları. TÜBA Ders Kitapları: Ankara, Türkiye, 2014. [Google Scholar]
- Gençoğlu, M.T.; Agarwal, P. Use of Quantum Differential Equations in Sonic Processes. Appl. Math. Nonlinear Sci. 2021, 6, 21–28. [Google Scholar] [CrossRef]
- Gençoğlu, M.T. Complex solutions for Burgers-Like equation. Turk. J. Sci. Technol. 2013, 8, 121–123. [Google Scholar]
- Gümüş, H.; Yılmaz, H. Nonlineer Schrödinger Denkleminin Tam Çözümleri. Turk. J. Appl. Sci. Technol. 2019, 2, 11–19. [Google Scholar]
- Inç, M.; Aliyu, A.I.; Yusuf, A. Optical solitons to the nonlinear Shrödinger’s equation with Spatio-temporal dispersion using complex amplitude ansatz. J. Mod. Opt. 2017, 64, 2273–2280. [Google Scholar] [CrossRef]
- Jorgensen, L.; Cardozo, D.L.; Thibierge, E. Numerical Resolution of The Schrödinger Equation. Master’s Thesis, Normale Supérieure de Lyon, Lyon, France, 2011. [Google Scholar]
- Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E.; Leigh, S.; Levenson, M.; Vangel, M.; Banks, D.; Heckert, A.; et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; US Department of Commerce, Technology Administration, National Institute of Standards and Technology: Gaithersburg, MD, USA, 2010. [Google Scholar]
- Muhammad, Z.M.Z.; Özkaynak, F. An Image Encryption Algorithm Based on Chaotic Selection of Robust Cryptographic Primitives. IEEE Access 2020, 8, 56581–56589. [Google Scholar] [CrossRef]
- Tanyildizi, E.; Özkaynak, F. A New Chaotic S-Box Generation Method Using Parameter Optimization of One-Dimensional Chaotic Maps. IEEE Access 2019, 7, 117829–117838. [Google Scholar] [CrossRef]
- Al-Daraiseh, A.; Sanjalawe, Y.; Fraihat, S.; Al-E’mari, S. Novel, Fast, Strong, and Parallel: A Colored Image Cipher Based on SBTM CPRNG. Symmetry 2024, 16, 593. [Google Scholar] [CrossRef]
- Ge, B.; Ge, G.; Xia, C.; Duan, X. High-Capacity Reversible Data Hiding in Encrypted Images Based on 2D-HS Chaotic System and Full Bit-Plane Searching. Symmetry 2023, 15, 1423. [Google Scholar] [CrossRef]
- Alexan, W.; Chen, Y.-L.; Por, L.Y.; Gabr, M. Hyperchaotic Maps and the Single Neuron Model: A Novel Framework for Chaos-Based Image Encryption. Symmetry 2023, 15, 1081. [Google Scholar] [CrossRef]
- Rabie, O.; Ahmad, J.; Alghazzawi, D. Modified SHARK Cipher and Duffing Map-Based Cryptosystem. Mathematics 2022, 10, 2034. [Google Scholar] [CrossRef]
- Xu, J.; Zhao, B.; Wu, Z. Research on Color Image Encryption Algorithm Based on Bit-Plane and Chen Chaotic System. Entropy 2022, 24, 186. [Google Scholar] [CrossRef] [PubMed]
- Lawnik, M.; Moysis, L.; Volos, C. Chaos-Based Cryptography: Text Encryption Using Image Algorithms. Electronics 2022, 11, 3156. [Google Scholar] [CrossRef]
- Huang, R.; Han, F.; Liao, X.; Wang, Z.; Dong, A. A Novel Intermittent Jumping Coupled Map Lattice Based on Multiple Chaotic Maps. Appl. Sci. 2021, 11, 3797. [Google Scholar] [CrossRef]
- Ozkaynak, F. Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 2018, 92, 305–313. [Google Scholar] [CrossRef]
Requirement | Explanation |
---|---|
R1 | Random numbers should not show any statistical weakness. |
R2 | Knowing the subsets of random numbers should not allow the computation or prediction of the predecessor and successor random numbers. |
R3 | If the internal state value of the random number generator is known or has the possibility of predicting even if the internal state value is not known, it should not be possible to calculate the previous random numbers. |
R4 | If the internal state value of the random number generator is known or has the possibility of predicting even if the internal state value is not known, it should not be possible to calculate the future random numbers. |
NIST Test Name | Random Sequence 1 | Random Sequence 2 | Random Sequence 3 |
---|---|---|---|
Monbiot test | p = 0.79641 | p = 0.68034 | p = 0.82431 |
Frequency within block test | p = 0.7009 | p = 0.79594 | p = 0.38561 |
Runs test | p = 0.74286 | p = 0.94088 | p = 0.75964 |
Longest run ones in a block test | p = 0.011128 | p = 0.48956 | p = 0.37348 |
Binary matrix rank test | p = 1 | p = 1 | p = 1 |
Dft test | p = 0.80431 | p = 0.08449 | p = 0.33069 |
Non-overlapping template match | p = 0.46496 | p = 0.68789 | p = 0.57506 |
Overlapping template matching | p = 0.5839 | p = 0.5839 | p = 0.5839 |
Maurers universal test | p = 0.56922 | p = 0.57023 | p = 0.56932 |
Linear complexity test | p = 1 | p = 1 | p = 1 |
Serial test | p = 0.91661 | p = 0.91625 | p = 0.93046 |
Approximate entropy test | p = 0.88844 | p = 0.93674 | p = 0.59561 |
Cumulative sums test | p = 1 | p = 1 | p = 1 |
Random excursion test | p = 0.83024 | p = 0.97178 | p = 0.6771 |
Random excursion variant test | p = 0.45337 | p = 0.51685 | p = 0.67157 |
Requirement | The Process Used to Meet the Requirement |
---|---|
R1 | Choosing the initial conditions and control parameters of chaotic systems in a way that guarantees the most appropriate randomness with the help of optimization algorithms. Application of the SHA3 function as a finishing technique to output bits. |
R2 | The unpredictable nature of chaotic systems. The statistically unpredictable structure of the Schrödinger equation. |
R3 | SHA3 function is a one-way function. |
R4 | The future trajectories of the changes that can be regarded as insignificant that may occur in the initial conditions of chaotic systems move away from each other at exponential speed. |
Feature | Proposed Generator | Chaotic RNGs | Quantum-Based RNGs |
---|---|---|---|
Unpredictability | High, due to integration of chaos and quantum wave functions | Moderate, depends on chaotic system properties | High, but may require additional post-processing |
Resistance to Brute-Force Attacks | Strong, due to high entropy and unpredictable nature | Moderate, can be predictable under specific conditions | Strong, relies on quantum properties |
Computational Complexity | Moderate to high, requires solving quantum equations | Low to moderate, simple chaotic maps are computationally efficient | High, due to reliance on quantum hardware |
Hardware Requirements | Can be implemented in software, but hardware acceleration may improve performance | Software-based, minimal hardware requirements | Requires specialized quantum hardware |
Randomness Quality | Successfully passes NIST tests with high statistical randomness | Varies, some chaotic RNGs may fail certain statistical tests | Generally strong, but quality depends on entropy source |
Implementation Complexity | Moderate, requires mathematical modeling of chaos and quantum functions | Low, chaotic systems are relatively simple to implement | High, needs specialized knowledge in quantum mechanics |
Potential Applications | Cryptographic key generation, secure communications, high-security environments | Simulation, gaming, low to moderate-security applications | High-security cryptographic applications, quantum computing |
Step | Analysis Explanation | Action(s) in Proposed Cipher |
---|---|---|
1 | Analysis questions related to encryption architecture | |
Analysis Questions 1.a. | The cryptographic principle used for the encryption process in the study is the XOR function. Its mathematical expression is given in Table 1. | |
Analysis Questions 1.b. | ||
Analysis Questions 1.c. | There are no exceptional elements. | |
Analysis Questions 1.c.(I). | There are no exceptional elements. | |
Analysis Questions 1.d. | XOR function has a symmetric structure. This structure very useful for encryption and decryption. | |
Analysis Questions 1.d.(I). | ||
Analysis Questions 1.d.(ii). | ||
2 | Analysis Questions 2. | The only component for the encryption algorithm is XOR. |
3 | Analysis Questions 3. | The XOR function has been proven to be unconditionally secure in cryptology. |
Analysis Questions 3. a. | ||
Analysis Questions 3. b. | ||
Analysis Questions 3. c. | ||
4 | Analysis Questions 4 | The flowchart is given in the simplest form. |
5 | Analysis Questions 5. | There is no secret parameter other than the secret key. |
6 | Analysis Questions 6 | The unique aspect of the proposed algorithm is that the security level is based on the provable design principle. |
7 | Verify that the cryptological properties are guaranteed. | |
Analysis Questions 7.a. | XOR, chaotic system, and Schrödinger equation. | |
Analysis Questions 7.b. | Zig-zag transformation. | |
8 | Analysis Questions 8 | O(n2). |
9 | Analysis Questions 9 | P. |
10 | Analysis Questions 10 | R1, R2, R3, and R4 requirements have been corrected. |
11 | Analysis Questions 11 | It is designed in such a way that the numerical deterioration problem of chaotic systems does not occur, since mode operation prevents this effect. |
12 | Analysis Questions 12 | Only software implementation of the proposed algorithm is realized. |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2025 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Gençoğlu, M.T.; Karaduman, Ö.; Özkaynak, F. Chaotic Real Number Generator with Quantum Wave Equation. Symmetry 2025, 17, 349. https://doi.org/10.3390/sym17030349
Gençoğlu MT, Karaduman Ö, Özkaynak F. Chaotic Real Number Generator with Quantum Wave Equation. Symmetry. 2025; 17(3):349. https://doi.org/10.3390/sym17030349
Chicago/Turabian StyleGençoğlu, Muharrem Tuncay, Özgür Karaduman, and Fatih Özkaynak. 2025. "Chaotic Real Number Generator with Quantum Wave Equation" Symmetry 17, no. 3: 349. https://doi.org/10.3390/sym17030349
APA StyleGençoğlu, M. T., Karaduman, Ö., & Özkaynak, F. (2025). Chaotic Real Number Generator with Quantum Wave Equation. Symmetry, 17(3), 349. https://doi.org/10.3390/sym17030349