Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (58)

Search Parameters:
Keywords = pseudo-random number generator (PRNG)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
56 pages, 2923 KB  
Article
FileCipher: A Chaos-Enhanced CPRNG-Based Algorithm for Parallel File Encryption
by Yousef Sanjalawe, Ahmad Al-Daraiseh, Salam Al-E’mari and Sharif Naser Makhadmeh
Algorithms 2026, 19(2), 119; https://doi.org/10.3390/a19020119 - 2 Feb 2026
Abstract
The exponential growth of digital data and the escalating sophistication of cyber threats have intensified the demand for secure yet computationally efficient encryption methods. Conventional algorithms (e.g., AES-based schemes) are cryptographically strong and widely deployed; however, some implementations can face performance bottlenecks in [...] Read more.
The exponential growth of digital data and the escalating sophistication of cyber threats have intensified the demand for secure yet computationally efficient encryption methods. Conventional algorithms (e.g., AES-based schemes) are cryptographically strong and widely deployed; however, some implementations can face performance bottlenecks in large-scale or real-time workloads. While many modern systems seed from hardware entropy sources and employ standardized cryptographic PRNGs/DRBGs, security can still be degraded in practice by weak entropy initialization, misconfiguration, or the use of non-cryptographic deterministic generators in certain environments. To address these gaps, this study introduces FileCipher. This novel file-encryption framework integrates a chaos-enhanced Cryptographically Secure Pseudorandom Number Generator (CPRNG) based on the State-Based Tent Map (SBTM). The proposed design achieves a balanced trade-off between security and efficiency through dynamic key generation, adaptive block reshaping, and structured confusion–diffusion processes. The SBTM-driven CPRNG introduces adaptive seeding and multi-key feedback, ensuring high entropy and sensitivity to initial conditions. A multi-threaded Java implementation demonstrates approximately 60% reduction in encryption time compared with AES-CBC, validating FileCipher’s scalability in parallel execution environments. Statistical evaluations using NIST SP 800-22, SP 800-90B, Dieharder, and TestU01 confirm superior randomness with over 99% pass rates, while Avalanche Effect analysis indicates bit-change ratios near 50%, proving strong diffusion characteristics. The results highlight FileCipher’s novelty in combining nonlinear chaotic dynamics with lightweight parallel architecture, offering a robust, platform-independent solution for secure data storage and transmission. Ultimately, this paper contributes a reproducible, entropy-stable, and high-performance cryptographic mechanism that redefines the efficiency–security balance in modern encryption systems. Full article
21 pages, 3451 KB  
Article
LBP-LSB Co-Optimisation for Dynamic Unseen Backdoor Attacks
by Zhenyan Luo, Fuxiu Li and Jiao Peng
Electronics 2025, 14(21), 4216; https://doi.org/10.3390/electronics14214216 - 28 Oct 2025
Viewed by 453
Abstract
Aiming at the problems of fixed trigger patterns that are prone to detection in existing invisible backdoor attacks, this paper proposes a backdoor attack method that integrates local binary pattern (LBP) with dynamic randomized least significant bit (LSB) steganography. The multi-bit coding characteristic [...] Read more.
Aiming at the problems of fixed trigger patterns that are prone to detection in existing invisible backdoor attacks, this paper proposes a backdoor attack method that integrates local binary pattern (LBP) with dynamic randomized least significant bit (LSB) steganography. The multi-bit coding characteristic of LBP is leveraged to enrich the representational expressiveness of trigger information within the embedding budget, combined with LSB steganography to maintain visual imperceptibility, and a pseudo-random number generator (PRNG) is introduced to randomize embedding locations to mitigate detectors that rely on fixed-position patterns. Experiments show that the proposed method demonstrates potential advantages in terms of steganography, attack success rate, and anti-detection capability on both CIFAR-10 and Tiny-ImageNet datasets. Among them, the structural similarity index (SSIM) and peak signal-to-noise ratio (PSNR) reach up to 0.98 and above 36 dB in terms of covertness, respectively. In anti-detection experiments, the attack method maintains high attack success rates under D-BR defense (CIFAR-10: Test_ASR > 85%; Tiny-ImageNet: Test_ASR > 95%), while under SPECTRE defense—a spectral-based statistical method—the defender’s leakage detection rate of poisoned samples remains low (CIFAR-10: 5.96%; Tiny-ImageNet: 10.56%). This clearly validates the proposed attack’s robustness against mainstream defense mechanisms. Full article
Show Figures

Figure 1

44 pages, 5324 KB  
Article
Secure Chaotic Cryptosystem for 3D Medical Images
by Antonios S. Andreatos and Apostolos P. Leros
Mathematics 2025, 13(20), 3310; https://doi.org/10.3390/math13203310 - 16 Oct 2025
Cited by 1 | Viewed by 678
Abstract
This study proposes a lightweight double-encryption cryptosystem for 3D medical images such as Magnetic Resonance Imaging (MRI), Positron Emission Tomography (PET) scans, and Computed Tomography scans (CT). The first encryption process uses chaotic pseudo-random numbers produced by a Lorenz chaotic system while the [...] Read more.
This study proposes a lightweight double-encryption cryptosystem for 3D medical images such as Magnetic Resonance Imaging (MRI), Positron Emission Tomography (PET) scans, and Computed Tomography scans (CT). The first encryption process uses chaotic pseudo-random numbers produced by a Lorenz chaotic system while the second applies Cipher Block Chaining (CBC) mode using outputs from a Pseudo-Random Number Generator (PRNG). To enhance diffusion and confusion, additional voxel shuffling and bit rotation operations are incorporated. Various sets of optimized parameters for the Lorenz system are calculated using either a genetic algorithm or a random walk. The master key of the cryptosystem is 672 bits long and consists of two components. The first component is the SHA-512 hash of the input image while the second component consists of the initial conditions of the Lorenz chaotic system and is 160 bits long. The master key is processed by a function that generates fourteen subkeys, which are then used in different stages of the algorithm. The cryptosystem exhibits excellent performance in terms of entropy, NPCR, UACI, key sensitivity, security, and speed, ensuring the confidentiality of personal medical data and resilience against advanced computational threats, and making it a good candidate for real-time 3D medical image encryption in healthcare systems. Full article
(This article belongs to the Special Issue Mathematical Computation for Pattern Recognition and Computer Vision)
Show Figures

Figure 1

16 pages, 9419 KB  
Article
Initial-Offset-Control and Amplitude Regulation in Memristive Neural Network
by Hua Liu, Haijun Wang, Wenhui Zhang and Suling Zhang
Symmetry 2025, 17(10), 1682; https://doi.org/10.3390/sym17101682 - 8 Oct 2025
Viewed by 622
Abstract
Traditional Hopfield neural networks (HNNs) suffer from limitations in generating controllable chaotic dynamics, which are essential for applications in neuromorphic computing and secure communications. Memristors, with their memory-dependent nonlinear characteristics, provide a promising approach to regulate neuronal activities, yet systematic studies on attractor [...] Read more.
Traditional Hopfield neural networks (HNNs) suffer from limitations in generating controllable chaotic dynamics, which are essential for applications in neuromorphic computing and secure communications. Memristors, with their memory-dependent nonlinear characteristics, provide a promising approach to regulate neuronal activities, yet systematic studies on attractor offset behaviors remain scarce. In this study, we propose a fully memristive electromagnetic radiation neural network by incorporating three distinct memristors as external electromagnetic stimuli into an HNN. The parameters of the memristors were tuned to modulate chaotic oscillations, while variations in initial conditions were employed to explore multistability through bifurcation and basin stability analyses. The results demonstrate that the system enables large-scale amplitude control of chaotic signals via memristor parameter adjustments, allowing arbitrary scaling of attractor amplitudes. Various offset behaviors emerge, including parameter-driven symmetric double-scroll relocations in phase space and initial-condition-induced offset boosting that leads to extreme multistability. These dynamics were experimentally validated using an STM32-based electronic circuit, confirming precise amplitude and offset control. Furthermore, a multi-channel pseudo-random number generator (PRNG) was implemented, leveraging the initial-boosted offset to enhance security entropy. This offers a hardware-efficient chaotic solution for encrypted communication systems, demonstrating strong application potential. Full article
(This article belongs to the Topic A Real-World Application of Chaos Theory)
Show Figures

Figure 1

29 pages, 19534 KB  
Article
Variable Fractional-Order Dynamics in Dark Matter–Dark Energy Chaotic System: Discretization, Analysis, Hidden Dynamics, and Image Encryption
by Haris Calgan
Symmetry 2025, 17(10), 1655; https://doi.org/10.3390/sym17101655 - 5 Oct 2025
Cited by 4 | Viewed by 539
Abstract
Fractional-order chaotic systems have emerged as powerful tools in secure communications and multimedia protection owing to their memory-dependent dynamics, large key spaces, and high sensitivity to initial conditions. However, most existing fractional-order image encryption schemes rely on fixed-order chaos and conventional solvers, which [...] Read more.
Fractional-order chaotic systems have emerged as powerful tools in secure communications and multimedia protection owing to their memory-dependent dynamics, large key spaces, and high sensitivity to initial conditions. However, most existing fractional-order image encryption schemes rely on fixed-order chaos and conventional solvers, which limit their complexity and reduce unpredictability, while also neglecting the potential of variable fractional-order (VFO) dynamics. Although similar phenomena have been reported in some fractional-order systems, the coexistence of hidden attractors and stable equilibria has not been extensively investigated within VFO frameworks. To address these gaps, this paper introduces a novel discrete variable fractional-order dark matter–dark energy (VFODM-DE) chaotic system. The system is discretized using the piecewise constant argument discretization (PWCAD) method, enabling chaos to emerge at significantly lower fractional orders than previously reported. A comprehensive dynamic analysis is performed, revealing rich behaviors such as multistability, symmetry properties, and hidden attractors coexisting with stable equilibria. Leveraging these enhanced chaotic features, a pseudorandom number generator (PRNG) is constructed from the VFODM-DE system and applied to grayscale image encryption through permutation–diffusion operations. Security evaluations demonstrate that the proposed scheme offers a substantially large key space (approximately 2249) and exceptional key sensitivity. The scheme generates ciphertexts with nearly uniform histograms, extremely low pixel correlation coefficients (less than 0.04), and high information entropy values (close to 8 bits). Moreover, it demonstrates strong resilience against differential attacks, achieving average NPCR and UACI values of about 99.6% and 33.46%, respectively, while maintaining robustness under data loss conditions. In addition, the proposed framework achieves a high encryption throughput, reaching an average speed of 647.56 Mbps. These results confirm that combining VFO dynamics with PWCAD enriches the chaotic complexity and provides a powerful framework for developing efficient and robust chaos-based image encryption algorithms. Full article
(This article belongs to the Special Issue Symmetry in Chaos Theory and Applications)
Show Figures

Figure 1

23 pages, 6382 KB  
Article
Dynamic Analysis of a Novel Chaotic Map Based on a Non-Locally Active Memristor and a Locally Active Memristor and Its STM32 Implementation
by Haiwei Sang, Qiao Wang, Kunshuai Li, Yuling Chen and Zongyun Yang
Electronics 2025, 14(17), 3374; https://doi.org/10.3390/electronics14173374 - 25 Aug 2025
Viewed by 805
Abstract
The highly complex memristive chaotic map provides an excellent alternative for engineering applications. To design a memristive chaotic map with high complexity, this paper proposes a new three-dimensional memristive chaotic map (named MLM) by cascading and coupling a non-locally active memristor with a [...] Read more.
The highly complex memristive chaotic map provides an excellent alternative for engineering applications. To design a memristive chaotic map with high complexity, this paper proposes a new three-dimensional memristive chaotic map (named MLM) by cascading and coupling a non-locally active memristor with a locally active memristor. The dynamical behaviors of MLM are revealed through phase diagrams, Lyapunov exponent spectra, bifurcation diagrams, and dynamic distribution diagrams. Notably, the internal frequency of MLM exhibits unique LE-controlled behavior and shows an extension of the chaotic parameter range. The high complexity of MLM is validated through the use of Spectral entropy (SE) and C0, and Permutation Entropy (PE) complexity algorithms. Subsequently, a pseudorandom number generator (PRNG) based on MLM is designed. NIST test results validate the high randomness of the PRNG. Finally, the STM32 hardware platform is used to implement MLM, and attractors under different parameters are measured by an oscilloscope, verifying the numerical analysis results. Full article
Show Figures

Figure 1

23 pages, 4588 KB  
Article
Discrete Memristor-Based Hyperchaotic Map and Its Analog Circuit Implementation
by Haiwei Sang, Zongyun Yang, Xianzhou Liu, Qiao Wang and Xiong Yu
Symmetry 2025, 17(8), 1358; https://doi.org/10.3390/sym17081358 - 19 Aug 2025
Viewed by 1014
Abstract
In this paper, control parameters are incorporated into the absolute discrete memristor (A-DM) map proposed by Bao, and its dynamic characteristics are analyzed. Subsequently, the A-DM is introduced into the traditional sine map via parallel coupling to construct a new sine A-DM hyperchaotic [...] Read more.
In this paper, control parameters are incorporated into the absolute discrete memristor (A-DM) map proposed by Bao, and its dynamic characteristics are analyzed. Subsequently, the A-DM is introduced into the traditional sine map via parallel coupling to construct a new sine A-DM hyperchaotic map (SAHM). The dynamics of SAHM are investigated using Lyapunov exponent spectra and bifurcation diagrams, with additional analysis on its multi-stability and symmetry properties. Circuit simulations successfully realize the attractors corresponding to SAHM under typical parameters. Evaluations of SAHM’s complexity, performance comparisons, and its application to pseudorandom number generators (PRNG) demonstrate that SAHM is well-suited for secure encryption scenarios. Full article
(This article belongs to the Special Issue Symmetry/Asymmetry in Chaos Theory and Application)
Show Figures

Figure 1

19 pages, 279 KB  
Article
NTRU-MCF: A Chaos-Enhanced Multidimensional Lattice Signature Scheme for Post-Quantum Cryptography
by Rong Wang, Bo Yuan, Minfu Yuan and Yin Li
Sensors 2025, 25(11), 3423; https://doi.org/10.3390/s25113423 - 29 May 2025
Cited by 3 | Viewed by 2320
Abstract
To address the growing threat of quantum computing to classical cryptographic primitives, this study introduces NTRU-MCF, a novel lattice-based signature scheme that integrates multidimensional lattice structures with fractional-order chaotic systems. By extending the NTRU framework to multidimensional polynomial rings, NTRU-MCF exponentially expands the [...] Read more.
To address the growing threat of quantum computing to classical cryptographic primitives, this study introduces NTRU-MCF, a novel lattice-based signature scheme that integrates multidimensional lattice structures with fractional-order chaotic systems. By extending the NTRU framework to multidimensional polynomial rings, NTRU-MCF exponentially expands the private key search space, achieving a key space size 2256 for dimensions m2 and rendering brute-force attacks infeasible. By incorporating fractional-order chaotic masks generated via a hyperchaotic Lü system, the scheme introduces nonlinear randomness and robust resistance to physical attacks. Fractional-order chaotic masks, generated via a hyperchaotic Lü system validated through NIST SP 800-22 randomness tests, replace conventional pseudorandom number generators (PRNGs). The sensitivity to initial conditions ensures cryptographic unpredictability, while the use of a fractional-order L hyperchaotic system—instead of conventional pseudorandom number generators (PRNGs)—leverages multiple Lyapunov exponents and initial value sensitivity to embed physically unclonable properties into key generation, effectively mitigating side-channel analysis. Theoretical analysis shows that NTRU-MCF’s security reduces to the Ring Learning with Errors (RLWE) problem, offering superior quantum resistance compared to existing NTRU variants. While its computational and storage complexity suits high-security applications like military and financial systems, it is less suitable for resource-constrained devices. NTRU-MCF provides robust quantum resistance and side-channel defense, advancing PQC for classical computing environments. Full article
19 pages, 2429 KB  
Article
Spin-Wheel: A Fast and Secure Chaotic Encryption System with Data Integrity Detection
by Luis D. Espino-Mandujano and Rogelio Hasimoto-Beltran
Mathematics 2025, 13(11), 1712; https://doi.org/10.3390/math13111712 - 23 May 2025
Viewed by 904
Abstract
The increasing demand for real-time multimedia communications has driven the need for highly secure and computationally efficient encryption schemes. In this work, we present a novel chaos-based encryption system that provides remarkable levels of security and performance. It leverages the benefits of applying [...] Read more.
The increasing demand for real-time multimedia communications has driven the need for highly secure and computationally efficient encryption schemes. In this work, we present a novel chaos-based encryption system that provides remarkable levels of security and performance. It leverages the benefits of applying fast-to-evaluate chaotic maps, along with a 2-Dimensional Look-Up Table approach (2D-LUT), and simple but powerful periodic perturbations. The foundation of our encryption system is a Pseudo-Random Number Generator (PRNG) that consists of a fully connected random graph with M vertices representing chaotic maps that populate the 2D-LUT. In every iteration of the system, one of the M chaotic maps in the graph and the corresponding trajectories are randomly selected from the 2D-LUT using an emulated spin-wheel picker game. This approach exacerbates the complexity in the event of an attack, since the trajectories may come from the same or totally different maps in a non-sequential time order. We additionally perform two levels of perturbation, at the map and trajectory level. The first perturbation (map level) produces new trajectories that are retrieved from the 2D-LUT in non-sequential order and with different initial conditions. The second perturbation applies a p-point crossover scheme to combine a pair of trajectories retrieved from the 2D-LUT and used in the ciphering process, providing higher levels of security. As a final process in our methodology, we implemented a simple packet-based data integrity scheme that detects with high probability if the received information has been modified (for example, by a man-in-the-middle attack). Our results show that our proposed encryption scheme is robust to common cryptanalysis attacks, providing high levels of security and confidentiality while supporting high processing speeds on the order of gigabits per second. To the best of our knowledge, our chaotic cipher implementation is the fastest reported in the literature. Full article
(This article belongs to the Special Issue Chaos-Based Secure Communication and Cryptography, 2nd Edition)
Show Figures

Figure 1

19 pages, 6692 KB  
Article
Design and Hardware Implementation of a Highly Flexible PRNG System for NIST-Validated Pseudorandom Sequences
by María de Lourdes Rivas Becerra, Juan José Raygoza Panduro, Edwin Christian Becerra Alvarez, Susana Ortega Cisneros and José Luis González Vidal
Chips 2025, 4(2), 23; https://doi.org/10.3390/chips4020023 - 7 May 2025
Viewed by 1800
Abstract
This work presents the design of a system of a highly flexible pseudorandom number generator system (PRNG) incorporating both conventional and neuro-generators. The system integrates four internal generators with different conditions to produce new output sequences with adequate bits distribution and complexity. Two [...] Read more.
This work presents the design of a system of a highly flexible pseudorandom number generator system (PRNG) incorporating both conventional and neuro-generators. The system integrates four internal generators with different conditions to produce new output sequences with adequate bits distribution and complexity. Two generators function at a frequency of 100 MHz with adjustable frequency settings, while two neuro-generators employ impulse neurons with distinct behaviours at 4 kHz, also modifiable. The proposed system meets 12 statistical randomness standards based on NIST’s (National Institute of Standards and Technology of U. S.) test suite, including the Frequency test, Binary Matrix Rank test, Linear Complexity test, and Random Excursion test, among others. Each resulted in a P-value greater than 0.01, confirming the pseudo-randomness of the generated sequences. The system is implemented on a reconfigurable device FPGA (Field Programmable Gate Array), with a low occupancy percentage, demonstrating its feasibility for various applications. Full article
Show Figures

Figure 1

17 pages, 3936 KB  
Article
Developing Quantum Trusted Platform Module (QTPM) to Advance IoT Security
by Guobin Xu, Oluwole Adetifa, Jianzhou Mao, Eric Sakk and Shuangbao Wang
Future Internet 2025, 17(5), 193; https://doi.org/10.3390/fi17050193 - 26 Apr 2025
Cited by 1 | Viewed by 1545
Abstract
Randomness is integral to computer security, influencing fields such as cryptography and machine learning. In the context of cybersecurity, particularly for the Internet of Things (IoT), high levels of randomness are essential to secure cryptographic protocols. Quantum computing introduces significant risks to traditional [...] Read more.
Randomness is integral to computer security, influencing fields such as cryptography and machine learning. In the context of cybersecurity, particularly for the Internet of Things (IoT), high levels of randomness are essential to secure cryptographic protocols. Quantum computing introduces significant risks to traditional encryption methods. To address these challenges, we propose investigating a quantum-safe solution for IoT-trusted computing. Specifically, we implement the first lightweight, practical integration of a quantum random number generator (QRNG) with a software-based trusted platform module (TPM) to create a deployable quantum trusted platform module (QTPM) prototype for IoT systems to improve cryptographic capabilities. The proposed quantum entropy as a service (QEaaS) framework further extends quantum entropy access to legacy and resource-constrained devices. Through the evaluation, we compare the performance of QRNG with traditional Pseudo-random Number Generators (PRNGs), demonstrating the effectiveness of the quantum TPM. Our paper highlights the transformative potential of integrating quantum technology to bolster IoT security. Full article
Show Figures

Figure 1

25 pages, 37855 KB  
Article
Hyperchaotic System-Based PRNG and S-Box Design for a Novel Secure Image Encryption
by Erman Özpolat, Vedat Çelik and Arif Gülten
Entropy 2025, 27(3), 299; https://doi.org/10.3390/e27030299 - 13 Mar 2025
Cited by 6 | Viewed by 1831
Abstract
A hyperchaotic system was analyzed in this study, and its hyperchaotic behavior was confirmed through dynamic analysis. The system was utilized to develop a pseudo-random number generator (PRNG), whose statistical reliability was validated through NIST SP800-22 tests, demonstrating its suitability for cryptographic applications. [...] Read more.
A hyperchaotic system was analyzed in this study, and its hyperchaotic behavior was confirmed through dynamic analysis. The system was utilized to develop a pseudo-random number generator (PRNG), whose statistical reliability was validated through NIST SP800-22 tests, demonstrating its suitability for cryptographic applications. Additionally, a 16 × 16 S-box was constructed based on the hyperchaotic system, ensuring high nonlinearity and strong cryptographic performance. A comparative analysis revealed that the proposed S-box structure outperforms existing designs in terms of security and efficiency. A new image encryption algorithm was designed using the PRNG and S-box, and its performance was evaluated on 512 × 512 grayscale images, including the commonly used baboon and pepper images. The decryption process successfully restored the original images, confirming the encryption scheme’s reliability. Security evaluations, including histogram analysis, entropy measurement, correlation analysis, and resistance to differential and noise attacks, were conducted. The findings showed that the suggested encryption algorithm outperforms current techniques in terms of security and efficiency. This study contributes to the advancement of robust PRNG generation, secure S-box design, and efficient image encryption algorithms using hyperchaotic systems, offering a promising approach for secure communication and data protection. Full article
(This article belongs to the Section Information Theory, Probability and Statistics)
Show Figures

Figure 1

12 pages, 3410 KB  
Article
Multi-Objective Optimization of a Fractional-Order Lorenz System
by Luis Gerardo de la Fraga
Fractal Fract. 2025, 9(3), 171; https://doi.org/10.3390/fractalfract9030171 - 12 Mar 2025
Cited by 2 | Viewed by 1027
Abstract
A fractional-order Lorenz system is optimized to maximize its maximum Lyapunov exponent and Kaplan-York dimension using the Non-dominated Sorting Genetic Algorithm II (NSGA-II) algorithm. The fractional-order Lorenz system is integrated with a recent process called the “modified two-stage Runge-Kutta” (M2sFRK) method, which is [...] Read more.
A fractional-order Lorenz system is optimized to maximize its maximum Lyapunov exponent and Kaplan-York dimension using the Non-dominated Sorting Genetic Algorithm II (NSGA-II) algorithm. The fractional-order Lorenz system is integrated with a recent process called the “modified two-stage Runge-Kutta” (M2sFRK) method, which is very fast and efficient. A Pseudo-Random Number Generator (PRNG) was built using one of the optimized systems that was obtained. The M2sFRK method allows for obtaining a very fast optimization time and also designing a very efficient PRNG with linear complexity, O(n). The designed PRNG generates 24 random bits at each iteration step, and the random sequences pass all the National Institute of Standards and Technology (NIST) and TestU01 statistical tests, making the PRNG suitable for cryptographic applications. The presented methodology could be extended to any other chaotic system. Full article
(This article belongs to the Special Issue Design, Optimization and Applications for Fractional Chaotic System)
Show Figures

Figure 1

30 pages, 6901 KB  
Article
EPRNG: Effective Pseudo-Random Number Generator on the Internet of Vehicles Using Deep Convolution Generative Adversarial Network
by Chenyang Fei, Xiaomei Zhang, Dayu Wang, Haomin Hu, Rong Huang and Zejie Wang
Information 2025, 16(1), 21; https://doi.org/10.3390/info16010021 - 3 Jan 2025
Cited by 4 | Viewed by 2647
Abstract
With the increasing connectivity and automation on the Internet of Vehicles, safety, security, and privacy have become stringent challenges. In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. Before generating the [...] Read more.
With the increasing connectivity and automation on the Internet of Vehicles, safety, security, and privacy have become stringent challenges. In the last decade, several cryptography-based protocols have been proposed as intuitive solutions to protect vehicles from information leakage and intrusions. Before generating the encryption keys, a random number generator (RNG) plays an important component in cybersecurity. Several deep learning-based RNGs have been deployed to train the initial value and generate pseudo-random numbers. However, interference from actual unpredictable driving environments renders the system unreliable for its low-randomness outputs. Furthermore, dynamics in the training process make these methods subject to training instability and pattern collapse by overfitting. In this paper, we propose an Effective Pseudo-Random Number Generator (EPRNG) which exploits a deep convolution generative adversarial network (DCGAN)-based approach using our processed vehicle datasets and entropy-driven stopping method-based training processes for the generation of pseudo-random numbers. Our model starts from the vehicle data source to stitch images and add noise to enhance the entropy of the images and then inputs them into our network. In addition, we design an entropy-driven stopping method that enables our model training to stop at the optimal epoch so as to prevent overfitting. The results of the evaluation indicate that our entropy-driven stopping method can effectively generate pseudo-random numbers in a DCGAN. Our numerical experiments on famous test suites (NIST, ENT) demonstrate the effectiveness of the developed approach in high-quality random number generation for the IoV. Furthermore, the PRNGs are successfully applied to image encryption, and the performance metrics of the encryption are close to ideal values. Full article
Show Figures

Graphical abstract

27 pages, 71201 KB  
Article
Enhanced Chaotic Pseudorandom Number Generation Using Multiple Bernoulli Maps with Field Programmable Gate Array Optimizations
by Leonardo Palacios-Luengas, Reyna Carolina Medina-Ramírez, Ricardo Marcelín-Jiménez, Enrique Rodriguez-Colina, Francisco R. Castillo-Soria and Rubén Vázquez-Medina
Information 2024, 15(11), 667; https://doi.org/10.3390/info15110667 - 23 Oct 2024
Cited by 4 | Viewed by 2394
Abstract
Certain methods for implementing chaotic maps can lead to dynamic degradation of the generated number sequences. To solve such a problem, we develop a method for generating pseudorandom number sequences based on multiple one-dimensional chaotic maps. In particular, we introduce a Bernoulli chaotic [...] Read more.
Certain methods for implementing chaotic maps can lead to dynamic degradation of the generated number sequences. To solve such a problem, we develop a method for generating pseudorandom number sequences based on multiple one-dimensional chaotic maps. In particular, we introduce a Bernoulli chaotic map that utilizes function transformations and constraints on its control parameter, covering complementary regions of the phase space. This approach allows the generation of chaotic number sequences with a wide coverage of phase space, thereby increasing the uncertainty in the number sequence generation process. Moreover, by incorporating a scaling factor and a sine function, we develop a robust chaotic map, called the Sine-Multiple Modified Bernoulli Chaotic Map (SM-MBCM), which ensures a high degree of randomness, validated through statistical mechanics analysis tools. Using the SM-MBCM, we propose a chaotic PRNG (CPRNG) and evaluate its quality through correlation coefficient analysis, key sensitivity tests, statistical and entropy analysis, key space evaluation, linear complexity analysis, and performance tests. Furthermore, we present an FPGA-based implementation scheme that leverages equivalent MBCM variants to optimize the electronic implementation process. Finally, we compare the proposed system with existing designs in terms of throughput and key space. Full article
(This article belongs to the Section Information and Communications Technology)
Show Figures

Figure 1

Back to TopTop