Proposal of Pseudo-Random Number Generators Using PingPong256 and Chaos Maps

2021 
Internet of Things (IoT) devices are easily exposed to physical attacks; therefore, their design must consider authentication and encryption. Many authentication and encryption methods use algorithms such as advanced encryption standard (AES) and secure hash algorithm (SHA). A pseudo-random number generator (PRNG) can also be used for authentication and encryption, and linear feedback shift register (LFSR) provides an easy way to generate PRNGs. LFSR allows the mathematical generation of unique values ​​proportional to a given length. However, as LFSR is mathematically predictable, it is not used alone for this purpose. PingPong256 uses a variable clock for LFSR that can generate very long periods. However, LFSRs are still potentially at risk of being attacked by correlation analysis attacks. There are several methods to account these security issues, including chaos maps (such as logistic maps), SHA, and AES. This paper proposes a method of using logistic maps corresponding to PingPong256 and chaos maps. For this purpose, various PingPong256 configurations are proposed and compared to verify the effectiveness of the proposed method. The method was tested using NIST SP800-22.
    • Correction
    • Source
    • Cite
    • Save
    • Machine Reading By IdeaReader
    16
    References
    0
    Citations
    NaN
    KQI
    []