Abstract

This paper proposes a theorem to generate chaotic key stream from topologically conjugated maps of Tent Map. In this theorem, the condition for topological conjugation between Tent Map and a class of chaotic maps is first determined. Then, the chaotic attractor of the maps is divided into unequal subintervals, the chaotic orbit is sampled once in time iteration, and, finally, the independently and uniformly distributed phase key stream is obtained. The theoretical and numerical analyses show that the chaotic key stream generated by the proposed theorem successfully is independent and uniform, has a certain complex degree close to the maximum approximate entropy for 2n phase key stream, and satisfies the randomness requirement defined in NIST SP800-22. This theorem can be used in fields such as cryptography and numerical simulation.

1. Introduction

Random number generation is very important in cryptography, especially in key construction. In symmetric and asymmetric cryptosystems, the random number is the primary resource for key generation. Further, random number generators (RNGs) are used to create challenges, nonce, padding bytes, and blinding values in many cryptographic protocols.

There are two basic types of generators that produce random sequences: true random number generators (TRNGs) [1] and pseudorandom number generators (PRNGs) [25]. PRNGs are generally faster than TRNGs, and, therefore, PRNGs are preferable in applications requiring a large number of random numbers.

Chaotic system, characterized by sensitive dependence on initial conditions, similarity to random behavior, continuous broad-band power spectrum, inherent determinism, and simplicity of realization, can be potentially exploited for PRNGs [6, 7]. Most applications of chaotic maps use a one- or multidimensional chaotic map as a PRNG to produce a binary stream, which is then XORed with the plaintext to produce the cipher-text [811]. Thus, the statistical property—independently and identically distributed (IID)—of chaotic key stream plays an important role in avoiding cipher-text attacking.

Tent Map is described by the uniform probability law, and, hence, the statistical independence of successive binary symbols is the main problem to be addressed. Some studies focus on experiments that determine the selection of a suitable Tent Map parameter for different applications where the statistical independence is of interest. The relationship between the Tent Map parameter and the statistical independence decision is indicated in [12]. Complying with the fair coin tossing model in [13], the threshold is given according to the Tent Map parameter to obtain a statistically independent key stream. Other studies have focused on theoretical proofs. Logistic Map is topologically conjugated with Tent Map [14], and, therefore, Hu et al. proposed a method for generating chaotic key stream based on Logistic Map [15]. This key stream is proved to be independent and uniform. AdrianLuca and Vlad provided another method for generating IID samples using Logistic Map by combining discrete noisy channel with the test of independence in contingency tables [16]. Until now, the research for generating IID key stream by topological conjugation has been limited to Logistic Map. However, in our study, we determine a more general condition, under which a class of chaotic systems can produce the IID key stream. Meanwhile, the proof in [14] can be considered as the example for the theorem proposed in this paper.

2. Theorem for Generation of IID Key Streams

In this section, we specify the conditions and process required for a class of topologically conjugated mapping systems of Tent Map to generate the IID key stream.

Definition 2.1 (see [17]). For two one-dimensional maps,we have If there exists a continuous and invertible map , such that , making and , then and are said to be topologically conjugated via .

Lemma 2.2 (see [17]). If and are topologically conjugated via , then and are topologically conjugated via .

Lemma 2.3 (see [17]). If and are topologically conjugated via , and is the probability density function of , then the probability density function of is

Theorem 2.4. For tent map, we have when , and , and are topologically conjugated via
For the map defined by (2.4), we choose as sampling step, that is, , and can generate an independent uniformly distributed chaotic key stream by the following process.(1)If , the chaotic attractor domain is partitioned into subdomains , where ,.(2)If , the chaotic attractor domain is partitioned into subdomains , where ,.(3)Then, chaotic key stream is defined as:if , then .

Proof. (1)  Is Surjective
When ,. If , it can be concluded that when ,. If , it can be concluded that when ,.
Thus, is surjective in its definition domain .
(2) Property of Topological Conjugation
If and are topologically conjugated via , then, according to Definition 2.1,
For Tent Map (2.3) and transformer (2.5), When , for map (2.4), Hence, Thus, .
Hence, and are topologically conjugated via .
(3)  Is Chaotic
To assure the key stream produced by is chaotic pseudorandom number with the potential characters proposed in paragraph 3 in Section 1, we prove the is chaotic now.
As the reference [1820] proposed, the Lyapunov exponents of corresponding orbits of two conjugated interval maps are the same. According to the computing method of Lyapunov exponent if is the Lyapunov exponent of the orbit of through , is the Lyapunov exponent of the orbit of through , and is the conjugation, then [18]. And the largest with respect to changes of is independent of [20].
More precisely, for the map (2.4) established by Theorem 2.4, Tent Map defined by (2.3), and defined by (2.5), we have , and , that is, , thus, Also, for in Tent Map, we have , then
Hence, the largest Lyapunov exponent of is , and the map (2.4) is a chaotic system.
(4) Chaotic Key Stream Is Uniformly Distributed
From Lemma 2.3, the probability density function of is
Therefore, the probability of in the domain is
Thus, the value of chaos has the same probability in each domain, and, hence, chaotic key stream is uniformly distributed.
(5)   Is Independent of (Property of Independence)
In this part, we will show that the value of depends on the subdomains ,  ,  , where is uniformly distributed according to the proof (4), and is independent of the to which belongs.
For simplicity, we will only consider the condition . According to Definition 2.1, Lemma 2.2, and the sampling way , we get that, for , is increasing and has a one-to-one correspondence with , and , then . For is an even function with period 2, then
Thus, when ,
that is, is independent of .
Considering (1) to (5), the theorem proposes a method to establish a class of topologically conjugated maps of Tent Map and can generate independently and uniformly distributed chaotic key stream.

3. Examples of the Theorem 2.4

This section consists of the illustration of the deduction in [14], which is an example of the proposed theorem. To illustrate the effectiveness and feasibility of the proposed theorem, another example is provided to verify the chaotic property, independently and uniformly distributed property, and randomness of key streams. Due to the differences between theoretical values and calculated ones of a chaotic Logistic Map proposed in [21], all the examples are run with MATLAB (R2011a, v7.12) codes on the Window XP (32-bit) or Win7 (32-bit), and all the results are rounded into 4 digits after the decimal point.

Example 3.1. In Theorem 2.4, when ,  ,
This map is the typical Logistic Map , when . It is used in [14] for the generation of key stream. According to Theorem 2.4, when , the , then the proof of Deduction 1 in [14] can be considered as an example of the theorem proposed in this paper.

Example 3.2. In Theorem 2.4, we choose ,, and another chaotic map is obtained as follows: and the transformer is We choose and divide the domain into intervals, each intervals' beginning pot and ending pot is shown in Figure 1. Not similar to the Tent Map, the partition of the attractor domain for i.i.d key stream generation is symmetric and is not uniform equal.

(1) Chaotic Property of Map (3.2)

For map (3.2), we set the initial condition , and the results of 1,000 iterations are shown in Figure 2. It is observed that the values are nonperiodic and are distributed in almost the entire domain.

(2) Independently and Uniformly Distributed Property of

(a) Test [22]

For the chaotic map (3.2) established by Theorem 2.4, we choose and sampling step . After first 5,000 iteration abandoned, we get the 8-phase key stream , where is the lengths of sequence.

We set significance level , then for more than 100000, we get the same threshold , and the results of test are shown in Table 1, where all the results pass the test successfully.

Then we choose 100 random and set as 20,000 to do test. From the results in Figure 3, it can be observed that most of the tests passed and only 3 tests did not pass. As indicated in [12], the choice of initial value has an important impact on the statistical property of the chaotic system. Therefore, we can conclude that the key stream generated from Theorem 2.4 is uniformly distributed under the appropriate initial value.

(b) Approximate Entropy Analysis of

For the chaotic map (3.2) established by Theorem 2.4, we choose and sampling step . After first 5,000 iteration abandoned, we get the 8-phase key stream , where is the lengths of sequence.

According to the algorithm of approximate entropy in [23], we choose length of compared run , filtering level , where is the standard deviation of . For different , we compute the approximate entropy of as shown in Table 2, where all the approximate entropies are close to the largest approximate entropy for 8-ary key stream, which is inferred in [24] and follows Theorem 2 in [23].

Then we choose 100 random and set as 6,000 with the same and to compute the approximate entropy. From the results in Figure 4, it can be observed that the mean approximate entropy of is close to the maximum approximate entropy which shows that the sequence produced by Theorem 2.4 has a certain complex degree.

(3) Randomness Test of Key Streams

In this part, we change into binary sequences to carry out the test of NIST SP800-22 (April 2010), whose 15 tests depict the deviations of a binary sequence from randomness [25]. value, as the probability against the null hypothesis, represents the degree of randomness of the tested sequence. When we choose significance level , if the value is bigger than , it demonstrates that the sequence passes the test and could be considered as random. And the bigger the value is, the more random the sequences are.

First we use the chaotic map (3.2) established by Theorem 2.4 and choose , sampling step . After first 5,000 iteration abandoned, we get the 8-phase key stream , where is the lengths of sequence and . Then we test the binary sequences , which is changed from 8-phase sequence , with NIST SP800-22. The results are shown in Table 3, implying that the key streams produced by theorem can satisfy the random requirements in NIST SP800-22.

Then we choose 100 random and set to do SP800-22 test, and Table 4 lists the mean value and the passing ratio. For the significance level set as 0.01, it means that 99% of test samples pass the tests if the random numbers are truly random. The acceptance region of the passing ratio is given by , where represents the number of the samples tested and is the probability of passing each test [26]. For and , we obtain the confidence interval , that is, . From Table 4, we can get that the computed passing ratio for each test lies inside the confidence interval.

4. Conclusion

In this paper, we propose a new theorem for a class of topologically conjugated maps of Tent Map to generate independently and uniformly distributed key streams. Two examples are provided to validate that the key stream generated by the proposed theorem is theoretically and experimentally provedto beindependently and uniformly distributed. We also conducted experiments for testing the randomness of these key streams, and all the key streams passed the NIST SP800-22 test. In future, this theorem could be applied to information security, numerical simulation, and other fields.