Abstract

This paper proposes three types of one-dimensional piecewise chaotic maps and two types of symmetrical piecewise chaotic maps and presents five theorems. Furthermore, some examples that satisfy the theorems are constructed, and an analysis and model of the dynamic properties are discussed. The construction methods proposed in this paper have a certain generality and provide a theoretical basis for constructing a new discrete chaotic system. In addition, this paper designs a pseudorandom number generator based on piecewise chaotic map and studies its application in cryptography. Performance evaluation shows that the generator can generate high quality random sequences efficiently.

1. Introduction

Chaos, as a nonlinear deterministic dynamic system with external complex phenomena due to its inherent randomness, has been widely considered and intensively studied. In the 1870s, the mathematician Li and his tutor Yorke put forward the definition of chaos in the famous article “Period Three Contains Chaos” [1], that is, the Li–Yorke chaos discrimination theorem. Then, a chaotic discrimination theorem, namely, Marotto’s theorem, that is more suitable for high-dimensional discrete dynamic systems, was given by Marotto [2]. These two theorems provide an important theoretical basis on which later scholars have studied one-dimensional discrete chaotic systems [24]. Since 1989, chaotic systems have been widely used in the field of secure communication due to their sensitivity to the initial values or parameters, ergodicity, and randomness-like properties [58]. After constructing a new chaotic system, we can use it to design a new chaotic pseudorandom number generator (CPRNG). Therefore, it is of great theoretical and practical significance to study and construct a new chaotic system.

In many studies on one-dimensional discrete chaotic systems, piecewise chaotic mapping has gradually attracted scholars’ attention. Among them, piecewise linear chaotic mapping has a simpler form in chaotic systems, and because of its relatively good uniformity, it is easy to implement by fixed point algorithms with limited digital precision, which is convenient for its application in the fields of cryptography and communication [9]. As a typical one-dimensional piecewise linear discrete system, the tent map is a basic example for the promotion and application of chaotic theory systems. Many scholars have constructed other chaotic systems based on the tent map. In [10], a new one-dimensional piecewise chaotic map was constructed by combining a tent map with a logistic map. In [11], a class of oblique tent maps was improved, and it was proved that the chaotic system has excellent dynamic key space and practicability, making it more suitable for secure communication and other fields [12], based on the deformation of a tent map, provides piecewise linear chaotic mapping, and uses the period three theorem and topological conjugation theory to construct quadratic polynomial chaotic mapping and realize homogenization of a chaotic sequence.

For the study of piecewise nonlinear mapping, most approaches involve theoretical analyses of a system’s own dynamic characteristics and periodic phenomena [13, 14] or piecewise transformations based on known chaotic mapping. In [15], a class of one-dimensional piecewise nonlinear discrete dynamic systems under modulo operation is constructed, and the improved Marotto’s theorem is used to give a general theory of the chaotic behavior of piecewise nonlinear functions with nonzero origin. Reference [16] built a piecewise nonlinear chaotic mapping system based on logistic mapping so that the system parameters have a larger value range and better uniformity. Reference [17] discussed the branch of chaotic attractors in piecewise smooth one-dimensional mapping with a large number of switching manifolds based on different nonlinear smoothing models and applied it in the field of electronic science.

In the field of cryptography, the research of pseudorandom number generator based on chaotic system mainly focuses on the following aspects: proposing new chaotic system and designing controller to realize chaotic synchronization [18] and improving the existing chaotic system to enhance its complexity and make it have greater Lyapunov [19, 20]. Some mathematical methods are used to improve the random performance of pseudorandom number generator [21], the software and hardware implementation of pseudorandom number generator [22], and the encryption scheme and cryptosystem based on chaotic pseudorandom number generator [23, 24]. The one-dimensional discrete chaotic system has the advantages of simple structure and easy realization. Therefore, it is an important content to construct a large number of general one-dimensional discrete chaotic systems.

The structure of this article is as follows. Section 2 constructs several types of general one-dimensional discrete piecewise maps, and based on the Li–Yorke discriminant theorem and Marotto’s theorem, sufficient conditions for chaotic mapping are given. One-dimensional discrete piecewise chaotic nonlinear mapping and a numerical simulation are performed. Section 3 gives two types of segmented chaotic mapping models with symmetry, and based on the proposed models, three examples of chaotic mapping satisfying the conditions are given. In Section 4, a new pseudorandom number generator based on piecewise chaotic map is designed, and the randomness and key sensitivity of the generator are analyzed. Finally, we conclude the full text in Section 5.

2. Three Types of One-Dimensional Discrete Piecewise Chaotic Maps

First, we introduce the Li–Yorke chaos discrimination theorem, which is expressed as follows.

Lemma 1 (see [1]). Let be an interval and let be continuous. If there is a point for which the points , , and satisfy (or ), then it is a chaotic map in the sense of Li–Yorke.
In addition, we introduce other related theories. Let be a closed ball with point as the center and radius , if the fixed point of the differentiable map in satisfies the following two conditions:(1)There is a real number , such that the modulus of all the eigenvalues of the Jacobian matrix of any point in is greater than 1.(2)There is a point and a natural number in such that , and point satisfies .

Then, the fixed point is a regressive repulsor of the mapping [3].

Lemma 2 (Marotto’s theorem [2]). If the n-dimensional map has a regressive repellent, then the map has chaotic behavior in the Li–Yorke sense.

Next, based on the above two lemmas, several kinds of one-dimensional discrete piecewise chaotic maps are given.

2.1. Construction of One-Dimensional Discrete Piecewise Chaotic Map

Theorem 1. Let be a continuously differentiable strictly monotonically increasing function on the closed interval , let be a real number on the open interval (0, 1), and define a function of the following form:

If the function satisfies in the interval , then is a chaotic map in the sense of Li–Yorke.

Proof of Theorem 1. The function is continuous in the interval , and is a continuous function in . Therefore, it is only necessary to prove that there are four points satisfying the conditions of the Li–Yorke theorem:Let , then , and in the interval , can be obtained from .
Therefore, in the interval , , that is, .
is a unimodal function, and its function image structure is shown in Figure 1.
Take , , and . Obviously there isBecause of , from the continuity of and the intermediate value theorem , if , thenCombining equations (3) and (4), there are four points satisfying the conditions of the Li–Yorke theorem:In conclusion, the function satisfies the Li–Yorke discriminant theorem; thus, it is a chaotic map in the sense of Li–Yorke.
Analogous to the piecewise chaotic map constructed by Theorem 1, another one-dimensional discrete piecewise chaotic map is constructed below.

Theorem 2. Let be a continuously differentiable strictly monotonically increasing function on the closed interval and be a real number on the open interval (0, 1), and define a function of the following form:

If the function satisfies in the interval , then is a chaotic map in the sense of Li–Yorke.

The proof process is similar. The function image structure of is shown in Figure 2.

Next, we discuss the relationship between Theorems 1 and 2. Let formula (1) be and formula (3) be ; we can know when has ; and are symmetric piecewise mappings.

Based on this, we can find a homeomorphic mapping , havingand because we know that function is obviously symmetric with respect to , then there is on , so holds. Then, there is a topological conjugate relationship between the mappings of Theorems 1 and 2. Furthermore, from the fact that homeomorphic mapping is a linear mapping, we can see that Theorems 1 and 2 satisfy affine conjugation and therefore have the same dynamic behavior.

Theorem 3. Let be a continuously differentiable strictly monotonically increasing function on the closed interval and be a real number on the open interval (0, 1), and define a function of the following form:

If the function satisfies in the interval , then is a chaotic map in the sense of Li–Yorke.

Proof of Theorem 3. According to the conditions, the function image structure of function is shown in Figure 3.
According to the theorem, ; thus, is the fixed point of . Since the derivative of function on [0, 1] is greater than 1, is a repulsive fixed point.(1)Consider the auxiliary function , with :Choose that satisfies to obtain .(2)Consider the auxiliary function , :Because , there is , and for , there is always .
Take ; then, , and .
According to the one-dimensional intermediate value theorem, there is such that , that is, . Then,In conclusion, the fixed point of satisfies the following conditions:(1)Take and satisfy such that becomes a closed ball including . Its Jacobian matrix is . Thus, for any , the modulus of the eigenvalue of is greater than 1.(2)There exists a point and a natural number in such that , and is nondegenerate, that is, it satisfiesTherefore, the point is a regressive repulsor of map and thus is a chaotic map in the sense of Li–Yorke.
The proof is over. Next, we verify the above three theorems by a numerical simulation.

2.2. Numerical Simulation of One-Dimensional Discrete Piecewise Chaotic Map

Substituting into Theorem 1, the image of function , the bifurcation diagram of parameter and the Lyapunov exponent diagram are as shown in Figures 4(a)4(c). In Theorem 2, the image of function , the bifurcation diagram of parameter and the Lyapunov exponent diagram are as shown in Figures 4(d)4(f). In Theorem 3, the image of function , the bifurcation graph of parameter and the Lyapunov exponent graph are as shown in Figures 4(g)4(i).

Substituting into Theorem 1, the image of function , the bifurcation diagram of parameter and the Lyapunov exponent diagram are as shown in Figures 5(a)5(c). In Theorem 2, the image of function , the bifurcation diagram of parameter and the Lyapunov exponent diagram are as shown in Figures 5(d)5(f). In Theorem 3, the image of function , the bifurcation graph of parameter and the Lyapunov exponent graph are as shown in Figures 5(g)5(i).

Substituting into Theorem 1, the image of function , the bifurcation diagram of parameter , and the Lyapunov exponent diagram are as shown in Figures 6(a)6(c). In Theorem 2, the image of function , the bifurcation diagram of parameter , and the Lyapunov exponent diagram are as shown in Figures 6(d)6(f). In Theorem 3, the image of function , the bifurcation graph of parameter and the Lyapunov exponent graph are as shown in Figures 6(g)6(i).

3. Two Types of Piecewise Chaotic Maps with Symmetric Properties

3.1. Construction of Symmetric Piecewise Chaotic Map

Based on the Li–Yorke chaotic discrimination theorem, a class of piecewise chaotic maps with symmetric properties are given below.

Theorem 4. Let be a continuous differentiable strictly monotone increasing function on a closed interval , and define the following piecewise mapping :

If the function satisfies on , then is a chaotic map in the sense of Li–Yorke.

Proof of Theorem 3. From the fact that is continuous in the interval , it is known that is a continuous function on . Therefore, it is necessary to prove that there exist four points satisfying the conditions of the Li–Yorke theorem:Let , then , and in the interval , can be obtained from .
Therefore, , that is, on the interval , .
Combined with the function as a unimodal function, taking , , and , obviouslyMoreover, . Then, by the continuity of and the intermediate value theorem of continuous function , such that , one obviously hasCombining equations (13) and (14) shows that there are four points that satisfy the conditions of the Li–Yorke theorem:In conclusion, the function satisfies the Li–Yorke discriminant theorem and is a chaotic map in the sense of Li–Yorke. Equation (11) is obviously symmetric about the straight line ; thus, the function has symmetry.
Similar to Theorem 4, another class of one-dimensional discrete piecewise chaotic maps with symmetric properties is given below.

Theorem 5. Let be a continuous differentiable strictly monotone increasing function on a closed interval , and define the following piecewise mapping :

If the function satisfies on , then is a chaotic map in the sense of Li–Yorke.

Obviously, the mappings of Theorems 4 and 5 also have topological conjugation and satisfy affine conjugation. Therefore, the mappings of Theorems 4 and 5 have the same dynamic behavior.

The following constructs different functions and inserts them into the above two theorems, yielding specific examples of the constructed functions through numerical simulation.

3.2. Numerical Simulation of Symmetric Piecewise Chaotic Map

Inserting into Theorem 4, the function image and the time-domain waveform of are as shown in Figures 7(a) and 7(b); if instead substituted into Theorem 5, the function image and the time-domain waveform of are as shown in Figures 7(c) and 7(d).

Inserting into Theorem 4, the function image and the time-domain waveform of are as shown in Figures 8(a) and 8(b); inserting it into Theorem 5, the function image and the time-domain waveform of are as shown in Figures 8(c) and 8(d).

Inserting into Theorem 4, the function image and time-domain waveform of are as shown in Figures 9(a) and 9(b); if instead substituted into Theorem 5, the function image and time-domain waveform of are as shown in Figures 9(c) and 9(d).

4. Design of PRNG

In order to design the pseudorandom number generator using the above construction system, we first give a chaotic example satisfying the chaotic condition.

Corollary 1. Take , , then when , the chaos condition can be satisfied in Theorems 15, so that equations (1)–(8) are chaotic maps.

Therefore, if and are introduced into formula (1), then

It is a chaotic system.

Based on system (17), a transformation of binary pseudorandom sequence is proposed,where , function means to round to get an integer, means to modulo operation on , and function means to convert integer into binary number.

4.1. Randomness Test of PRNG

PRNG plays an important role in most chaotic cryptosystems. Because PRNG with good performance is unpredictable and similar to pseudorandom sequence, it has good statistical performance. The following mainly used NIST SP800-22 detection standard [25] proposed by NIST to test the random property of binary pseudorandom sequences generated by chaotic system.

According to system (17), we select 1000 groups of different parameters and initial values, generate 1000 groups of different binary pseudorandom sequences by PRNG, and test the randomness of NIST SP800-22. The results are shown in Table 1.

In Table 1, we give the pass rate of the detection sequence and the value of the uniformity test (denoted as the value). If the pass rate is in the interval and all values are greater than , the PRNG is considered to have passed the detection, where is the significant level, is taken here.

It can be seen from Table 1 that the passing rate of each data of PRNG based on system (17) is within the acceptable range, and it has passed the NIST SP800-22 randomness test, so it is suitable for the design of PRNG and has good randomness.

4.2. Key Sensitivity Analysis

Key sensitivity means that the small change of key will also lead to the substantial change of output. A well-designed PRNG should have good key sensitivity; even if a bit changes, it will output completely different sequences. Therefore, it is necessary to detect and analyze the key sensitivity.

After fixing , we disturb the initial value of the key. For the three generated sequences, the first 20 arrays are extracted and plotted in Figure 10. It is obvious that the sensitivity of the key to the initial value is above , and slight changes in the initial value will lead to great differences in the sequence. Therefore, the above test results and analysis show that our generator has strong key sensitivity.

5. Conclusions

In this work, we construct three types of one-dimensional discrete piecewise maps, and based on the Li–Yorke discriminant theorem and Marotto’s theorem, we provide sufficient conditions for these three types of maps to become chaotic maps. Then, we design and further construct several specific examples, after which numerical simulations are carried out. The bifurcation diagram and Lyapunov exponent diagram of the function with the change in parameters are given.

In view of the construction method of the one-dimensional discrete piecewise chaotic maps proposed in this paper, considering the piecewise chaotic map with symmetric properties, we construct the functions on this basis. Sufficient conditions for them to become chaotic maps are given, several examples satisfying the theorem conditions are given, the theory is verified by numerical simulation, and the design idea is proved to be correct. This method can provide a theoretical basis for further constructing a new one-dimensional discrete chaotic system.

Finally, from the perspective of cryptographic application, the PRNG algorithm proposed in this paper is tested. The test results show that the PRNG designed in this paper has passed the sp800-22 randomness test, and the test index value is equivalent to that of the literature [18, 19, 22, 23]. The random performance and key sensitivity are analyzed. The results show that the proposed pseudorandom sequence generator can meet the performance requirements of good PRNG and has strong key sensitivity. Therefore, the PRNG proposed in this paper is practical and reliable and can further design a high security encryption scheme, which has high application potential.

Data Availability

The data used to support the findings of this study are included within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This project was supported by “The Fundamental Research Funds for the Central Universities” of China (06108236).