skip to main content
10.1145/3465481.3470062acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article

Chaotic Pseudo Random Number Generators: A Case Study on Replication Study Challenges

Published:17 August 2021Publication History

ABSTRACT

Chaotic Pseudo Random Number Generators have been seen as a promising candidate for secure random number generation. Using the logistic map as state transition function, we perform number generation experiments that illustrate the challenges when trying to do a replication study. Those challenges range from uncertainties about the rounding mode in arithmetic hardware over chosen number representations for variables to compiler or programmer decisions on evaluation order for arithmetic expressions. We find that different decisions lead to different streams with different security properties, where we focus on period length, but descriptions in articles often are not detailed enough to deduce all decisions unambiguously. Similar problems might, to some extent, appear in other types of replication studies for security applications. Therefore we propose recommendations for descriptions of numerical experiments on security applications to avoid the above challenges.

References

  1. Marcel Ausloos and Michel Dirickx (Eds.). 2006. The Logistic Map and the Route to Chaos. Springer, Berlin Heidelberg. https://doi.org/10.1007/3-540-32023-7Google ScholarGoogle Scholar
  2. Oded Goldreich. 2001. Foundations of cryptography I: Basic Tools. Cambridge University Press, Cambridge, UK.Google ScholarGoogle Scholar
  3. IEEE754 2019. IEEE Standard for Floating-Point Arithmetic. https://doi.org/10.1109/IEEESTD.2019.8766229 IEEE Standard 754-2019 (Revision of IEEE 754-2008).Google ScholarGoogle Scholar
  4. Jörg Keller and Hanno Wiese. 2007. Period Lengths of Chaotic Pseudo-Random Number Generators. In Proc. IASTED International Conference on Communication, Network, and Information Security (CNIS 2007). Acta Press, Calgary, Canada, 7 pages.Google ScholarGoogle Scholar
  5. Wolfgang Killmann and Werner Schindler. 2011. A proposal for: Functionality classes for random number generators. Report AIS 20/31 V2.0. Federal Office for Information Security / Bundesamt für Sicherheit in der Informationstechnik (BSI), Bonn, Germany.Google ScholarGoogle Scholar
  6. Ronald T. Kneusel. 2018. Random Numbers and Computers. Springer, Cham (CH).Google ScholarGoogle Scholar
  7. Israel Koren. 2001. Computer Arithmetic Algorithms(2nd ed.). Taylor & Francis, Milton Park, UK.Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Ping Li, Zhong Li, Wolfgang A. Halang, and Guanrong Chen. 2007. A stream cipher based on a spatiotemporal chaotic system. Chaos, Solitons & Fractals 32, 5 (2007), 1867–1876. https://doi.org/10.1016/j.chaos.2005.12.021Google ScholarGoogle ScholarCross RefCross Ref
  9. Gerald Luber. 2014. Statistical Analysis of Outputs from Chaotic Pseudo Random Number Generators with Fixpoint Representation (in German: Statistische Analyse der Ausgaben von chaotischen Pseudozufallszahlengeneratoren mit Festkommadarstellung). Master thesis, FernUniversität in Hagen, Germany.Google ScholarGoogle Scholar
  10. George Marsaglia. 1995. The Marsaglia Random Number CDROM including the Diehard Battery of Tests of Randomness. Technical Report. Florida State University, Tallahassee, FL.Google ScholarGoogle Scholar
  11. Lena Oden and Jörg Keller. 2021. Improving Cryptanalytic Applications with Stochastic Runtimes on GPUs. In Proc. 11th International Workshop on Accelerators and Hybrid Emerging Systems (AsHES@IPDPS 2021). IEEE, New York, NY, 6 pages.Google ScholarGoogle ScholarCross RefCross Ref

Recommendations

Comments

Login options

Check if you have access through your login credentials or your institution to get full access on this article.

Sign in
  • Published in

    cover image ACM Other conferences
    ARES '21: Proceedings of the 16th International Conference on Availability, Reliability and Security
    August 2021
    1447 pages
    ISBN:9781450390514
    DOI:10.1145/3465481

    Copyright © 2021 ACM

    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    • Published: 17 August 2021

    Permissions

    Request permissions about this article.

    Request Permissions

    Check for updates

    Qualifiers

    • research-article
    • Research
    • Refereed limited

    Acceptance Rates

    Overall Acceptance Rate228of451submissions,51%

PDF Format

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format .

View HTML Format