This paper deals with the security of chaos-based “true” random number generators (RNG)s. An attack method is proposed to analyze the security weaknesses of chaos-based RNGs and its convergence is proved using a master slave synchronization scheme. Attack on a RNG based on a double-scroll attractor is also presented as an example. All secret parameters of the RNG are revealed where the only information available is the structure of the RNG and a scalar time series observed from the double-scroll attractor. Simulation and numerical results of the proposed attack method are given such that the RNG doesn't fulfill NIST-800-22 statistical test suite, not only the next bit but also the same output bit stream of the RNG can be reproduced.
Salih ERGÜN
TÜBITAK-National Research Institute of Electronics and Cryptology
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copy
Salih ERGÜN, "On the Security of Chaos Based “True” Random Number Generators" in IEICE TRANSACTIONS on Fundamentals,
vol. E99-A, no. 1, pp. 363-369, January 2016, doi: 10.1587/transfun.E99.A.363.
Abstract: This paper deals with the security of chaos-based “true” random number generators (RNG)s. An attack method is proposed to analyze the security weaknesses of chaos-based RNGs and its convergence is proved using a master slave synchronization scheme. Attack on a RNG based on a double-scroll attractor is also presented as an example. All secret parameters of the RNG are revealed where the only information available is the structure of the RNG and a scalar time series observed from the double-scroll attractor. Simulation and numerical results of the proposed attack method are given such that the RNG doesn't fulfill NIST-800-22 statistical test suite, not only the next bit but also the same output bit stream of the RNG can be reproduced.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E99.A.363/_p
Copy
@ARTICLE{e99-a_1_363,
author={Salih ERGÜN, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={On the Security of Chaos Based “True” Random Number Generators},
year={2016},
volume={E99-A},
number={1},
pages={363-369},
abstract={This paper deals with the security of chaos-based “true” random number generators (RNG)s. An attack method is proposed to analyze the security weaknesses of chaos-based RNGs and its convergence is proved using a master slave synchronization scheme. Attack on a RNG based on a double-scroll attractor is also presented as an example. All secret parameters of the RNG are revealed where the only information available is the structure of the RNG and a scalar time series observed from the double-scroll attractor. Simulation and numerical results of the proposed attack method are given such that the RNG doesn't fulfill NIST-800-22 statistical test suite, not only the next bit but also the same output bit stream of the RNG can be reproduced.},
keywords={},
doi={10.1587/transfun.E99.A.363},
ISSN={1745-1337},
month={January},}
Copy
TY - JOUR
TI - On the Security of Chaos Based “True” Random Number Generators
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 363
EP - 369
AU - Salih ERGÜN
PY - 2016
DO - 10.1587/transfun.E99.A.363
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E99-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2016
AB - This paper deals with the security of chaos-based “true” random number generators (RNG)s. An attack method is proposed to analyze the security weaknesses of chaos-based RNGs and its convergence is proved using a master slave synchronization scheme. Attack on a RNG based on a double-scroll attractor is also presented as an example. All secret parameters of the RNG are revealed where the only information available is the structure of the RNG and a scalar time series observed from the double-scroll attractor. Simulation and numerical results of the proposed attack method are given such that the RNG doesn't fulfill NIST-800-22 statistical test suite, not only the next bit but also the same output bit stream of the RNG can be reproduced.
ER -