Next Article in Journal
Interactions between Homotopy and Topological Groups in Covering (C, R) Space Embeddings
Next Article in Special Issue
Symmetric Oscillator: Special Features, Realization, and Combination Synchronization
Previous Article in Journal
A Class of Exponentiated Regression Model for Non Negative Censored Data with an Application to Antibody Response to Vaccine
Previous Article in Special Issue
Control of a Symmetric Chaotic Supply Chain System Using a New Fixed-Time Super-Twisting Sliding Mode Technique Subject to Control Input Limitations
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

The Dynamic Analysis of a Novel Reconfigurable Cubic Chaotic Map and Its Application in Finite Field

School of Information and Communication Engineering, Hubei University of Economics, Wuhan 430205, China
*
Author to whom correspondence should be addressed.
Symmetry 2021, 13(8), 1420; https://doi.org/10.3390/sym13081420
Submission received: 10 June 2021 / Revised: 27 July 2021 / Accepted: 29 July 2021 / Published: 3 August 2021
(This article belongs to the Special Issue Symmetry in Chaotic Systems and Circuits Ⅱ)

Abstract

:
Dynamic degradation occurs when chaotic systems are implemented on digital devices, which seriously threatens the security of chaos-based pseudorandom sequence generators. The chaotic degradation shows complex periodic behavior, which is often ignored by designers and seldom analyzed in theory. Not knowing the exact period of the output sequence is the key problem that affects the application of chaos-based pseudorandom sequence generators. In this paper, two cubic chaotic maps are combined, which have symmetry and reconfigurable form in the digital circuit. The dynamic behavior of the cubic chaotic map and the corresponding digital cubic chaotic map are analyzed respectively, and the reasons for the complex period and weak randomness of output sequences are studied. On this basis, the digital cubic chaotic map is optimized, and the complex periodic behavior is improved. In addition, a reconfigurable pseudorandom sequence generator based on the digital cubic chaotic map is constructed from the point of saving consumption of logical resources. Through theoretical and numerical analysis, the pseudorandom sequence generator solves the complex period and weak randomness of the cubic chaotic map after digitization and makes the output sequence have better performance and less resource consumption, which lays the foundation for applying it to the field of secure communication.

1. Introduction

Chaos is a well-known dynamic behavior in physics. The most famous characteristic of a chaotic system is that the evolution of the system is sensitive to the initial conditions, which is also known as the butterfly effect [1]. The chaotic system is nonlinear, sensitive to initial value, aperiodic, ergodic, and noise-like. These special chaotic behaviors are consistent with “confusion” and “diffusion” in Shannon’s information theory, which provides a theoretical basis for generating pseudorandom sequences via chaotic systems [2,3,4,5]. Because the future evolution behavior of the chaotic system is aperiodic and unpredictable, it also is widely used in the field of chaotic secure communication [6,7,8,9,10,11,12].
With the development of numerical analysis in finite field, it is found that the finite precision effect will cause the dynamic degradation of a chaotic system in real number field, which makes the cryptographic algorithm based on the chaotic system have weak cryptographic security [13]. In a survey of this phenomenon, Li systematically studied the changing state of the chaotic system from real number field to finite field, established the mathematical model of a chaotic system in finite field, and presented the method of analyzing chaotic performance in digital field [14]. Since then, the degradation characteristics of digital chaotic systems have been studied, and many methods to resist the degradation behavior of chaos have been proposed. Yang studied the mathematical model of Logistic chaotic map in Z ( 2 m ) field and deduced the maximum dynamic orbit [15]. Souza constructed the mathematical model of Arnold’s cat chaotic map in Z ( 3 m ) field and constructed a new pseudorandom sequence generator [16]. Miyazaki found that the properties of sequences generated by digital chaotic systems largely depend on the inherent truncation method in finite fields [17]. The non-smooth probability distribution function of robust logistic map (RLM) trajectories gives an uneven binary distribution in the randomness test. To overcome this disadvantage in RLM, control of chaos (CoC) is proposed for the smooth probability distribution function of RLM [18]. Li proposed the corresponding state mapping network (SMN) model of the chaotic system in finite field, studied the dynamic properties of logistic chaotic map and tent chaotic map in finite field, and proved the scale-free properties of logistic chaotic map in digital field [19].
With the rapid development of large-scale integrated circuits, the speed and quantity of information collection, analysis, and transmission are greatly improved. The throughput of the pseudorandom sequence is as high as 10 11 bit/s. If the pseudorandom sequence is not repeated within 10 years, the period of the pseudorandom sequence should not be less than 2 65 , and the period of pseudorandom sequence with encryption capability is generally greater than 2 80 . In earlier times, it was thought that the digital chaotic sequence generated by the digital chaotic system retained the great period behavior of the original chaotic map [20]. However, compared with the chaotic system, Alvarez found that the orbit of the digital chaotic system is degenerated to some extent, leading to the emergence of short period behavior [21]. In order to overcome the complex periodic behavior of the degenerate chaotic system in digital field, Deng proposed a feedback method to enhance the performance of digital chaotic sequence by using the idea of mixing digital and analog chaotic systems, which increases the period of digital chaotic sequence efficiently [22]. Zheng introduced a disturbance source to disturb the digital chaotic system to resist the complex periodic behavior of the output sequence [23]. Chen proposed a dynamical perturbation-feedback mixed control (DPFMC) method based on a novel pseudorandom sequence by combining feedback and perturbation [24]. Based on introducing the feedback term, Wang proposed a general method to enhance the period of the digital chaotic sequence by using control theory and effectively increased the period of digital chaotic sequence in theory [25]. In addition, Lin proposed the construction method of nondegenerate high-dimensional chaotic systems and resisted the short period behavior of the digital chaotic system by increasing the dimension [26]. Guyeux innovatively proposed the idea of constructing the chaotic system in finite field and called the chaotic system in finite field a chaotic iterative system, which overcomes the influence of truncation error effect on period [27]. Wang proposed a high-dimensional chaotic iterative system, which further enhanced the ability to resist the complex periodic behavior of digital chaotic sequences [28]. For the digital chaotic system, Yang transformed the digital field into other special fields and used the properties of different fields to increase the period of the digital chaotic sequence [15]. In the design of a digital circuit, the state space of a finite state machine is always a finite value. Under the finite state space, the orbit of the digital chaotic system will gradually deviate from the theoretical true orbit of the corresponding chaotic system. The method of cascaded chaotic systems is proposed systematically by Zhou, which can effectively improve the period length of the digital chaotic sequence and give a specific application example [29]. Shakiba proposed a cascaded modulation-coupled hyperchaos to further enhance the periodicity of digital chaotic sequences [30].
The above research promotes the research of improving the period of digital chaotic sequence and lays a theoretical foundation for the methods of enhancing the complex period behavior of digital chaotic sequence. In the field of digital information encryption, such as pseudorandom sequence generator, chaotic stream cipher, and chaotic image encryption, the accurate period is an important feature of the security of chaos-based cryptographic modules. Compared with current enhanced methods of the period of digital chaotic sequence, this paper proposes a novel special cubic chaotic map and accurately controls the period of output sequence of the digital cubic chaotic map to comprehensively overcome the weak pseudorandom sequence phenomenon caused by finite precision effect. On this foundation, a reconfigurable pseudorandom sequence generator based on the digital cubic chaotic system is proposed. Since pseudorandom sequence generator is an important part of the chaotic stream cipher, chaotic image encryption, and other chaotic ciphers, the period of output sequence plays an important role in improving the security of cryptographic modules based on the digital chaotic system.
This paper is organized as follows. Section 2 introduces a special cubic chaotic map in real number field, and its chaotic behavior is analyzed, especially the chaotic attractors. Section 3 discusses the degradation of the cubic chaotic map, and its dynamic behavior is analyzed, especially the attractors in finite field. Section 4 presents a novel reconfigurable pseudorandom sequence generator based on the digital cubic chaotic system and analyzes its period and randomness. Finally, the last section concludes our work.

2. A Special Cubic Chaotic Map

2.1. New Cubic Chaotic Map

For chaos-based cryptosystems, one-dimensional chaotic maps are used widely for their simple algebraic structure, especially linear or quadratic chaotic maps, but the security of linear and quadratic chaotic maps is relatively low. For the high-dimensional chaotic maps, although they have high security, the hardware resource consumption of a cryptosystem based on high-dimensional chaotic map is large. In contrast, the research on the dynamic behaviors of the cubic chaotic system is relatively less, which also is a one-dimensional chaotic map with a simple algebraic structure. In addition, the one-dimensional cubic chaotic map has higher order, stronger nonlinearity, and small hardware resource consumption. Cubic map has been deeply studied, especially when the parameter is greater than zero [31,32],
f ( x ) = a x 3 + ( 1 a ) x ,   a [ 0 , 4 ] .
Considering the tradeoff between resource and security performance, a special form of the cubic chaotic map is proposed in this paper based on the classical cubic chaotic [32]. The combined form of the cubic chaotic map is:
x n + 1 = a ( b x 3 n t x n ) ,   n ,   x n ,
where parameter a { 1 , 1 } , b ( 1 , 10 ) and t ( 1 , 3 ) .

2.2. Fixed Point Analysis

The stability of fixed points in the discrete iterative system x n + 1 = f ( x n ) with an iterative variable n can reflect certain special evolution behaviors of dynamic system. According to the theory of dynamics, the stability of the fixed point is determined by the derivative of the function f ( x n ) corresponding to the discrete iterative map at the fixed points. Let x n + 1 = x n , Map (2) is changed into:
x n = a ( b x 3 n t x n ) ,   n ,   x n .
For the cubic polynomial equation, its root is easy to obtain because of the lack of constant term.
x n = 0 x 2 n = t a + 1 a b
The function corresponding to the discrete iterative Map (2) is:
f ( x ) = a ( b x 3 t x ) ,   n ,   x n .
Its derivative function is:
f ( 1 ) ( x ) = 3 a b x 2 t a ,   n ,   x n .
Bringing the fixed points into Equation (6), we can obtain the derivative value at the fixed points:
f ( 1 ) ( x n = 0 ) = t a f ( 1 ) ( x 2 n = t a + 1 a b ) = 2 t a + 3 .
When parameter a { 1 , 1 } , b ( 1 , 10 ) , and t ( 1 , 3 ) , the absolute values of derivatives at fixed points x 2 n = t a + 1 a b are hard to determine. However, we can find that the absolute value of the derivative at fixed points x n = 0 is greater than 1. Therefore, the cubic Map (2) has at least an unstable fixed point, which can make it a chaotic map under certain parameter a , b , and t . The stability of fixed points affects the whole dynamic behavior of the discrete iterative map. When a = 1 , Figure 1 shows the influence of parameters b and t on the sequence generated by Map (2).
From Figure 1a, we can see that with the change of parameter b , the dynamic behavior of Map (2) does not change, but the value range of the iterative variable x n changes. When a = 1 and b = 1 , iterative variable x n [ 2 , 2 ] . When a = 1 and b = 4 , iterative variable x n [ 1 , 1 ] . When a = 1 and b = 10 , iterative variable x n [ 0.6 , 0.6 ] . As the parameter b increases, the iteration variable x n decreases. Therefore, the parameter b affects the amplitude of the iteration variable x n . Through a large number of statistical experiments, we find that when b = 4 , which is more conducive to the realization by digital circuits. Contrary to the effect of the parameter b , the dynamic behavior of Map (2) changes with the change of the parameter t . When a = 1 , with the change of parameter t , the iterative variable shows the period-doubling bifurcation, which is a classical dynamic behavior that leads to chaos. When a = 1 and t = 3 , the iterative variable of this special cubic map has the largest value range.
When a = 1 , Figure 2a shows the influence of parameter b on the sequence generated by Map (2), and Figure 2b shows the influence of parameter t on the sequence generated by Map (2). From Figure 2, we also find that parameter b affects the amplitude of iteration variable x n , and parameter t affects the dynamic behaviors of iteration variable x n . When a = 1 , with the change of parameter t , the iterative variable also shows the period-doubling bifurcation, which is a classical dynamic behavior that leads to chaos. But when a = 1 , the specific evolution process is different from the situation of a = 1 . Different maps can be realized by changing only one symbol in the algebraic structure of Map (2), which also reflects that Map (2) is highly reconfigurable and has a special symmetry.
By systematically analyzing the influence of parameters on the fixed points, we find that when parameter b = 4 , Map (2) has a good range of iteration variable x n , which is more conducive to the realization by digital circuits. By selecting the appropriate parameter b , Map (2) can be rewritten as:
x n + 1 = a ( 4 x 3 n t x n ) ,   n ,   x n ,
where parameter a { 1 , 1 } , x n [ 1 , 1 ] .

2.3. Lyapunov Exponent Spectrum

Lyapunov exponent, also known as Lyapunov characteristic exponent, represents the numerical characteristics of the average exponential divergence rate of adjacent trajectories in phase space. It is an important numerical value used to identify certain dynamic behaviors, especially chaotic behavior. When the Lyapunov exponent of the iterative map is positive, the iterative map shows a chaotic behavior, and the iterative map can be called a chaotic map. The specific expression of the Lyapunov exponent is shown in Definition 1.
Definition 1.
The Lyapunov exponent of a discrete dynamic system x n + 1 = F ( x n ) with the iterative variable n is mathematically defined as follows:
λ = lim n 1 n ln F n ( x + Δ ) F n ( x ) Δ ,
where Δ is a small positive number. It is relatively complicated to calculate the Lyapunov exponent by its definition. At present, the Jacobi method is commonly used to calculate the Lyapunov exponent of the discrete dynamic system. Since parameter b does not affect the dynamic behaviors of Map (2), we mainly analyze the variation of Lyapunov exponent with parameter t , which is shown in Figure 3.
By numerical comparison, we find that the Lyapunov exponent spectrum of Map (2) is independent of the parameter a , but only related to the parameter t . In theory, the absolute values of derivatives of iteration variable x n are:
f ( 1 ) ( x n ) = 3 a b x 2 n t a = 3 b x 2 n t ,
which is the most important value to calculate the Lyapunov exponent in the Jacobi method. From Equation (10), we find that the value f ( 1 ) ( x n ) has nothing to do with the parameter a . However, the parameter a participates in the whole iterative operation of Map (2). Therefore, the parameter t determines whether Map (2) has chaotic behavior, and the parameter a determines the evolution process of a specific chaotic behavior. By systematically analyzing the influence of parameters on dynamic behavior, we find that when parameter t = 3 , Map (2) has the largest Lyapunov exponent, that is λ = 1.1 , and perfect chaotic behavior. By selecting the appropriate parameter t , Map (2) can be rewritten as:
x n + 1 = a ( 4 x 3 n 3 x n ) ,   n ,   x n ,
where parameter a { 1 , 1 } , x n [ 1 , 1 ] .

2.4. Symmetry Analysis

The symmetry of a discrete map mainly depends on its corresponding function, which limits the dynamic behavior of iteration. For Map (11), it is a discrete chaotic iterative map based on a polynomial function, and the highest order of the polynomial is 3. Therefore, the function corresponding to chaotic Map (11) is a cubic polynomial function.
f ( x ) = a ( 4 x 3 3 x ) ,   n ,   x n ,
where parameter a { 1 , 1 } . The diagram of Function (12) is shown in Figure 4.
As shown in Figure 4, Function (12) has obvious symmetry, which is about the origin. This can also be seen from the algebraic form of the Function (12). For x , its function value is f ( x ) = a ( 4 x 3 3 x ) , such that f ( x ) = f ( x ) . Therefore, Function (12) is an odd function, symmetric about the origin. In addition, for the chaotic Map (11), its dynamic behavior also has symmetry. For amplitude, from Figure 1 and Figure 2, the value of the iteration variable x n is symmetric with respect to the x-axis. When a = 1 and a = 1 , the algebraic form of a chaotic Map (11) also has symmetry in operation, which provides the basis for the reconfigurable design of Map (11).

2.5. Chaotic Attractors and Sequence Characteristics

Lyapunov exponent is a one-dimensional numerical index to describe chaotic behavior, and chaotic behavior can also be shown by attractor, which is a high-dimensional description method. For a one-dimensional chaotic map, the attractor can be a two-dimensional image to describe chaotic behavior. In addition, time series and iterative graphs can well reflect the chaotic characteristics of the chaotic map, especially iterative graphs, which can reflect the specific behavior of attractors of a one-dimensional chaotic map.
When a = 1 , chaotic Map (11) can be expressed as:
x n + 1 = ( 4 x 3 n 3 x n ) ,   n ,   x n ,
where iterative variable x n [ 1 , 1 ] . Through numerical simulation, the time series and iterative graph of Map (13) are shown in Figure 5.
Since Map (13) has a positive Lyapunov exponent, it is a chaotic map. When x 0 = 1 , the output sequence of Map (13) is shown in Figure 5a. It can be seen from Figure 5a that the output sequence of Map (13) is bounded and random-like. Figure 5b is the iterative graph of the output sequence of Map (13) under x 0 = 1 , which reflects the stretching and folding characteristics of the chaotic system. When a = 1 , Map (11) can be expressed as:
x n + 1 = ( 4 x 3 n 3 x n ) ,   n ,   x n ,
where iterative variable x n [ 1 , 1 ] . Maps (13) and (14) have a high degree of similarity. The arithmetic in the whole iterative map is consistent, and the only difference is one symbol. Therefore, Maps (13) and (14) have high reconfigurability and symmetry. Using digital circuits to realize these two systems at the same time can reuse multiple identical units, greatly reducing the consumption of hardware resources. Compared with Maps (13) and (14), it also has good chaotic characteristics. Its time series and iterative graph are shown in Figure 6.
When x 0 = 1 , the output sequence of Map (14) is shown in Figure 6a. It can be seen from Figure 6a that the output sequence of Map (14) is also bounded and random-like. But when x 0 = 1 , the evolution of the output sequence of Maps (13) and (14) is different, which can also be reflected in the iteration graph of the sequence. It can be seen from Figure 6b that the chaotic attractor of Map (14) is similar to the Lorenz chaotic attractor, which is divided into two parts, but the attractor of Map (13) is mainly concentrated in one part and similar to the chaotic attractor of Logistic map. Although the form of Maps (13) and (14) are highly similar, the evolution of the output sequence is different. Because of the different sequence characteristics, when using a digital circuit to realize these two maps, two sequences with different performances can be obtained while repeatedly using the same modules.

3. The Degeneration of Cubic Chaotic Map in Finite Field

3.1. The Model of Digital Cubic Chaotic Map in Finite Field

Although Map (11) has good chaotic characteristics, the digital circuit has a certain influence on the realization of a chaotic system. For the chaotic Map (11), when it is realized by a digital circuit, the original model will change, and the influence of the digital circuit must be added. Compared with the floating point operation, the fixed point operation is faster, and the logic consumption is less. In this paper, the chaotic Map (11) is realized by the form of an unsigned fixed point form. The precision of digital circuit is set as N , and for decimal x n , the expression of its unsigned fixed point number x n ¯ is:
x n ¯ = 2 N x n mod 2 N ,   n ,   x n ¯ ,
where term 2 N x n represents the integer part of 2 N x n . Multiplying both sides of Equation (11) by 2 3 N , we can obtain:
2 3 N x n + 1 = 2 3 N a ( 4 x 3 n 3 x n ) mod 2 N ,   n ,   x n .
Merging congeners,
2 2 N 2 N x n + 1 = a ( 42 3 N x 3 n 32 2 N 2 N x n ) mod 2 N ,   n ,   x n .
Converting decimal x n to an unsigned fixed point number x n ¯ :
2 2 N x n + 1 ¯ = a ( 4 x n ¯ 3 32 2 N x n ¯ ) mod 2 N ,   n ,   x n ¯ .
Dividing both sides of Equation (18) by 2 2 N , we can get:
x n + 1 ¯ = a ( 4 x n ¯ 3 2 2 N 3 x n ¯ ) mod 2 N ,   n ,   x n ¯ .
By replacing symbol x n ¯ with the symbol x n , the digitized chaotic Map (11) is obtained:
x n + 1 = a ( 4 x 3 n 2 2 N 3 x n ) mod 2 N ,   n ,   x n .
where the iterative variable x n [ 0 , 2 N 1 ] , a { 1 , 1 } .

3.2. The Lyapunov Exponent in Finite Field

Due to the influence of the digital circuit, the digital cubic chaotic map is not an iterative map composed of real numbers in real number field, and its output sequence is no longer an aperiodic sequence in infinite field. From the mathematical meaning of the Lyapunov exponent, it represents the numerical characteristics of the average exponential divergence rate of adjacent trajectories in phase space. For the density of real numbers, we can find a third different real number interval in the two different real numbers. However, in finite field, this property is difficult to achieve. For the digital cubic chaotic Map (20), we cannot find a third different positive integer number interval in the two different positive integer numbers. For example, we cannot find a third different positive integer number interval in positive integer number 1 and 2. Therefore, the Lyapunov exponent can describe the chaotic characteristics of the dynamic iterative map in real number field, but it is difficult to analyze the digital chaotic system effectively. It does not seem sensible to use the Jacobi method to calculate the Lyapunov exponent of Map (20).

3.3. The Dynamic Behaviors of Digital Cubic Chaotic Map

In addition to the Lyapunov exponent, time series and iterative graphs can well reflect the chaotic characteristics of the chaotic map, especially iterative graphs, which can reflect the specific behavior of chaotic attractor of the one-dimensional chaotic map. However, for the proposed digital cubic chaotic map, due to the influence of numerical simulation, it cannot clearly show the characteristics of all sequences, especially when the precision is high. When a = 1 , Map (20) can be expressed as:
x n + 1 = ( 4 x 3 n 2 2 N 3 x n ) mod 2 N ,   n ,   x n .
In order to intuitively analyze the dynamic characteristics of Map (21), when x 0 = 1 , the precision N = 4 , N = 12 , and N = 20 respectively, its time series and iterative diagram are shown in Figure 7.
As shown in Figure 7a, when N = 4 , the output sequence of the digital chaotic Map (21) evolves into a constant sequence with the growing times of iteration, and the value of the output sequence eventually is 0, which can also be reflected in the iterative graph of the sequence. In Figure 7b, when N = 4 , the iterative graph of the digital chaotic Map (21) finally stays at the origin 0. When N = 12 , as shown in Figure 7a, the output sequence of the digital chaotic Map (21) evolves with the iteration of variable and finally becomes a periodic sequence with period 4. The periodic sequence is {940, 1474, 437, 2804}, which can also be reflected in the iterative graph of the sequence. In Figure 7b, when N = 12 , the iterative path of the digital chaotic Map (21) finally forms a closed loop and sequence points jump among four values 940, 1474, 437, and 2804. As shown in Figure 7a, when N = 20 , the output sequence of the digital chaotic Map (21) shows random behavior with the evolution of iteration times, but it is still a periodic sequence. Because of the small number of iterations, we cannot see its period intuitively, but through longer iterations, it will eventually become a periodic sequence, and the same is true for the corresponding diagram of sequence iteration in Figure 7b. It can be seen from Figure 7 that compared with the original chaotic Map (11), the chaotic behavior of the digital chaotic Map (21) is degraded. The digital chaotic Map (21) only has a period attractor, it is no longer a chaotic map. When a = 1 , Map (20) can be expressed as:
x n + 1 = ( 4 x 3 n 2 2 N 3 x n ) mod 2 N , n ,   x n .
where iterative variable x n [ 0 , 2 N 1 ] . When x 0 = 1 , precision N = 4 , N = 10 and N = 20 respectively, its time series and iterative diagram are shown in Figure 8. Due to the inherent limitations of digital circuits, Map (22) also exhibits the same degradation behavior as Map (21). When N = 10 , the period of the output sequence of Map (22) is small, but it is difficult to quickly distinguish from the time series; thus, the repeated period sequence is marked with a red box in the time series.
By comparing Figure 7 and Figure 8, we can see that there are obvious differences in the function graphs of the corresponding functions. In both cases of a = 1 and a = 1 , the functions corresponding to Map (11) are the cubic function. However, the digitized Map (20) is no longer a typical cubic function, and the corresponding functions of Map (11) are different in the two different cases of a = 1 and a = 1 . The deformation degree of Map (11) is large, especially a = 1 . By comparing Figure 8 with Figure 6 and Figure 7 with Figure 5, respectively, the chaotic behavior of the chaotic map realized by the digital circuit is degraded. Furthermore, by analyzing the sequence behavior with different digital circuit precision, we can find that with the increase of precision, the behavior of Map (20) is closer to the original chaotic Map (11). But for digital circuits, the hardware resources are limited, and the precision cannot be infinite. Therefore, in the case of limited resources, the dynamic behavior of Map (20) needs to be optimized to be suitable for the digital application, such as a pseudorandom sequence generator. Nevertheless, in many designs of the chaos-based pseudorandom sequence generator, the degradation of chaotic dynamics due to digital circuit implementation is often ignored, especially the complex periodic phenomenon. In this paper, we analyzed the influence of digital circuits on the complex periodic behavior of the digital cubic chaotic Map (20), and we present an effective method to resist the complex periodic behavior.

4. A Reconfigurable Pseudorandom Sequence Generator

4.1. The Analysis of Determining Periodic Sequence Source

For the digital cubic chaotic Map (20), its output sequence has complex periodic behavior. When the precision is high, the period of output pseudorandom sequence cannot be found effectively. However, for pseudorandom sequences, period and randomness are two important indexes, which need to be analyzed carefully. As seen from Figure 7 and Figure 8, the period of the output sequence of Map (20) shows short period behavior, which is not suitable for an ideal pseudorandom sequence. Therefore, it is necessary to optimize the period of the output sequence of Map (20). Let the general iterative map in the digital field be x n + 1 = F ( x n ) mod 2 N . For a map x n + 1 = F ( x n ) mod 2 N , when different inputs are corresponding to the same output, that is F ( x i ) = F ( x j ) = k mod 2 N , i j , sequence point x i and sequence point x j are not in one cycle. In this case, the more the sequence points are, the smaller the output period of the iterative map x n + 1 = F ( x n ) mod 2 N will be, and multiple sequences with different periods will be generated. Therefore, to effectively increase the period of the output sequence of Map (20), Map (20) can avoid the situation that different inputs correspond to the same output, and an ideal way is to make Map (20) be a one-to-one mapping. However, the rounding function of the term 4 x 3 n 2 2 N in Map (20) seriously affects the functional properties of the corresponding function of Map (20). In this paper, parameters are introduced into the linear term to compensate for the truncation effect due to the elimination of the rounding function. In addition, for Map (20), when x 0 = 0 , F ( x n ) = 0 , n = 1 , 2 , 3 , . Therefore, Map (20) always has a fixed point of 0. In order to avoid this short period behavior situation, it is necessary to offset a constant term parameter to Map (20). By analyzing the specific form of Map (20), the iterative Map (20) is optimized:
x n + 1 = a ( 4 x 3 n 3 c x n ) + d mod 2 N ,   n ,   x n ,
where a { 1 , 1 } , d 0 . The corresponding function of Map (23) is:
f ( x ) = a ( 4 x 3 3 c x ) + d mod 2 N ,   x .
The range of parameter c in Function (24) can be determined by analyzing the precondition of one-to-one mapping.
Lemma 1.
When 3 c is odd, the Function (24) is a one-to-one mapping.
Proof of Lemma 1.
The lemma is proved by the contradiction. First, suppose that the function f ( x ) is not a one-to-one mapping over F 2 N , that is, there are two different numbers t 1 and t 2 such that f ( t 1 ) = f ( t 2 ) . Let f ( t 1 ) = f ( t 2 ) , bring t 1 and t 2 into function f , and we can obtain:
a ( 4 t 1 3 3 c t 1 ) + d mod 2 N = a ( 4 t 2 3 3 c t 2 ) + d mod 2 N .
Merging congeners in Equation (25),
a ( t 1 t 2 ) ( 4 ( t 1 2 + t 1 t 2 + t 2 2 ) 3 c ) mod 2 N = 0 mod 2 N .
For the two different numbers t 1 , t 2 F 2 N , ( t 1 t 2 ) F 2 N . Since a { 1 , 1 } , the parameter a does not affect the parity of Equation (26). In Equation (26), the term 4 ( t 1 2 + t 1 t 2 + t 2 2 ) is an even number. When 3 c is odd, the term ( 4 ( t 1 2 + t 1 t 2 + t 2 2 ) 3 c ) in Equation (26) is an odd number. Then, the term ( 4 ( t 1 2 + t 1 t 2 + t 2 2 ) 3 c ) cannot be a multiple of 2 N , and t 1 = t 2 . However, this is contradictory to the assumption that there are two different numbers t 1 and t 2 . Therefore, Function (24) is a one-to-one mapping. □
Lemma 2.
([33]). For x n + 1 = F ( x n ) mod 2 N , if the k -th column of the output F ( x n ) depends only on the first k -th columns of the x n , then for each cycle in the ( N 1 ) -th iteration of length l , there are either two cycles of length l or one cycle of length 2 l in the N -st iteration. Consequently, if F has any fixed point then for any i > 0 there are at least 2 i + 1 points that belong to cycles of length at most 2 i .
First, the Boolean function of the iterative Map (23) is analyzed in the view of binary. There are only multiplication, addition, and subtraction in Map (23). For any number g , according to the properties of mod 2 N , we can obtain 2 N g mod 2 N = g ˜ + 1 mod 2 N , where the symbol “ ~ “ is bitwise negation. Here, a concrete example of the symbol “ ~ “ is given. When N = 8 , suppose g = 93 , then the binary representation of g is g ( 2 ) , and g ( 2 ) = ( 0 , 1 , 0 , 1 , 1 , 1 , 0 , 1 ) , g ˜ ( 2 ) = ( 0 ˜ , 1 ˜ , 0 ˜ , 1 ˜ , 1 ˜ , 1 ˜ , 0 ˜ , 1 ˜ ) = ( 1 , 0 , 1 , 0 , 0 , 0 , 1 , 0 ) . According to the conversion between decimal system and binary system, g ˜ = 162 , then 2 8 93 mod 2 N = 163 mod 2 8 = 162 + 1 mod 2 8 . Therefore, addition and subtraction can be converted to each other for the properties of mod 2 N , and there are only multiplication and addition in Map (23). In the addition of two multibit numbers, the carry of each single bit addition is added to the next-insignificance bit, and the multiplication also has a similar operation process. Multiplication and addition both satisfy the condition of Lemma 2.
Theorem  1.
When a c = 1 and the parameter d is odd, the output sequence of Map (23) has a definite period, and the period is 2 N .
Proof of Theorem  1.
When N = 1 , Map (23) is:
x n + 1 = a ( 4 x 3 n 3 c x n ) + d mod 2 ,   n ,   x n ,
where x n { 0 , 1 } . Let the initial variable x 0 = 0 , and bring x 0 = 0 into Equation (27), then we can obtain x 1 = d mod 2 . Since d is odd, x 1 = d mod 2 = 1 . When x 1 = 1 , bringing x 1 = 1 into Equation (27), then we can obtain x 2 = 4 a 3 c + d mod 2 . It is known from the precondition that a { 1 , 1 } ; thus, 4 a is even. From Lemma 1, we already know that 3 c is an odd number. From the condition of Theorem 1, we can know that parameter d is odd. Therefore, the sum of two odd numbers d and 3 c is even, then the sum of two even numbers 3 c + d and 4 a is even, that is x 2 = 4 a 3 c + d mod 2 = 0 . When N = 1 , Map (23) can produce a sequence with period 2. According to Lemma 2, when system precision N > 1 , the period of the output sequence of Map (23) is the exponential power of 2. When N > 1 , by using Lemma 2 many times, we can obtain that if x 2 N 1 x 0 , the period of the sequence generated by Map (23) is 2 N . For any initial variable x 0 , we have:
x 1 = 4 a x 3 0 3 a c x 0 + d mod 2 N
x 2 = 4 a x 3 1 3 a c x 1 + d mod 2 N = 4 a x 3 1 ( 3 a c ) 4 a x 3 0 + ( 3 a c ) 2 x 0 ( 3 a c ) d + d mod 2 N
x 3 = 4 a x 3 2 3 a c x 2 + d mod 2 N = 4 a x 3 2 ( 3 a c ) 4 a x 3 1 + ( 3 a c ) 2 4 a x 3 0 ( 3 a ) 3 4 a c x 3 0 + ( 3 a ) 2 d ( 3 a ) d + d mod 2 N
x 2 N 1 = 4 a ( i = 1 2 N 1 1 ( 3 a c ) 2 N 1 1 i x 3 i ) + d ( i = 1 2 N 1 ( 3 a c ) i 1 ) + 4 a ( 3 a c ) 2 N 1 1 x 3 0 + ( 3 a c ) 2 N 1 x 0 mod 2 N
Let the initial variable x 0 = 0 , we can obtain:
x 2 N 1 = 4 a ( i = 1 2 N 1 1 ( 3 a c ) 2 N 1 1 i x 3 i ) + d ( i = 1 2 N 1 ( 3 a c ) i 1 ) mod 2 N
Since 4 a is an even number, the term 4 a ( i = 1 2 N 1 1 ( 3 a c ) 2 N 1 1 i x 3 i ) in Equation (32) also is an even number. From the condition of Theorem 1, we can know that parameter a c = 1 , then the term ( i = 1 2 N 1 ( 3 a c ) i 1 ) in Equation (32) is even. Therefore, the product of an even number ( i = 1 2 N 1 ( 3 a c ) i 1 ) and an odd number d is even, and the sum of an even number d ( i = 1 2 N 1 ( 3 a c ) i 1 ) and even numbers 4 a ( i = 1 2 N 1 1 ( 3 a c ) 2 N 1 1 i x 3 i ) is even. However, term 4 a ( i = 1 2 N 1 1 ( 3 a c ) 2 N 1 1 i x 3 i ) and term d ( i = 1 2 N 1 ( 3 a c ) i 1 ) are polynomial on the power of ( 3 a c ) . Then, x 2 N 1 is polynomial on the power of ( 3 a c ) . For each x n , 1 n 2 N 1 , they have a common factor ( 3 a c ) . Since ( 3 a c ) is an odd number, x 2 N 1 cannot be the multiple of 2 N . According to the properties of mod 2 N , x 2 N 1 = 4 a ( i = 1 2 N 1 1 ( 3 a c ) 2 N 1 1 i x 3 i ) + d ( i = 1 2 N 1 ( 3 a c ) i 1 ) mod 2 N 0 , that is, x 2 N 1 x 0 . In conclusion, the period of the sequence generated by iterative Map (23) is 2 N . □
For Map (23), according to the selection of parameter a and parameter c , it can be changed into two similar maps. When a = 1 and c = 1 , Map (23) can be changed into Map (33).
x n + 1 = ( 4 x 3 n 3 x n ) + d mod 2 N ,   n ,   x n .
When a = 1 and c = 1 , Map (23) can be changed into Map (34).
x n + 1 = ( 4 x 3 n + 3 x n ) + d mod 2 N ,   n ,   x n .
By simplifying Map (34), we can obtain:
x n + 1 = 4 x 3 n 3 x n + d mod 2 N ,   n ,   x n .
Although the output sequences of Maps (33) and (35) vary with the evolution of iteration, the periods of sequences generated by both of them are 2 N . By combining the form of Maps (33) and (35), a comprehensive map is obtained:
x n + 1 = a 4 x 3 n 3 x n + d mod 2 N ,   n ,   x n ,
where a { 1 , 1 } . For any odd number d , Map (36) can output a sequence with period 2 N . Therefore, Map (36) can be regarded as a family of iterative map sets that can output sequences with period 2 N under precision N , in which the elements are Map (36) with an odd number d under a certain precision. In this set, when d = 1 , Map (36) under precision N has a simpler form; thus, we can obtain a definite map:
x n + 1 = a 4 x 3 n 3 x n + 1 mod 2 N ,   n ,   x n ,
where a { 1 , 1 } . Chengqing Li, Bingbing Feng, Shujun Li, Jüergen Kurths, and Guanrong Chen observed that the effectiveness of the improvement method for digital chaotic system mainly depends on the period distribution under low precision [19]. However, many proposed improvement methods ignore the analysis under low precision. In contrast, the map proposed in this paper also has a good periodic distribution under low precision. When precision N is low, all periodic behaviors of the map in the digital field can be found by traversal search. In Figure 9, when precision N = 4 , all periodic behaviors of Maps (20) and (37) are shown completely.
As can be seen from Figure 9, when a = 1 , Map (20) shows the complex periodic behavior, and no matter which initial value starts, it will eventually become a periodic sequence with period 1 and show only period point 0 after several iterations. This short period behavior is not acceptable in the design of a pseudorandom sequence generator, and the sequence cannot be used as a pseudorandom sequence in the cryptosystem. However, when a = 1 , Map (37) shows excellent periodic behavior. Its output sequence forms a perfect closed-loop, the period reaches the ideal value 2 4 , and shows ergodicity. When a = 1 Map (20) shows more complex periodic behavior than when a = 1 . Five sequence points 4, 11, 13, 5, and 14 form a small closed-loop, which represents a periodic sequence {4, 11, 13, 5, 14} with period 5. Starting from one of the remaining initial values, after several iterations, it will eventually become a periodic sequence with period 1 and show only period point 0. This short period behavior and multiple period behavior is also not acceptable in the design of a pseudorandom sequence generator, and the sequence is hard to be used as a pseudorandom sequence in the cryptosystem. As in the case of a = 1 , when a = 1 the output sequence of Map (37) forms a perfect closed loop, and the period reaches the ideal value 2 4 . Since the values of the output sequences of Map (37) are different with the evolution of iteration in the two cases of a = 1 or a = 1 , they belong to two different periodic sequences with the largest period.
When precision N is higher, the difference between all periodic behaviors of Maps (20) and (37) is more obvious. Due to the limitation of computer precision and storage devices, the periodic behavior of Maps (20) and (37) cannot be directly described when the precision N is high. Therefore, when precision N = 17 , the periods of the output sequences of Maps (20) and (37) are analyzed and distinguished. When the system precision is high, the period of sequence can be estimated by autocorrelation detection. Autocorrelation detection can reflect the dependence relationship of a signal between two different moments, which is an important detection method to evaluate the sequence period. The expression of the autocorrelation function is as follows:
R z ( m ) = 1 K n = 0 K 1 Z n Z n + m ,
where R z ( m ) and K represent the autocorrelation function and the length of detection sequence, respectively. The autocorrelation detection results of the output sequences of Maps (20) and (37) are shown in Figure 10.
For Map (20), when a = 1 or a = 1 , a 1000-length sequence is selected from the output sequence for autocorrelation detection. However, for Map (37), when a = 1 and a = 1 , a 2 17 -length sequence is selected from the output sequence for autocorrelation detection. In Figure 10, the distance between two peaks can be approximately expressed as the period of the sequence. For Map (20), there are many peaks in Figure 10a,b. Through autocorrelation detection, whether a = 1 or a = 1 , the period of output sequence generated by Map (20) is much less than 1000. By measuring the distance between the two peaks, we find that whether a = 1 or a = 1 , the period of output sequence generated by Map (20) is less than 200. In contrast, for Map (37), only one peak can be seen in Figure 10a,b respectively. Since the length of the test sequence is 2 17 , whether a = 1 or a = 1 , the period of output sequence generated by Map (37) is greater than or equal to 2 17 . According to the theory of digital circuits and cryptography, when the system precision is N , the maximum period of the sequence is 2 N . When system precision N = 17 , whether a = 1 or a = 1 , the period of output sequence generated by Map (37) is less than or equal to 2 17 . Therefore, when system precision N = 17 , whether a = 1 or a = 1 , the period of output sequence generated by Map (37) is equal to 2 17 = 131072 . When system precision N = 17 , whether a = 1 or a = 1 , the period of the sequence generated by Map (37) is at least 655 times larger than that of the sequence generated by Map (20). The proposed Map (37) in this paper greatly improves the period of the sequence generated by the digital cubic chaotic map in finite field.

4.2. The Design of a Reconfigurable Pseudorandom Sequence Generator

In addition to period behavior, as a rule, the weakest statistical property the sequence must necessarily satisfy to be considered as pseudorandom in any reasonable meaning is a uniform distribution, that is, each term of the sequence must occur with the same frequency. From Theorem 1, the period of the output sequence of Map (36) is 2 N , and thus is its special form Map (37). For Maps (33) and (35), each term of the sequence occurs with the same frequency within a period, and the probability of occurrence is 1 / 2 N , which satisfies the uniform distribution in pseudorandom sequence theory. Since the output sequence of Map (36) has a large period, good randomness, excellent algebraic form, and high symmetry, a reconfigurable pseudorandom sequence generator is designed based on Map (36). When N = 32 , the principle block diagram is shown in Figure 11.
As shown in Figure 11, the proposed reconfigurable pseudorandom sequence generator implements both Maps (33) and (35), where module d 3 x n and module x 3 n are shared reconfigurable modules. By reducing the repeated use of these two modules, hardware resources can be greatly saved. Compared with only one map, the number of output sequences can be further increased, and the randomness of output sequences can be enhanced by implementing two maps at the same time. The output sequences of Maps (33) and (35) undergo the same processing: module P ( x ) , module B ( x ) , and module H ( x ) . For an integer number s under precision N , it has a binary vector form ( s [ N 1 ] , s [ N 2 ] , , s [ 0 ] ) . The relationship between decimal s and binary s [ k ] , k = 0 , 1 , 2 , , N 1 , is as follows:
s = k = 0 N 1 s [ k ] 2 k ,   s ,   s [ k ] { 0 , 1 } .
In Figure 11, the specific operation method of the module P ( x ) is as follows:
P ( x ) = x ( x < < < 13 ) ( x < < < 23 ) ,
where x < < < i denotes i -bit left rotation of a value x , and denotes bitwise xor operation. The module P ( x ) is a linear diffusion operation, it can associate each bit of the binary vector of x with other bits. The function of the module B ( x ) is bit extraction, its specific operation is:
B ( x ) = { x [ 31 ] , x [ 30 ] , x [ 16 ] , x [ 1 ] , x [ 0 ] } .
For an integer number x , the module B ( x ) will extract specific 5 bits from the binary vector of x , that is { x [ 31 ] , x [ 30 ] , x [ 16 ] , x [ 1 ] , x [ 0 ] } . In Figure 7, the module H ( x ) is a special nonlinear function, which has the property of five inputs and one output. For a five bits input { h [ 4 ] , h [ 3 ] , h [ 2 ] , h [ 1 ] , h [ 0 ] } , the specific form of function H ( x ) is:
H ( x ) = h 1 h 4 h 2 h 3 h 1 h 4 h 0 h 2 h 3 h 4 h 1 h 3 h 0 h 1 h 4 h 1 h 2 h 3 h 0 h 1 h 2 h 4 h 0 h 1 h 3 h 4 .
Since the output sequences of Maps (33) and (35) undergo the same processing: module P ( x ) , module B ( x ) , and module H ( x ) , these three different modules also are the reconfigurable modules in the proposed reconfigurable pseudorandom sequence generator. By calculating the Walsh spectrum of the function H ( x ) , we find that the function is balanced, that is, the number of 0 and 1 in its output sequences are equal. Since Module P ( x ) is a linear diffusion operation and reversible, it is balanced. The module B ( x ) extracts specific bits from the binary vector of x , it does not affect the characteristics of the sequence. For the module H ( x ) , it also is a balanced Boolean function. Therefore, the output sequence of the proposed reconfigurable pseudorandom sequence generator is balanced, and the period is 2 N . When N = 32 , the period of the output sequence is 2 32 .

4.3. The Implementation and Performance Analysis

After designing the reconfigurable pseudorandom sequence generator, we implement it in hardware via FPGA. When b = 1 , the hardware implementation diagram of a specific reconfigurable pseudorandom sequence generator is shown in Figure 12, the time series waveform is shown in Figure 13, and the consumption of hardware resources is shown in Table 1.
From Figure 13, the output of the proposed reconfigurable pseudorandom sequence generator does show a noise-like behavior. In addition to using probability distribution to analyze the randomness of sequence, randomness detection is also another important method. At present, the main test method of randomness in the world is NIST-sp800 test suite, which is the national standard for measuring randomness in the world and published by the National Institute of Standards and Technology of the United States [34]. NIST-sp800 test suite focuses on a variety of models for sequence randomness detection, including many approximately independent statistical tests, such as linear complexity, approximate entropy, etc. The version of NIST-sp800 test suite used in this paper is 2.1.2, and 100 groups of sequences with a length of 1,000,000 are detected. The detection results are shown in Table 2.
In Table 2, the minimum pass rate for each statistical test with the exception of the random excursion (variant) test is approximately = 96 for a sample size = 100 binary sequences. The minimum pass rate for the random excursion (variant) test is approximately = 62 for a sample size = 66 binary sequences. In Table 2, if the ratio is greater than 1, it means passing the corresponding subtest in NIST-sp800 test suite. In the parameter setting of NIST-sp800 test suite, the block length of Block frequency test is 128; the block length of NonOverlappingTemplate test is 9; the block length of OverlappingTemplate test is 9; the block length of ApproximateEntropy test is 10; the block length of Serial test is 16; the block length of LinearComplexity test is 500. Among the 15 subtests, Cumulative Sums test, NonOverlappingTemplate test, RandomExcursions test, RandomExcursionsVariant test, and Serial test have multiple test output results. In Table 2, only the lowest U-value in multiple results of these 5 different subtests are showed.
The p-value is a statistical test value for the randomness of a group of measured sequences for NIST-sp800 test suite, and it is a positive number less than or equal to 1. The larger p-value is, the stronger the randomness of the measured sequence is. For a group of test sequences, p-value is the index to determine whether the sequence can pass all 15 subtests in NIST-sp800 test suite. If p-value is determined to be equal to 1, the sequence appears to be completely random, and p-value less than 0.01 indicates that the sequence appears to be completely non-random. In Table 2, U-value is a distribution of p-value of 100 groups of sequences, and U-value of each subtest can be seen from Table 2. As shown in Table 2, the output sequence has passed the test of NIST-sp800 test suite and shows good randomness. Since period and randomness can be determined, the proposed reconfigurable pseudorandom sequence generator not only has low resource consumption but also has good performances.
For the chaos-based pseudorandom sequence generator, which has two main characteristics, one is period, the other is randomness. Therefore, the period and randomness are the core indexes. However, randomness has been widely concerned, but periodicity has not. In addition, with the development of chaos-based cryptosystem, increased attention has been paid to the consumption of hardware resources and reconfigurability has become an important principle in the design of pseudorandom sequence generators, stream cipher, and block cipher, especially stream cipher. For the design of stream cipher, pseudorandom sequence generator is a required important module, and its reconfigurability has gained extensive attention and been studied. Therefore, reconfigurability is regarded as the third important index of performance for the pseudorandom sequence generator based on the chaotic map.
At present, the pseudorandom sequence generators based on chaotic map is an important part of the chaos-based cryptosystem, and the short period characteristic has gradually become a common attack method to crack chaos-based cryptosystems. Compared with randomness, the period is often ignored by most designers of chaos-based cryptosystems. Most of the proposed chaos-based cryptosystems do not analyze the period of the output sequence, and certain chaos-based cryptosystems suggest special algorithms for searching the period of output sequence via computer under low precision; only a few chaos-based cryptosystems give the proof of definite period of the output sequence in mathematics under any precision. This paper selects several existing typical and great chaos-based pseudorandom sequence generators and compares them with the methods proposed in this paper. The comparison results between the proposed and other existing methods are shown in Table 3.
In Table 3, although all five methods have passed the random test, the periods of their output sequences are completely different. For Method in [15] and Method in [16], by transforming the accuracy between different systems, we can get the following relationship: N = K ( log 2 3 ) , N = 2 M ( log 2 3 ) . For the method proposed by [15], a special algorithm of searching sequence period is given, and only an approximate value of the period is given under precision K = 20 . By comparison, the period of output sequence generated by the proposed method in this paper is 2 K ( log 2 3 ) 10 9 . For the method proposed by [16], the period of the output sequence is 2 ( 3 M 1 ) . Since N = 2 M ( log 2 3 ) , the period of output sequence generated by the proposed method in this paper is greatly larger than the method proposed by [16]. For the method proposed by [17], an algorithm of exhaustive search is given, and the period of the output sequence is 656 under precision N = 19 . However, when N = 19 , the period of output sequence generated by the proposed method in this paper is 2 19 = 524288 . For the method proposed by [18], the period of the output sequence is not analyzed, only the randomness is tested. Except for period comparison, all five methods have passed the randomness test, and only the method proposed in this paper is reconfigurable. As can be seen from Table 3, the results of the period, randomness, and reconfigurability analysis demonstrate that the proposed one is better than the related work in terms of security and performance.
In addition to chaos-based pseudorandom sequence generators, there are many standard pseudorandom sequence generators [35], such as linear congruence generator (LCG), linear feedback shift register sequence generator (LFSR), well-known trinomial-based generalized feedback shift register sequence generator (GFSR), Mersenne twist generator (MT19937), subtract with borrow generator (SWB), and stream cipher algorithm. There are differences in their random performance, mainly whether they have encryption ability. AES in stream cipher modes (OFB, CTR, KTR) is the pseudorandom sequence generator with encryption ability. Besides NIST-sp800, Testu01 has the majority of types of randomness tests [35]. Offering a rich variety of empirical tests is the purpose of the TestU01 library. In TestU01 user’s guide (compact version) [35], to test a pseudorandom sequence generator, it is recommended to start with the quick battery SmallCrush. If everything is fine, one can try Crush, and finally, the more stringent BigCrush. Testu01 testing has been added to the paper, and the test results are as follows.
In Table 4, the AES-KTR mode uses a counter as key that is increased by 1 at each encryption iteration, and the speed is the required time (in seconds) to generate 108 random numbers. The randomness of the pseudorandom sequence proposed in this paper is higher than that of the ordinary standard pseudorandom sequence, but the speed is slower. Compared with the cryptographic algorithm, the randomness of the cryptographic algorithm is higher than that of the pseudorandom sequence proposed in this paper, and the speed is relatively slow, but they have the ability to encrypt information. However, the method proposed in this paper cannot encrypt the information and has no encryption ability. In Table 4, our implementations of pseudorandom sequence generators are not necessarily the fastest possible. According to the cipher document, we found that the optimized AES can run normally above 10 GB/s, which is a high speed. In view of the above indicators analysis, we can conclude that the pseudorandom sequence generator based on the proposed method in this paper has good randomness.

5. Conclusions

The complex periodic behavior of the digital chaotic system is a potential factor that affects the application of the digital chaotic system in the pseudorandom sequence generator. This paper studies a combined cubic chaotic map and analyzes the dynamic characteristics of the special cubic chaotic map after digitization. Compared with the chaotic attractor in real number field, we find that the attractor of the proposed cubic chaotic map in digital field changes and finally forms the periodic attractor. For the proposed cubic chaotic map, when a = 1 , the chaotic attractor can be divided into two parts, which is different from that when a = 1 . However, after digitization in finite field when a = 1 , the attractor will deform greatly and become similar to the situation of a = 1 . By offsetting the influence of truncation, for any precision N , we successfully prove the period of output sequence of the digital cubic map is 2 N in mathematics, which is the theoretical maximum value. Based on the great period behavior, a novel pseudorandom sequence generator is proposed, which is high symmetry and can greatly reduce the consumption of resources. Compared with the existing methods, the proposed pseudorandom sequence generator in this paper has advantages in period and reconfigurability. Through theoretical analysis and random detection, the sequence output by the proposed generator also has good randomness, which can be used to generate good periodic pseudorandom sequences and can be combined with other chaotic functions to further form the required chaotic pseudorandom sequences.

Author Contributions

C.W. and Q.L.; methodology, J.S. and Y.D.; Software, C.W.; writing—original draft preparation, Y.Z. and J.T.; writing—review and editing. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by Scientific Research Foundation for the PhD (grant number XJ20BS44), Scientific Research Project of Education Department of Hubei Province (grant number Q20192201), Youth Project of Hubei School of Economics (grant number XJ201912), and Hubei Provincial Natural Science Foundation of China (grant number 2019CFB778 and 2020CFB306).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data sharing not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lorenz, E.N. Deterministic nonperiodic flow. J. Atmos. Sci. 1963, 20, 130–141. [Google Scholar] [CrossRef] [Green Version]
  2. Wheeler, D.D.; Matthews, R.A.J. Supercomputer investigations of a chaotic encryption algorithm. Cryptologia 1991, 15, 140–152. [Google Scholar] [CrossRef]
  3. Alawida, M.; Samsudin, A.; Teh, J.S.; Alkhawaldeh, R.S. A new hybrid digital chaotic system with applications in image encryption. Signal Process. 2019, 160, 45–58. [Google Scholar] [CrossRef]
  4. Wang, C.; Fan, C.; Ding, Q. Constructing Discrete Chaotic Systems with Positive Lyapunov Exponents. Int. J. Bifurcat. Chaos 2018, 28, 1850084. [Google Scholar] [CrossRef]
  5. Shengtao, G.; Tao, W.; Shida, W.; Xuncai, Z.; Ying, N. A Novel Image Encryption Algorithm Based on Chaotic Sequences and Cross-Diffusion of Bits. IEEE Photonics J. 2020, 13, 3900215. [Google Scholar]
  6. Yoshioka, D. Security of Public-Key Cryptosystems Based on Chebyshev Polynomials over Z/pkZ. IEEE Trans. Circuits Syst. II Express Briefs 2019, 67, 2204–2208. [Google Scholar] [CrossRef]
  7. Wang, C.; Ding, Q. SM4 key scheme algorithm based on chaotic system. Acta Phys. Sin. 2017, 66, 020504-1. [Google Scholar]
  8. Kalanadhabhatta, S.; Kumar, D.; Anumandla, K.K.; Reddy, S.A.; Acharyya, A. PUF-Based Secure Chaotic Random Number Generator Design Methodology. IEEE Trans. Very Large Scale Integr. (VLSI) Syst. 2020, 28, 1740–1744. [Google Scholar] [CrossRef]
  9. Wang, C.; Fan, C.; Feng, K.; Huang, X.; Ding, Q. Analysis of the time series generated by a new high-dimensional discrete chaotic system. Complexity 2018, 2018, 9818520. [Google Scholar] [CrossRef]
  10. Muhammad, A.S.; Özkaynak, F. SIEA: Secure Image Encryption Algorithm Based on Chaotic Systems Optimization Algorithms and PUFs. Symmetry 2021, 13, 824. [Google Scholar] [CrossRef]
  11. Zhang, C.; Jiang, J.; Qu, S.X.; Lai, Y.C. Predicting Phase and Sensing Phase Coherence in Chaotic Systems with Machine Learning. Chaos Interdiscip. J. Nonlinear Sci. 2020, 30, 073142. [Google Scholar] [CrossRef]
  12. Wang, C.; Ding, Q. Constructing Digitized Chaotic Time Series with a Guaranteed Enhanced Period. Complexity 2019, 2019, 5942121. [Google Scholar] [CrossRef] [Green Version]
  13. Matthews, R. On the derivation of a “Chaotic” encryption algorithm. Cryptologia 1989, 8, 29–41. [Google Scholar] [CrossRef]
  14. Li, S.; Chen, G.; Mou, X. On the Dynamical Degradation of Digital Piecewise Linear Chaotic Maps. Int. J. Bifurc. Chaos 2005, 15, 3119–3151. [Google Scholar] [CrossRef] [Green Version]
  15. Yang, B.; Liao, X. Period Analysis of the Logistic Map for the Finite Field. Sci. China (Inf. Sci.) 2017, 60, 49–63. [Google Scholar] [CrossRef]
  16. Souza, C.E.C.; Chaves, D.P.B.; Pimentel, C. One-Dimensional Pseudo-chaotic Sequences Based on the Discrete Arnold’s Cat Map Over Z3m. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 491–495. [Google Scholar] [CrossRef]
  17. Miyazaki, T.; Araki, S.; Nogami, Y.; Uehara, S. Rounding Logistic Maps over Integers and the Properties of the Generated Sequences. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2011, 94, 1817–1825. [Google Scholar] [CrossRef]
  18. Irfan, M.; Ali, A.; Khan, M.A.; Ehatisham-ul-Haq, M.; Mehmood Shah, S.N.; Saboor, A.; Ahmad, W. Pseudorandom Number Generator (PRNG) Design Using Hyper-Chaotic Modified Robust Logistic Map (HC-MRLM). Electronics 2020, 9, 104. [Google Scholar] [CrossRef] [Green Version]
  19. Li, C.; Feng, B.; Li, S.; Kurths, J.; Chen, G. Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2019, 2019, 1–14. [Google Scholar] [CrossRef] [Green Version]
  20. Lin, T.; Chua, L.O. On Chaos of Digital Filters in the Real World. IEEE Trans. Circuits Syst. 1991, 38, 557–558. [Google Scholar] [CrossRef]
  21. Alvarez, G.; Amigó, J.M.; Arroyo, D.; Li, S. Lessons Learnt from the Cryptanalysis of Chaos-Based Ciphers [B]. In Chaos-Based Cryptography; Springer: Berlin/Heidelberg, Germany, 2011. [Google Scholar]
  22. Deng, Y.; Hu, H.; Xiong, W.; Xiong, N.N.; Liu, L. Analysis and Design of Digital Chaotic Systems with Desirable Performance via Feedback Control. IEEE Trans. Syst. Man Cybern. Syst. 2015, 45, 1187–1200. [Google Scholar] [CrossRef]
  23. Zheng, J.; Hu, H.; Xia, X. Applications of Symbolic Dynamics in Counteracting the Dynamical Degradation of Digital Chaos. Nonlinear Dyn. 2018, 94, 1535–1546. [Google Scholar] [CrossRef]
  24. Chen, C.; Sun, K.; Peng, Y.; Alamodi, A.O. A novel control method to counteract the dynamical degradation of a digital chaotic sequence. Eur. Phys. J. Plus 2019, 134, 31. [Google Scholar] [CrossRef]
  25. Wang, C.F.; Ding, Q. Theoretical Design of Controlled Digitized Chaotic Systems with Periodic Orbit of Upper Limit Length in Digital Circuit. Nonlinear Dyn. 2019, 98, 257–268. [Google Scholar] [CrossRef]
  26. Lin, Z.; Yu, S.; Lü, J.; Cai, S.; Chen, G. Design and ARM-Embedded Implementation of A Chaotic Map-Based Real-Time Secure Video Communication System. IEEE Trans. Circuits Syst. Video Technol. 2015, 25, 1203–1216. [Google Scholar]
  27. Guyeux, C.; Bahi, J.M. Topological Chaos and Chaotic Iterations. Application to Hash functions. In Proceedings of the Neural Networks (IJCNN), IEEE International Joint Conference on Neural Networks, Barcelona, Spain, 18–23 July 2010; pp. 1–7. [Google Scholar]
  28. Wang, Q.; Yu, S.; Li, C.; Lü, J.; Fang, X.; Guyeux, C.; Bahi, J.M. Theoretical Design and FPGA-Based Implementation of Higher-Dimensional Digital Chaotic Systems. IEEE Trans. Circuits Syst. I Regul. Pap. 2016, 63, 401–412. [Google Scholar] [CrossRef] [Green Version]
  29. Zhou, Y.; Hua, Z.; Pun, C.M.; Chen, C.P. Cascade Chaotic System with Applications. IEEE Trans. Cybern. 2015, 45, 2001–2012. [Google Scholar] [CrossRef] [PubMed]
  30. Shakiba, A. A novel 2D cascade modulation couple hyperchaotic mapping for randomized image encryption. Multimed. Tools Appl. 2021, 2021, 1–24. [Google Scholar]
  31. Rogers, T.D.; Whitley, D.C. Chaos in the cubic mapping. Math. Model. 1983, 4, 9. [Google Scholar] [CrossRef] [Green Version]
  32. Steeb, W.H.; Solms, F.; Shi, T.K.; Stoop, R. Cubic map, complexity and Ljapunov exponent. Phys. Scr. 1997, 55, 520. [Google Scholar] [CrossRef]
  33. Klimov, A.; Shamir, A. A new class of invertible mappings. In Cryptographic Hardware and Embedded Systems-CHES2002, Proceedings of the 4th International Workshop, Redwood Shores, CA, USA, 13–15 August 2002; Revised Papers; Springer: Berlin/Heidelberg, Germany, 2002. [Google Scholar]
  34. Rukhin, A.; Soto, J.; Nechvatal, J.; Smid, M.; Barker, E. A statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; NIS Special Publication 800–22, Rev. 1-a; National Institute of Standards and Technology: Gaithersburg, MD, USA, 2010.
  35. L’Ecuyer, P.; Simard, R. TestU01 A Software Library in ANSI C for Empirical Testing of Random Number Generators—User’s Guide, Compact Version. 16 May 2013. Available online: http://simul.iro.umontreal.ca/testu01/guideshorttestu01.pdf (accessed on 27 July 2021).
Figure 1. When a = 1 , the influence of parameters on iteration variable x n .
Figure 1. When a = 1 , the influence of parameters on iteration variable x n .
Symmetry 13 01420 g001
Figure 2. When a = 1 , the influence of parameters on iteration variable x n .
Figure 2. When a = 1 , the influence of parameters on iteration variable x n .
Symmetry 13 01420 g002
Figure 3. The Lyapunov exponent spectrum of Map (2) under different parameter a .
Figure 3. The Lyapunov exponent spectrum of Map (2) under different parameter a .
Symmetry 13 01420 g003
Figure 4. The diagram of Function (12) under different parameter a .
Figure 4. The diagram of Function (12) under different parameter a .
Symmetry 13 01420 g004
Figure 5. The time series and iterative graph of Map (13).
Figure 5. The time series and iterative graph of Map (13).
Symmetry 13 01420 g005
Figure 6. The time series and iterative graph of Map (14).
Figure 6. The time series and iterative graph of Map (14).
Symmetry 13 01420 g006
Figure 7. The time series and iterative graph (attractor) of Map (21) under different precision.
Figure 7. The time series and iterative graph (attractor) of Map (21) under different precision.
Symmetry 13 01420 g007
Figure 8. The time series and iterative graph (attractor) of Map (22) under different precision.
Figure 8. The time series and iterative graph (attractor) of Map (22) under different precision.
Symmetry 13 01420 g008aSymmetry 13 01420 g008b
Figure 9. When N = 4 , all periodic behaviors of Maps (20) and (37).
Figure 9. When N = 4 , all periodic behaviors of Maps (20) and (37).
Symmetry 13 01420 g009
Figure 10. When N = 17 , autocorrelation detection of Maps (20) and (37).
Figure 10. When N = 17 , autocorrelation detection of Maps (20) and (37).
Symmetry 13 01420 g010
Figure 11. A reconfigurable pseudorandom sequence generator.
Figure 11. A reconfigurable pseudorandom sequence generator.
Symmetry 13 01420 g011
Figure 12. The hardware implementation diagram of reconfigurable pseudorandom sequence generator.
Figure 12. The hardware implementation diagram of reconfigurable pseudorandom sequence generator.
Symmetry 13 01420 g012aSymmetry 13 01420 g012b
Figure 13. The output sequence waveform of reconfigurable pseudorandom sequence generator.
Figure 13. The output sequence waveform of reconfigurable pseudorandom sequence generator.
Symmetry 13 01420 g013
Table 1. The consumption of hardware resources.
Table 1. The consumption of hardware resources.
Total Logic ElementsTotal Combinational FunctionsDedicated Logic RegistersLpm_Mult
14941493342
Table 2. Results of the NIST-sp800 test suite.
Table 2. Results of the NIST-sp800 test suite.
SubtestU-ValueRatioResult
Frequency0.09093699/96Success
Block frequency0.779188100/96Success
Cumulative Sums0.28966799/96Success
Runs0.009535100/96Success
LongestRun0.73991898/96Success
Rank0.935716100/96Success
FFT0.26224999/96Success
NonOverlappingTemplate0.01265099/96Success
OverlappingTemplate0.61630599/96Success
Universal0.14532698/96Success
ApproximateEntropy0.83430899/96Success
RandomExcursions0.00204365/62Success
RandomExcursionsVariant0.03200065/62Success
Serial0.22482199/96Success
LinearComplexity0.05536197/96Success
Table 3. The comparison results between the proposed and other existing methods.
Table 3. The comparison results between the proposed and other existing methods.
Sequence Generator PeriodNIST-sp800 Test SuiteReconfigurability
Method in [15] 10 8 ( K = 20 ) SuccessNo
Method in [16] 2 ( 3 M 1 ) SuccessNo
Method in [17] 656 ( N = 19 ) SuccessNo
Method in [18]Not analyzedSuccessNo
The proposed 2 N SuccessYes
Table 4. The comparison results between the proposed and other existing generators.
Table 4. The comparison results between the proposed and other existing generators.
GeneratorsSpeedSmall CrushCrushBig Crush
LCG(224, 16,598,013, 12,820,163)0.66FailureFailureFailure
LCG(231, 65,539, 0)0.65FailureFailureFailure
LCG(232, 69,069, 1)0.67FailureFailureFailure
LCG(246, 513, 0)0.75FailureFailureFailure
LCG(263, 519, 1)0.75SuccessFailureFailure
LFSR1131.0SuccessFailureFailure
LFSR2581.2SuccessFailureFailure
GFSR(250, 103)0.9SuccessFailureFailure
MT199371.6SuccessFailureFailure
The proposed3.4SuccessSuccessFailure
SWB(224, 10, 24)43SuccessSuccessSuccess
AES (CTR)5.4SuccessSuccessSuccess
AES (OFB)5.8SuccessSuccessSuccess
AES (KTR)5.2SuccessSuccessSuccess
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Wang, C.; Di, Y.; Tang, J.; Shuai, J.; Zhang, Y.; Lu, Q. The Dynamic Analysis of a Novel Reconfigurable Cubic Chaotic Map and Its Application in Finite Field. Symmetry 2021, 13, 1420. https://doi.org/10.3390/sym13081420

AMA Style

Wang C, Di Y, Tang J, Shuai J, Zhang Y, Lu Q. The Dynamic Analysis of a Novel Reconfigurable Cubic Chaotic Map and Its Application in Finite Field. Symmetry. 2021; 13(8):1420. https://doi.org/10.3390/sym13081420

Chicago/Turabian Style

Wang, Chuanfu, Yi Di, Jianyu Tang, Jing Shuai, Yuchen Zhang, and Qi Lu. 2021. "The Dynamic Analysis of a Novel Reconfigurable Cubic Chaotic Map and Its Application in Finite Field" Symmetry 13, no. 8: 1420. https://doi.org/10.3390/sym13081420

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop