Font Size: a A A

Construction Of Random Number Generator Based On Chaotic System And Its Hash Application

Posted on:2021-01-06Degree:MasterType:Thesis
Country:ChinaCandidate:S M HanFull Text:PDF
GTID:2370330629452982Subject:Electronic Science and Technology
Abstract/Summary:PDF Full Text Request
In the 21 st century,the Internet has long been integrated into everyone's daily life.While enjoying the accurate and real-time transmission of information through the Internet,people rarely realize the crucial part of information: random numbers.For today's era of information explosion,random numbers exist in almost every field covered by information,such as: communications,information encryption,security chips and other fields.People encrypt the information in a certain way with the secret key to prevent the hacker from stealing.The hacker cracks the encrypted message by looking for the rules in the secret key.Therefore,the randomness of the secret key is an important means to ensure information security.With the development of electronic technology,the traditional random number algorithm has been unable to meet the requirements of key security.The chaotic system itself has such good initial value sensitivity,quasi-randomness,ergodicity and unpredictability,which has been widely concerned by random number researchers.Although the chaotic system itself has good performance,due to the limitation of the precision of digital equipment,the chaotic system is degraded by chaos and cannot reach the theoretical performance.This problem has been hindering the widespread application of chaotic systems in the field of random number generators.First,distinguish it from other methods that use LFSR as an external disturbance source or multiple chaotic systems to interconnect and construct a random number generator in a certain way.In this paper,Logistic mapping is used as the only basic function of the random number generator.By changing the way of its iteration,the parameter disturbance and the input disturbance are controlled efficiently.Based on this method,a pseudo-random number generator with good randomness is designed.Finally,the designed pseudo-random number generator is implemented on the FPGA device.Compared with the random number generator constructed by other schemes,the random number generator consumes less resources.And the random number generator has passed various security tests.Then,most of the traditional true random number generators are based on analog circuits,which convert and use signals from hot noise and electrical noise.With the continuous advancement of integrated circuit technology,today's digital equipment has already been integrated into all electronic fields.In order to meet the demand for true random number generators in the digital field,researchers often design true random number generators from the phase jitter of a digital ring oscillator(RO)or the metastable state of a trigger as a random signal source.However,due to the low collision rate of the signal source,it has been difficult to increase the output frequency of the true random number generator.This article uses the combination of a ring oscillator(RO)and a D flip-flop as a random signal source.Among them,the ring oscillator is easier to produce phase jitter,and the RO has a higher oscillation frequency to make it easier to enter the D flip-flop used with it Metastable.Then,chaotic mapping is used to realize the frequency conversion between the high frequency output of the system and the low frequency sampling of the random source,so that the random source can accumulate more jitter.Based on this scheme,not only can the randomness of the random number generator be guaranteed,but also the random number generator can be guaranteed to have a higher output frequency.Finally,a pseudo-random number generator is constructed using the technique of two Logistic maps disturbing each other,and a lightweight and high-speed Hash function is designed based on the random number generator.The Hash function has almost real-time information processing capabilities,can quickly generate the corresponding Hash value after completing the message input,and the system consumes less hardware resources and is suitable for resource-constrained environments.The "confuse and spread" and sensitivity performance tests,which are more important for performance requirements,have achieved ideal results.The system has also achieved good results in other series of tests.
Keywords/Search Tags:information security, chaos degradation, pseudo-random number, true random number, Hash function
PDF Full Text Request
Related items