Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography & Pseudo-Random Coding Li ShujunLi Shujun 1, Li Qi 2, Li.

Slides:



Advertisements
Similar presentations
Rules of Matrix Arithmetic
Advertisements

Introduction The concept of transform appears often in the literature of image processing and data compression. Indeed a suitable discrete representation.
Boyce/DiPrima 9th ed, Ch 2.8: The Existence and Uniqueness Theorem Elementary Differential Equations and Boundary Value Problems, 9th edition, by William.
Welcome to PHYS 225a Lab Introduction, class rules, error analysis Julia Velkovska.
Generating Random Numbers
Copyright © Cengage Learning. All rights reserved.
Random number generation Algorithms and Transforms to Univariate Distributions.
Markov processes in a problem of the Caspian sea level forecasting Mikhail V. Bolgov Water Problem Institute of Russian Academy of Sciences.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Session 4 Asymmetric ciphers.
ECIV 201 Computational Methods for Civil Engineers Richard P. Ray, Ph.D., P.E. Error Analysis.
CPSC 411, Fall 2008: Set 12 1 CPSC 411 Design and Analysis of Algorithms Set 12: Undecidability Prof. Jennifer Welch Fall 2008.
1 Undecidability Andreas Klappenecker [based on slides by Prof. Welch]
Maximum likelihood Conditional distribution and likelihood Maximum likelihood estimations Information in the data and likelihood Observed and Fisher’s.
An Efficient Construction of Secret Sharing for Generalized Adversary Structure and Its Reduction Communications, Circuits and Systems, ICCCAS 2004.
Chapter 7 Sampling and Sampling Distributions
Evaluating Hypotheses
CHAPTER 4 Decidability Contents Decidable Languages
1 Validation and Verification of Simulation Models.
1 Simple Linear Regression Chapter Introduction In this chapter we examine the relationship among interval variables via a mathematical equation.
Maximizing the Lifetime of Wireless Sensor Networks through Optimal Single-Session Flow Routing Y.Thomas Hou, Yi Shi, Jianping Pan, Scott F.Midkiff Mobile.
Session 6: Introduction to cryptanalysis part 1. Contents Problem definition Symmetric systems cryptanalysis Particularities of block ciphers cryptanalysis.
Orthogonality and Least Squares
1 Joint work with Shmuel Safra. 2 Motivation 3 Motivation.
THE EXTENSION OF COLLISION AND AVALANCHE EFFECT TO k-ARY SEQUENCES Viktória Tóth Eötvös Loránd University, Budapest Department of Algebra and Number Theory,
Maximum likelihood (ML)
Computer Security CS 426 Lecture 3
1 10. Joint Moments and Joint Characteristic Functions Following section 6, in this section we shall introduce various parameters to compactly represent.
Introduction to AEP In information theory, the asymptotic equipartition property (AEP) is the analog of the law of large numbers. This law states that.
©2003/04 Alessandro Bogliolo Background Information theory Probability theory Algorithms.
Copyright © Cengage Learning. All rights reserved. CHAPTER 11 ANALYSIS OF ALGORITHM EFFICIENCY ANALYSIS OF ALGORITHM EFFICIENCY.
Ch 8.1 Numerical Methods: The Euler or Tangent Line Method
 Let A and B be any sets A binary relation R from A to B is a subset of AxB Given an ordered pair (x, y), x is related to y by R iff (x, y) is in R. This.
1 CSI5388: Functional Elements of Statistics for Machine Learning Part I.
Copyright © 2009 Cengage Learning Chapter 10 Introduction to Estimation ( 추 정 )
Chap. 4 Continuous Distributions
Prelude to Public-Key Cryptography Rocky K. C. Chang, February
Section 8.1 Estimating  When  is Known In this section, we develop techniques for estimating the population mean μ using sample data. We assume that.
CS555Spring 2012/Topic 51 Cryptography CS 555 Topic 5: Pseudorandomness and Stream Ciphers.
Physics 270 – Experimental Physics. Standard Deviation of the Mean (Standard Error) When we report the average value of n measurements, the uncertainty.
111 Lecture 2 Signals and Systems (II) Principles of Communications Fall 2008 NCTU EE Tzu-Hsien Sang.
Universit at Dortmund, LS VIII
Introduction to Algorithms By Mr. Venkatadri. M. Two Phases of Programming A typical programming task can be divided into two phases: Problem solving.
PRBG Based on Couple Chaotic Systems & its Applications in Stream- Cipher Cryptography Li Shujun, Mou Xuanqin, Cai Yuanlong School of Electronics & Information.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Similarity Searching in High Dimensions via Hashing Paper by: Aristides Gionis, Poitr Indyk, Rajeev Motwani.
1 Quantization Error Analysis Author: Anil Pothireddy 12/10/ /10/2002.
ECE 8443 – Pattern Recognition ECE 8527 – Introduction to Machine Learning and Pattern Recognition LECTURE 07: BAYESIAN ESTIMATION (Cont.) Objectives:
revision Transfer function. Frequency Response
Computer simulation Sep. 9, QUIZ 2 Determine whether the following experiments have discrete or continuous out comes A fair die is tossed and the.
1 1 Slide Simulation Professor Ahmadi. 2 2 Slide Simulation Chapter Outline n Computer Simulation n Simulation Modeling n Random Variables and Pseudo-Random.
Discrete Random Variables. Introduction In previous lectures we established a foundation of the probability theory; we applied the probability theory.
Discrete-time Random Signals
Joint Moments and Joint Characteristic Functions.
By: Jesse Ehlert Dustin Wells Li Zhang Iterative Aggregation/Disaggregation(IAD)
STA347 - week 91 Random Vectors and Matrices A random vector is a vector whose elements are random variables. The collective behavior of a p x 1 random.
Rate Distortion Theory. Introduction The description of an arbitrary real number requires an infinite number of bits, so a finite representation of a.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
INFINITE SEQUENCES AND SERIES The convergence tests that we have looked at so far apply only to series with positive terms.
Basic Business Statistics, 11e © 2009 Prentice-Hall, Inc. Chap 8-1 Chapter 8 Confidence Interval Estimation Business Statistics: A First Course 5 th Edition.
Basic Probability. Introduction Our formal study of probability will base on Set theory Axiomatic approach (base for all our further studies of probability)
CompSci Today’s Topics Computer Science Noncomputability Upcoming Special Topic: Enabled by Computer -- Decoding the Human Genome Reading Great.
بسم الله الرحمن الرحيم Digital Signal Processing Lecture 2 Analog to Digital Conversion University of Khartoum Department of Electrical and Electronic.
Introduction Applications: Pay-TV, Confidential video conferencing,
The Johns Hopkins University
represents the Empty set, or the set that contains nothing
Differential Privacy in Practice
§1-3 Solution of a Dynamical Equation
CONTINUOUS RANDOM VARIABLES AND THE NORMAL DISTRIBUTION
Stability Analysis of Linear Systems
Presentation transcript:

Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography & Pseudo-Random Coding Li ShujunLi Shujun 1, Li Qi 2, Li Wenmin 3,Li QiLi Wenmin Mou XuanqinMou Xuanqin 1, Cai Yuanlong 1Cai Yuanlong Cryptography & Coding 2001

Outlines  A Long Introduction  Preliminary Knowledge  Statistical Properties of digital PLCM-s  The Roles of digital PLCM-s in Chaotic Cryptography & Pseudo- Random Coding  Conclusion

Introduction Discrete-time chaotic cryptography has attracted much attention since As a general method to design chaotic stream ciphers, chaotic pseudo- random coding technique has been commonly used. In fact, chaotic pseudo-random coding also has been developed separately in other areas: electronics, communications and physics. As the simplest and most perfect chaotic maps, piecewise linear chaotic maps (PLCM) play important roles in chaotic cryptography and pseudo-random coding.

Introduction – Digital Problems Although discrete-time chaos seems to be a promising new source to cryptography and pseudo- random coding, some serious problems still will arise when the chaotic systems are realized in computer with finite precision L: Only 2 L digital decimals cannot represent the real interval on which the chaotic system is defined. The cycle-length of each chaotic orbit will be smaller than 2 L, and most ones << 2 L. The quantization errors distort the dynamics.

Introduction – Solutions Actually, many researchers have found that the dynamical properties of digital chaotic systems are badly degraded compared with real-valued chaotic systems. The related defects include: too short cycle-length, decayed distribution and correlation functions, etc. Thus, the applications of chaos in digital computers may be limited. To solve such a serious problem, several remedies have been presented: using higher precision, cascading multiple chaotic systems, realizing chaotic system via pseudo-random perturbation.

Introduction – Solutions? Although experiments have shown that the above remedies can improve the dynamical degradation of digital chaotic systems to some extent, there is not yet an established theory to exactly measure the degradation and the performance of the remedies. So nobody knows whether or not they are really good solutions. Our paper tries to reveal some facts hiding behind the above question. For above-mentioned chaotic maps – PLCM-s, we have found some useful results to approach the right answer.

Introduction – Our Works The obtained results in our paper is about the statistical properties of digital PLCM-s. It is found that digital PLCM-s have some measurable degradation features. To escape from the features, we should take special considerations when we use digital PLCM-s under finite precision, even with some remedies. Conceptually, our results about digital PLCM-s may be extended to some other chaotic maps. To apply chaotic systems in digital applications, more further works are needed.

Preliminaries – PLCM (1) Given a real interval, one one-dimensional Piecewise Linear Chaotic Map (PLCM) can be described as follows: where is a partition of. The above PLCM has the following properties: 1) It is chaotic, the Lyapunov exponent satisfies 2) It is ergodic, mixing and exact, and has uniform invariant density function ; 3) The correlation as especially, if some conditions are satisfied,

Preliminaries – PLCM (2) The property 2), uniform invariant density, means that uniform input will generate uniform output, and that almost every chaotic orbit will lead to the same distribution. However, when PLCM-s are realized with finite precision, the above statement is not true for any control parameters. We prove some useful results for a specific PLCM, which can be extended to all PLCM-s. The results reflect the essential dynamical degradation of the digital PLCM-s.

Preliminaries – Definitions To facilitate the proved results, we give some preliminary definitions and notations firstly. Definition 1 – is called a digital set with resolution n. Specially, define. for any i<j, S i is called the digital subset of S j. Definition 2 – is called the digital layer with resolution i. For any, i is called its resolution. The partition of S n,, is called the complete multi-resolution decomposition of S n.

Preliminaries – Definitions Definition 3 – For any n>m, is called the digital difference set with parameters n and m. Definition 5 – A function is called a digital approximate transformation function (DATF) with resolution n, if,. The following three DATF-s are focused in our paper: 1)2) 3) Note: Definition 4 (ATF) is neglected here since the description of the results don’t need it.

Preliminaries – PLCM (3) Any PLCM define on can be re-scaled to one normalized PLCM defined on, so we will only focus our attention on the normalized PLCM. A digital normalized PLCM with finite precision n can be denoted as, where G n is a DATF function and F is the chaotic map. According to the definition of PLCM, we know F(1) must be 0 or 1. Consider 1=1.00…0, we can redefine the digital PLCM:. Such a redefinition will not essentially influence the statistical properties proved in our paper.

Preliminaries – PLCM (4) To facilitate the descriptions and proofs of the results obtained in our paper, one typical normalized PLCM is chiefly focused: Such a map has been used by some researchers to design chaotic ciphers and chaotic PRNG-s, we call it PLCM (1). Another concerned map is PLCM (2):

Digital PLCM – Statistical Properties (1) We prove some important theorems about the statistical properties of digital PLCM (1). The theorems are about the probability of the lowest j bits of F n (x,p) are all zeros, i.e., the probability of F n (x,p) belongs to S n-j. Assume. Consider P j should be 2 -j if the digital PLCM obey the ergodic property (the chaotic output distributes uniformly in S n ). But we find that such a fact is not true for digital PLCM-s, which reflects the dynamical degradation of digital PLCM-s.

Digital PLCM – Statistical Properties (2) Here we only give two comprehensive theorems. Theorem 5: Assume random variant x distributes uniformly in S n,, the following results are true for the digital PLCM (1): 1. If G n =round n, ; 2. If G n =floor n or ceil n, ; 3..

Digital PLCM – Statistical Properties (3) Theorem 6: Assume random variant x distributes uniformly in S n, the following results are true for the digital PLCM (1): 1. ; 2. ; 3.. In fact, Theorem 5 and 6 reflect different aspects of a same fact: the probabilities P 1 ~P n are uniquely determined by the resolution of p, vice versa.

Digital PLCM – Statistical Properties (4) In order to more clearly describe what the Theorem 5 and 6 mean, some experiments results are given. Theorem 5 Theorem 6 Please see our paper for more details.

Digital PLCM – Statistical Properties (5) The above theorems can be extended to other normalized PLCM-s, we give the extended results of digital PLCM (2) in our paper (Please see Sect. 4.5 and Theorem 5’ for detailed description). We will try to give a universal proofs for all digital PLCM-s in the future.

Digital PLCM-s in Chaotic Cryptography & Pseudo-Random Coding (1) From Theorem 5 and 6, we can see the uniform input will not generate uniform output after one chaotic iteration of digital PLCM. When the iterations goes, the degradation will be more and more serious. After 32 digital chaotic iterations

Digital PLCM-s in Chaotic Cryptography & Pseudo-Random Coding (2) Now let us see whether or not the above-mentioned three remedies can improve the degradation of digital PLCM-s. Cascading Multiple Chaotic Systems – Multiple cascaded PLCM-s are equivalent to a PLCM with more segments. So it cannot …. Using Higher Precision – A digital set with higher precision contains digital sets with smaller precision. So it cannot essentially … either. Pseudo-Random Perturbation – The chaotic orbits obey approximate uniform distribution, but the last iteration still obey Theorem 5 and 6. So it cannot …

Digital PLCM-s in Chaotic Cryptography & Pseudo-Random Coding (3) There are some special considerations in chaotic cryptography and pseudo-random coding. Chaotic Cryptography – When pseudo-random perturbation is employed to realize digital chaotic systems, the perturbation should be secretly exerted on point B, not A.

Digital PLCM-s in Chaotic Cryptography & Pseudo-Random Coding (4) Chaotic Pseudo-Random Coding – The pseudo- random sequence generated by digital PLCM-s will be unbalanced since the chaotic orbits are not uniform. If pseudo-random perturbation is used to improve its performance, we suggest exerting the perturbation at point B and using the highest n-i bits instead of all n bits to generate chaotic pseudo- random number (see the third fact of Theorem 5).

Conclusions We have proved some useful and interesting results about the statistical properties of digital PLCM-s, and discuss their roles in chaotic cryptography and pseudo-random coding. In fact, to clearly describe everything about digital chaos, more further studies are needed in the future. One open topic is: whether or not our proofs made on digital PLCM-s can be extended to some other chaotic systems. It is very important to tell us how to correctly apply digital chaos in cryptography, pseudo-random coding and other digital applications.