Advertisement

Multimedia Tools and Applications

, Volume 78, Issue 12, pp 15929–15949 | Cite as

A parallelizable chaos-based true random number generator based on mobile device cameras for the Android platform

  • Wei-Zhu Yeoh
  • Je Sen TehEmail author
  • Huey Rong Chern
Article

Abstract

True random number generators are used in high security applications such as cryptography where non-determinism is required. However, they are slower than their pseudorandom counterparts because they need to extract entropy from physical phenomenon. To overcome this drawback, generators have been designed to extract unpredictability from devices such as computer processing units or microphones. This paper introduces a new generator for the Android mobile platform based on images captured by a built-in camera. Although similar generators exist, they suffer from poor performance and a lack of proper security evaluation. The proposed generator implements a chaos-based postprocessing algorithm that eliminates statistical defects and increases its throughput. These goals are achieved by using the inherent properties of a chaotic system to amplify entropy extracted from the captured images. The proposed generator is evaluated in two phases: first, statistical test suites are executed to identify statistical defects. Next, the generator’s forward and backward security is analysed. Results indicate that the proposed true random number generator is able to generate statistically secure true random number sequences faster than existing mobile-based generators. In addition, the generator is designed to support parallel processing, thus allowing its performance to scale according to the mobile device’s multicore architecture.

Keywords

True random number generator Chaos theory Android Mobile device Digital camera 

Notes

Acknowledgments

This work has been partially supported by Universiti Sains Malaysia under Grant No. 304/PKOMP/6315190 and the National Natural Science Foundation of China under Grant No. 61702212.

References

  1. 1.
    Addabbo T, Fort A, Rocchi S, Vignoli V (2009) Chaos based generation of true random bits. Springer, Berlin, pp 355–377zbMATHGoogle Scholar
  2. 2.
  3. 3.
    Android distribution dashboard (2018), https://developer.android.com/about/dashboards/
  4. 4.
    Aksoy S, Haralick RM (2001) Feature normalization and likelihood-based similarity measures for image retrieval. Pattern Recogn Lett 22(5):563–582.  https://doi.org/10.1016/S0167-8655(00)00112-4. http://www.sciencedirect.com/science/article/pii/S0167865500001124. Image/Video Indexing and RetrievalCrossRefzbMATHGoogle Scholar
  5. 5.
    Altaf M, Ahmad A, Khan FA, Uddin Z, Yang X (2018) Computationally efficient selective video encryption with chaos based block cipher. Multimedia Tools and Applications.  https://doi.org/10.1007/s11042-018-6022-5
  6. 6.
    Bassham LE, Rukhin AL, Soto J, Nechvatal JR, Smid ME, Leigh SD, Levenson M, Vangel M, Heckert NA, Banks DL (2010) A statistical test suite for random and pseudorandom number generators for cryptographic applications. Tech. rep., National Institute of Standards and Technology. https://www.nist.gov/publications/statistical-test-suite-random-and-pseudorandom-number-generators-cryptographic
  7. 7.
    Bouda J, Krhovjak J, Matyas V, Svenda P (2009) Towards true random number generation in mobile environments. In: Jøsang A, Maseng T, Knapskog SJ (eds) Identity and privacy in the internet age. Springer, Berlin, pp 179–189Google Scholar
  8. 8.
  9. 9.
    Carter J, Wegman MN (1979) Universal classes of hash functions. J Comput Syst Sci 18(2):143–154.  https://doi.org/10.1016/0022-0000(79)90044-8. http://www.sciencedirect.com/science/article/pii/0022000079900448 MathSciNetCrossRefzbMATHGoogle Scholar
  10. 10.
    Cicek I, Pusane AE, Dundar G (2014) A novel design method for discrete time chaos based true random number generators. Integr VLSI J 47(1):38–47.  https://doi.org/10.1016/j.vlsi.2013.06.003. http://www.sciencedirect.com/science/article/pii/S0167926013000308 CrossRefGoogle Scholar
  11. 11.
    Coron JS (1999) On the security of random sources. In: Public key cryptography. Springer, Berlin, pp 29–42Google Scholar
  12. 12.
    Davis D, Ihaka R, Fenstermacher P (1994) Cryptographic randomness from air turbulence in disk drives. In: Desmedt YG (ed) Advances in cryptology — CRYPTO ’94. Springer, Berlin, pp 114–120Google Scholar
  13. 13.
    Dodis Y, Pointcheval D, Ruhault S, Vergniaud D, Wichs D (2013) Security analysis of pseudo-random number generators with input: /dev/random is not robust. In: Proceedings of the 2013 ACM SIGSAC conference on computer & communications security, CCS ’13. ACM, New York, pp 647–658, DOI  https://doi.org/10.1145/2508859.2516653
  14. 14.
    Gan Z, Chai X, Yuan K, Lu Y (2018) A novel image encryption algorithm based on lft based s-boxes and chaos. Multimed Tools Appl 77(7):8759–8783.  https://doi.org/10.1007/s11042-017-4772-0 CrossRefGoogle Scholar
  15. 15.
    Kanak A, Ergun S (2017) A practical biometric random number generator for mobile security applications. IEICE Trans Fund Electron Commun Comput Sci E100.A (1):158–166.  https://doi.org/10.1587/transfun.E100.A.158 CrossRefGoogle Scholar
  16. 16.
    Keuninckx L, Soriano MC, Fischer I, Mirasso CR, Nguimdo RM, der Sande GV (2017) Encryption key distribution via chaos synchronization. Sci Rep, 7(43428).  https://doi.org/10.1038/srep43428
  17. 17.
    Marsaglia G (1995) The marsaglia random number cdrom including the diehard battery of tests of randomness. http://stat.fsu.edu/pub/diehard/
  18. 18.
    Oteo JA, Ros J (2007) Double precision errors in the logistic map: statistical study and dynamical interpretation. Phys Rev E 76:036214.  https://doi.org/10.1103/PhysRevE.76.036214 CrossRefGoogle Scholar
  19. 19.
    Sanguinetti B, Martin A, Zbinden H, Gisin N (2014) Quantum random number generation on a mobile phone. Phys Rev X 4:031056.  https://doi.org/10.1103/PhysRevX.4.031056 Google Scholar
  20. 20.
    Schindler W, Killmann W (2003) Evaluation criteria for true (physical) random number generators used in cryptographic applications. In: Cryptographic hardware and embedded systems - CHES 2002, lecture notes in computer science, vol 2523. Springer, Berlin, pp 431–449.  https://doi.org/10.1007/3-540-36400-5_31
  21. 21.
    Suciu A, Lebu D, Marton K (2011) Unpredictable random number generator based on mobile sensors. In: 2011 IEEE 7th international conference on intelligent computer communication and processing, pp 445–448.  https://doi.org/10.1109/ICCP.2011.6047913
  22. 22.
    Teh JS, Samsudin A, Akhavan A (2015) Parallel chaotic hash function based on the shuffle-exchange network. Nonlin Dyn 81(3):1067–1079.  https://doi.org/10.1007/s11071-015-2049-6 CrossRefGoogle Scholar
  23. 23.
    Teh JS, Samsudin A, Al-Mazrooie M, Akhavan A (2015) Gpus and chaos: a new true random number generator. Nonlin Dyn 82(4):1913–1922.  https://doi.org/10.1007/s11071-015-2287-7 MathSciNetCrossRefGoogle Scholar
  24. 24.
    Walker J (2008) Pseudorandom number sequence test program. http://www.fourmilab.ch/random/
  25. 25.
    Wallace K, Moran K, Novak E, Zhou G, Sun K (2016) Toward sensor-based random number generation for mobile and iot devices. IEEE Internet Things J 3(6):1189–1201.  https://doi.org/10.1109/JIOT.2016.2572638 CrossRefGoogle Scholar
  26. 26.
    Wei W, Guo H (2009) Bias-free true random-number generator. Opt Lett 34 (12):1876–1878.  https://doi.org/10.1364/OL.34.001876. http://ol.osa.org/abstract.cfm?URI=ol-34-12-1876 MathSciNetCrossRefGoogle Scholar
  27. 27.
    Xingyuan W, Xue Q, Lin T (2012) A novel true random number generator based on mouse movement and a one-dimensional chaotic map. Mathematical Problems in EngineeringGoogle Scholar
  28. 28.
    Yoshizawa Y, Kimura H, Inoue H, Fujita K, Toyama M, Miyatake O (1999) Physical random numbers generated by radioactivity. J Japanese Soc Comput Statist, 2012.  https://doi.org/10.5183/jjscs1988.12.67
  29. 29.
    Zhang X, Qi L, Tang Z, Zhang Y (2014) Portable true random number generator for personal encryption application based on smartphone camera. Electron Lett 50(24):1841–1843.  https://doi.org/10.1049/el.2014.2870 CrossRefGoogle Scholar
  30. 30.
    Zhao L, Liao X, Xiao D, Xiang T, Zhou Q, Duan S (2009) True random number generation from mobile telephone photo based on chaotic cryptography. Chaos, Solitons & Fractals 42(3):1692–1699.  https://doi.org/10.1016/j.chaos.2009.03.068. http://www.sciencedirect.com/science/article/pii/S0960077909001866 CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.Inti International College PenangBayan LepasMalaysia
  2. 2.Universiti Sains MalaysiaGelugorMalaysia

Personalised recommendations