FPGA based implementation of a perturbed Chen oscillator for secure embedded cryptosystems

This paper introduces an enhancement to the Chen chaotic system by incorporating a constant perturbation term d to one of the state variables, aiming to improve the performance of pseudo-random number generators (PRNGs). The perturbation significantly enhances the system's chaotic properties, r...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Scientific reports Jg. 14; H. 1; S. 21262 - 20
Hauptverfasser: Nguemo Kemdoum, Fritz, Mboupda Pone, Justin Roger, Bajaj, Mohit, Dzonde Naoussi, Serge Raoul, Ayemtsa Kuete, Gideon Pagnol, Louzazni, Mohamed, Berhanu Tuka, Milkias, Kamel, Salah
Format: Journal Article
Sprache:Englisch
Veröffentlicht: London Nature Publishing Group UK 11.09.2024
Nature Publishing Group
Nature Portfolio
Schlagworte:
ISSN:2045-2322, 2045-2322
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper introduces an enhancement to the Chen chaotic system by incorporating a constant perturbation term d to one of the state variables, aiming to improve the performance of pseudo-random number generators (PRNGs). The perturbation significantly enhances the system's chaotic properties, resulting in superior randomness and increased security. An FPGA-based realization of a perturbed Chen oscillator (PCO)-derived PRNG is presented, tailored for embedded cryptosystems and implemented on a Nexys 4 FPGA card featuring the XILINX Artix-7 XC7A100T-1CSG324C integrated chip. The Xilinx-based system generator (XSG) tool is utilized to generate a digital version of the new oscillator, minimizing resource utilization. Experimental results demonstrate that the PCO-generated data successfully passes the NIST and TestU01 test suites. Additionally, statistical tests with key sensitivity are performed, validating the suitability of the designed PRNG for cryptographic applications. This establishes the PCO as a straightforward and efficient tool for multimedia security.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
content type line 23
ISSN:2045-2322
2045-2322
DOI:10.1038/s41598-024-71531-y