Pengembangan True Random Number Generator berbasis Citra menggunakan Algoritme Kaotis

https://doi.org/10.22146/ijeis.36517

Dian Arief Risdianto(1*), Bambang Nurcahyo Prastowo(2)

(1) Prodi Elektronika dan Instrumentasi, DIKE, FMIPA UGM, Yogyakarta
(2) Departemen Ilmu Komputer dan Elektronika, FMIPA UGM, Yogyakarta
(*) Corresponding Author

Abstract


The security of most cryptographic systems depends on key generation using a nondeterministic RNG. PRNG generates a random numbers with repeatable patterns over a period of time and can be predicted if the initial conditions and algorithms are known. TRNG extracts entropy from physical sources to generate random numbers. However, most of these systems have relatively high cost, complexity, and difficulty levels. If the camera is directed to a random scene, the resulting random number can be assumed to be random. However, the weakness of a digital camera as a source of random numbers lies in the resulting refractive pattern. The raw data without further processing can have a fixed noise pattern. By applying digital image processing and chaotic algorithms, digital cameras can be used to generate true random numbers. In this research, for preprocessing image data used method of floyd-steinberg algorithm. To solve the problem of several consecutive black or white pixels appearing in the processed image area, the arnold-cat map algorithm is used while the XOR operation is used to combine the data and generate the true random number. NIST statistical tests, scatter and histrogram analyzes show the use of this method can produce truly random numbers

Keywords


TRNG;PRNG;Arnold’s Map;Floyd-Steinberg

Full Text:

PDF


References

[1] M. Siswanto and B. Rudiyanto, “Designing of Quantum Random Number Generator ( QRNG ) for Security Application,” in International Conference on Science in Information Technology (ICSITech), 2017, pp. 273–277 [Online]. Available: https://ieeexplore.ieee.org/document/8257124/. [Accessed: 16-June-2018]

[2] J. Morosi, M. Guasoni, A. Akrout, and J. Fatome, “Random Bit Generation through Polarization Chaos in Nonlinear Optical Fibers,” in Conference on Lasers and Electro-Optics Europe & European Quantum Electronics Conference (CLEO/Europe-EQEC), 2017. [Online]. Available: https://ieeexplore.ieee.org/document/8086464/. [Accessed: 18-June-2018]

[3] L. Gnoli, M. Bollo, M. Vacca, M. Graziano, and G. Di Natale, “True random number generator based on nanomagnets,” in IEEE Nanotechnology Materials and Devices Conference (NMDC), 2016. [Online]. Available: https://ieeexplore.ieee.org/document/7777089/. [Accessed: 18-June-2018]

[4] R. Li, “A True Random Number Generator algorithm from digital camera image noise for varying lighting conditions,” in Proceedings of the IEEE SoutheastCon, 2015 [Online]. Available: https://ieeexplore.ieee.org/document/7132901/. [Accessed: 23-Dec-2017]

[5] I. Cicek and G. Dundar, “A chaos based integrated jitter booster circuit for true random number generators,” in European Conference on Circuit Theory and Design (ECCTD), 2013 [Online]. Available: https://ieeexplore.ieee.org/document/6662257/. [Accessed: 23-June-2017]

[6] I. Cicek, A. Pusane, and G. Dundar, “A novel dual entropy core true random number generator,” in International Conference on Electrical and Electronics Engineering (ELECO), 2013, pp. 332–335. [Online]. Available: https://ieeexplore.ieee.org/document/6713856/. [Accessed: 23-June-2018]

[7] I. Cicek, A. E. Pusane, and G. Dundar, “An Integrated Dual Entropy Core True Random Number Generator,” IEEE Trans. Circuits Syst. II Express Briefs, vol. 64, no. 3, pp. 329–333, 2017. [Online]. Available: https://ieeexplore.ieee.org/document/7469345/. [Accessed: 23-June-2017]

[8] İ. Koyuncu, A. T. Özcerit, İ. Pehlivan, and E. Avaroğlu, “Design and implementation of chaos based true random number generator on FPGA,” in 22nd Signal Processing and Communications Applications Conference (SIU), 2014, pp. 236–239. [Online]. Available: https://ieeexplore.ieee.org/document/6830209/. [Accessed: 23-May-2018]

[9] P. Kumar, S. Agarwal, and S. Shivani, “Halftone Visual Cryptography with Pixel Expansion,” Int. J. Inf. Comput. Technol., vol. 4, no. 14, pp. 1419–1427, 2014. [Online]. Available: https://www.ripublication.com/irph/ijict_spl/ijictv4n14spl_10.pdf. [Accessed: 25-May-2018]

[10] P. M. Nikate and I. I. Mujavar, “Performance Evaluation of Floyd Steinberg Halftoning and Jarvis Haltoning Algorithms in Visual Cryptography,” Int. J. Innov. Eng. Technol., vol. 5, no. 1, pp. 336–342, 2015 [Online]. Available: ijiet.com/wp-content/uploads/2015/03/46.pdf. [Accessed: 26-May-2018]

[11] L. Skanderova and A. Řehoř, “Comparison of Pseudorandom Numbers Generators and Chaotic Numbers Generators used in Differential Evolution,” in Nostradamus 2014: Prediction, Modeling and Analysis of Complex Systems, 2014, pp. 111–121. [Online]. Available: https://link.springer.com/chapter/10.1007/978-3-319-07401-6_11. [Accessed: 30-May-2018]

[12] Y. Wu, Z. Hua, and Y. Zhou, “n-Dimensional Discrete Cat Map Generation Using Laplace Expansions,” IEEE Trans. Cybern., vol. 46, no. 11, pp. 2622–2633, 2016 [Online]. Available: https://ieeexplore.ieee.org/document/7302020/. [Accessed: 28-May-2018]

[13] E. Avaroglu, “Pseudorandom number generator based on Arnold cat map and statistical analysis,” Turkish J. Electr. Eng. Comput. Sci., vol. 25, no. 1, pp. 633–643, 2017 [Online]. Available: http://journals.tubitak.gov.tr/elektrik/issues/elk-17-25-1/elk-25-1-48-1507-253.pdf. [Accessed: 1-June-2018]

[14] P. Singh, B. Raman, and M. Misra, “A (n, n) threshold non-expansible XOR based visual cryptography with unique meaningful shares,” Signal Processing, vol. 142, pp. 301–319, 2018 [Online]. Available: https://annals-csis.org/Volume_10/drp/47.html. [Accessed: 2-June-2018]

[15] L. Zhao, X. Liao, D. Xiao, T. Xiang, Q. Zhou, and S. Duan, “True random number generation from mobile telephone photo based on chaotic cryptography,” Chaos, Solitons & Fractals, vol. 42, no. 3, pp. 1692–1699, 2009 [Online]. Available: https://www.sciencedirect.com/science/article/pii/S0960077909001866. [Accessed: 3-Desember-2017]

[16] B. Mondal, N. Biswas, and T. Mandal, “A Comparative study on Cryptographic Image Scrambling,” in Proceedings of the Second International Conference on Research in Intelligent and Computing in Engineering, 2017, vol. 10, pp. 261–268 [Online]. Available: https://annals-csis.org/Volume_10/drp/47.html. [Accessed: 20-June-2018]



DOI: https://doi.org/10.22146/ijeis.36517

Article Metrics

Abstract views : 6169 | views : 1766

Refbacks

  • There are currently no refbacks.




Copyright (c) 2020 IJEIS (Indonesian Journal of Electronics and Instrumentation Systems)

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.



Copyright of :
IJEIS (Indonesian Journal of Electronics and Instrumentations Systems)
ISSN 2088-3714 (print); ISSN 2460-7681 (online)
is a scientific journal the results of Electronics
and Instrumentations Systems
A publication of IndoCEISS.
Gedung S1 Ruang 416 FMIPA UGM, Sekip Utara, Yogyakarta 55281
Fax: +62274 555133
email:ijeis.mipa@ugm.ac.id | http://jurnal.ugm.ac.id/ijeis



View My Stats1
View My Stats2