Abstract

In this paper, we analyzed the periodicity of discrete Logistic and Tent sequences with different computational precision in detail. Further, we found that the process of iterations of the Logistic and Tent mapping is composed of transient and periodic stages. Surprisingly, for the different initial iterative values, we first discovered that all periodic stages have the same periodic limit cycles. This phenomenon has seriously affected the security of chaotic cipher. To solve this problem, we designed a novel discrete chaotic sequence generator based on m-sequence and discrete chaotic mapping. The experimental results indicated that the chaotic sequence generator can generate pseudorandom chaotic sequences with large periodicity and good performance under the condition of limited computational precision.

1. Introduction

Chaos is a new interdisciplinary theory of physics, mathematics, nonlinear dynamics, and so on. The ergodic character of chaotic system satisfies the diffusion principle of cryptosystem. The initial value sensitivity of chaos can generate a large key space. Compared with traditional cipher, chaotic cipher has the advantages of simple structure, easy implementation, and high security. Therefore, in recent years, chaos theory has been widely applied in the field of cryptography and secret communication [14]. For instance, Yadav et al. [5] proposed a chaotic system-based data hiding scheme that provides high payload and imperceptibility. Murillo-Escobar et al. [6] put forward a novel pseudorandom number generator based on pseudorandomly enhanced Logistic map. Li et al. [7] came up with an image encryption scheme based on chaotic Tent map. Hasimoto-Beltran [8] designed a high-performance multimedia encryption system based on chaos to ensure multimedia information security. Chaotic mapping theoretically generates discrete sequences that are not periodic for any given initial iterative value. However, for the digital chaotic sequence generator, performance of the discrete chaotic sequence is seriously affected by the limited computational precision of processor, which will cause the quantized the chaotic binary sequences to have short periodicity and cannot meet the requirements of cryptography [9, 10].

Aiming at this problem, Du et al. [11] proposed a novel chaotic key sequence generator based on double K-L (Karhunen-Loeve) transform. It can effectively improve the complexity and period length of Logistic chaotic sequence. Nagaraj et al. [12] proposed a pseudorandom number generator based on chaotic switching between robust chaos maps in order to increase average period lengths. Cernak [13] proposed to increase the period of discrete chaotic sequences by using programmable combinational circuits and perturbing chaotic parameters. Chen et al. [14] designed a new chaotic sequence generator based on the novel interacting neural networks and the multiple chaotic systems with the purpose of enhancing the performance of chaotic sequences. In order to increase the period of the generated chaotic orbits, Heidari-Bateni et al. [15] proposed a new chaotic sequence generator by cascading two Logistic maps with different bifurcation parameters. Further, Hu et al. [16] proposed an error compensation method to counteract the dynamical degradation of digital chaos. Deng et al. [17] designed an analogue-digital mixed method for enhancing the performance of chaotic sequences. Cao et al. [18] came up with a new perturbation method based on Lyapunov exponent to improve random distribution of chaotic sequences.

However, these schemes do not consider the effect of chaotic initial value on chaotic sequence and key space. These literatures do not accurately analyze the short-period behavior of chaotic systems. Moreover, some of the schemes are too complex to be implemented in hardware circuits and engineering applications. In view of the above problems, we focus on the effect of limited computational precision on discrete chaotic mapping. The periodicity of discrete chaotic sequence and the scope of key space are analyzed accurately. For the discrete Logistic and Tent sequences with different initial values, we found that all periodic stages have the same periodic limit cycles. This phenomenon has seriously affected the key space of chaotic stream ciphers. Based on this situation, we present an effective approach to increase the period and key space of the chaotic sequence by using m-sequences with a simple structure. The experimental results show that the period of chaotic sequence can be determined by the order of the m-sequence. When the computational precision is limited, we can increase the order of the m-sequence to obtain a good performance discrete chaotic sequence. Compared with other proposed schemes, the key advantages of our method include the following several aspects: (i) In comparison with the general perturbation method under same calculation precision and perturbation source, the digital chaotic sequence generated by our scheme has considerable period length. (ii) The method consumes less hardware resources and is easy to implement in engineering. (iii) Compared with the analogue-digital mixed method, our scheme has better stability. Because chaos is extremely sensitive to initial values, components of the analogue circuit are susceptible to environmental temperature and humidity so that the parameters of the chaotic system are difficult to maintain a constant value.

The rest of this paper is organized as follows: Section 2 analyzes in detail the influence of limited computational precision on digital chaotic system. Section 3 describes a novel discrete chaotic sequence generator with the purpose of avoiding short periods of chaotic sequences. Section 4 gives the comparative analysis of performance of discrete chaotic sequences, including key space, autocorrelation test and PE analysis. Section 5 summarizes the discussions of this paper.

2. Influence of Computational Precision on Discrete Chaotic Sequences

2.1. Logistic Mapping

In this section, we take Logistic mapping [19] as an example to illustrate the effect of computational precision on discrete chaotic sequences. The mathematical equation of Logistic mapping can be described as follows: where is called branch parameter; when the value range of is , Logistic mapping is in a chaotic state and displays the complex dynamic characteristics. Further, let us rewrite in its binary representation:where denotes the enclosed number is in binary format. Let us assume that represents computational precision. denotes approximate value of , defined byFor computing convenience, we introduce a new variable :where is an integer and . Further, (1) can be rewritten as the follows:

According to (5), we generated a series of discrete chaotic sequences with different computational precision, including , , , and . In order to test the effect of computation precision on discrete chaotic sequences, we performed autocorrelation test, permutation entropy test, and statistical analysis of sequence periodicity for the above chaotic sequences.

2.2. Autocorrelation Test

Autocorrelation test can clearly reflect the dependence relationship of a signal between two different moments, which is a significant method with the purpose of evaluating the randomness and periodicity of discrete chaotic sequences [20]. Autocorrelation function is defined as follows:where and denote autocorrelation function and the length of discrete chaotic sequence, respectively. Based on the above theoretical basis, autocorrelation test can be performed with discrete Logistic sequences of different computational precision. MATLAB simulation results are shown in Figure 1. As can be seen from the figure, the smaller the computational precision is, the denser the peak the line of the autocorrelation function is. The distance between each two peak lines can be approximately expressed as the period length of the discrete chaotic sequences. Therefore, we can conclude that if the calculation precision is small, the discrete chaotic sequences will emerge some short periodic phenomena.

2.3. Permutation Entropy

Permutation entropy (PE) [2123] is widely applied in the measurement of discrete time sequence complexity because of its high robustness and fast algorithm characteristics, which can be described as follows.

Step 1. For a discrete time sequence , where and represent the embedding dimension and a delay factor, respectively, the sequence can be reconstructed as

Step 2. Each sequence of (7) is placed depending on an ascending order.

Step 3. Further, displays the original position index of each element, which is one of the possible order types of all permutations. Suppose is a symbol permutation and , where . Then, PE is defined asWhen , then obtains the maximum value . Further, the normalized PE is defined as .

PE test can be performed with discrete Logistic sequences of different computational precision. On the basis of a large number of experimental analysis, we set and with the purpose of obtaining more accurate PE values. The experimental results are shown in Table 1. As can be seen from the table, with the improvement of calculation precision, the PE value of the discrete chaotic sequence is larger. That is to say, the discrete chaotic sequences with high computational precision have higher complexity.

2.4. Statistical Analysis of Sequence Periodicity

In this section, we analyzed the periodicity of discrete Logistic sequences with different computational precision in detail. The experimental results are shown in Table 2, where and represent the period length of discrete Logistic sequences and the number of -period, respectively. Under the same calculation precision , we generated discrete Logistic sequences with different initial values and analyzed the periodicity of each chaotic sequence. It can be seen from the table that the limited computational precision will lead to a variety of short-period phenomena in discrete Logistic sequences. For instance, when computational precision =12, it offers periods 1, 3, 8, and 9. If such a chaotic sequence is used as a key stream for the stream cipher, it will seriously affect the security of the stream cipher privacy communication.

Moreover, we have done a more detailed analysis for the periodicity of the discrete Logistic sequences. On the basis of (5), we can generate a series of discrete Logistic sequences with different initial values. For arbitrary initial value and , when two iterative values and in the sequence are equal , it can be concluded that the period length of the sequence is () and the set of periodic elements is . Correspondingly, for another discrete Logistic sequence of -period with initial value , we assume that is an arbitrary iterative value on the periodic limit cycle of this sequence. If , then the initial value and will converge into the same periodic limit cycles. According to the above theoretical analysis, we can conduct corresponding statistical analysis experiments on all discrete Logistic sequences.

We take the calculation precision as an example to give a detailed explanation. When calculation precision , the discrete Logistic sequences were generated with initial values 1, 2 and 3. The illustrations of iterations of the Logistic mapping with different initial values are shown in Figure 2. As can be seen from the figure, the process of iterations of the Logistic mapping is composed of transient and periodic stages. However, for the discrete Logistic sequences with different initial values, all sequences of 4-period have the same periodic limit cycles (11, 42, 140, 253). We did the same test for other initial values with , and the results showed the same periodic limit cycles.

In addition, when calculation precision , all discrete Logistic sequences of 3-period will converge into the same periodic limit cycles (771, 2503, 3893). Similarly, all sequences of 8-period and 9-period will also converge separately into the corresponding cycles (217, 822, 2628, 3767, 1210, 3410, 2284, 4041) and (3786, 1146, 3301, 2562, 3837, 970, 2961, 3281, 2611). When calculation precision and 24, for every sequence of period (), all periodic stages display the same periodic limit cycles with period length . This phenomenon has seriously affected the key space of chaotic stream ciphers.

In addition, we did the same experiment for Tent mapping with the purpose of analyzing statistical analysis of Tent sequence periodicity. The mathematical equation of Tent mapping can be described as follows:when , the above Tent mapping is a standard Tent mapping. Further generalization, we can get a kind of piecewise linear Tent mapping.When , , , , and , (11) is transformed intowhere represent computational precision and denotes approximate value of . The value ranges of and are . Equation (12) can get two stable zero solutions, which are 0 and , respectively. If (12) appears or in the iteration process, all subsequent iterations will be zero value. In order to avoid this phenomenon, we improved (12) as follows:where is the set of positive integers. On the basis of (13), we did some experiments to analyze the periodicity of piecewise linear Tent sequences with different computational precision. The experimental results are shown in Table 3. It can be seen from the table that the limited computational precision can lead to a variety of short-period phenomena for discrete Tent sequences.

We still take the calculation precision as an example to analyze the periodicity of the discrete Tent sequence in detail. When calculation precision , the Tent sequences were generated with initial values 2 and 3. The illustration of iterations of the Tent mapping with different initial values is shown in Figure 3. Obviously, Tent sequences with different initial values still converge to the same periodic limit cycles. Through a large number of experimental analysis, for every sequence of period , we found that all periodic stages display the same periodic limit cycles with period length . It shows a similar regularity to the discrete Logistic sequences.

3. A Novel Discrete Chaotic Sequence Generator

Based on the above experimental results and theoretical analysis, we found that a large number of short-period phenomena occur in discrete chaotic sequences under the influence of limited computational precision. In addition, the chaotic sequences with different initial values will converge to the same periodic limit cycles. These phenomena will seriously affect the security of chaotic ciphers and key space. To avoid the above problems, we designed a novel discrete chaotic sequence generator based on Logistic and Tent mapping, which is shown in Figure 4. Where and represent the initial value of Logistic and Tent mapping. The and are the initial state and bit stream of -order m-sequence, and is the number of bits that are passed into the Logistic or Tent system every time. Moreover, the structure schematic diagram of the function is shown in Figure 5. The , , and represent the bitwise logical AND, XOR and OR operator, respectively. The is bit cycle left shift operator, and is equal to the value of the calculation precision, which represent the number of bits for input and output data.

The generation process of the novel discrete chaotic sequences is given as follows.

Step 1. The initialized m-sequence generator outputs the bits sequence stream , and then is represented as a decimal form:where the choice of parameter should correspond to the average period length of the digital chaotic system. For example, if the average period length of the digital chaotic sequence is 32 under a certain computational precision, the value of should be roughly equal to 5 (). Based on the above parameter selection, the iterative value will approximately fall into the periodic cycle after iterations. At the same time, the iterative value should jump to another digital chaotic system to prevent continuous loop in a certain periodic limit cycle.

Step 2. Logistic mapping passes the last iteration value into function after iterations. Next, the output result of the function is used as the initial iteration value of Tent mapping. Similarly, the Tent mapping also passes the last iteration value into function after the iteration. The new output result of the function serves as the initial iteration value of Logistic mapping.

Step 3. The m-sequence generator outputs the bits new sequence stream , and the binary sequence is also converted to decimal number .

Step 4. Finally, the novel discrete chaotic sequence generator circulates continuously between step 2 and 3. The iterative value of each round of Logistic and Tent mapping constitutes a new discrete chaotic sequence.
The design idea of this chaotic sequence generator is to control the number of iterations of Logistic and Tent mapping through m-sequence. When the iteration value is in periodic limit cycles, it can jump out of the periodic limit cycles in time with the purpose of avoiding the short-period phenomenon of the chaotic sequence. The purpose of function is to control the initial iteration value of each round of Logistic and Tent mapping in order to increase the complexity of the discrete chaotic sequence.

4. Comparative Analysis of Performance of Discrete Chaotic Sequences

4.1. Key Space

On the basis of these original Logistic and Tent sequence generator, for every sequence of period , all periodic stages display the same periodic limit cycles with period length . Therefore, for one-dimensional digital chaotic maps, the original key space will suffer a large degradation, because different initial values (secret key) will generate the same key stream except for a few iterative values in the transient state. Therefore, there are a large number of weak secret keys in key space . In contrast, actual key spaces of these generator are much less than . For instance, when calculation precision , key spaces of Logistic and Tent sequence generator are 2 and 6 (the number of different periodic limit cycles), respectively. However, for the novel discrete chaotic sequence generator, the key space should be , where is the order number of m-sequence. Further, when and , the key space is . Hence, the key space of the improved sequence generator has been fully expanded.

4.2. Autocorrelation Test

Autocorrelation is a significant randomness measure. We generated three different discrete chaotic sequences (Logistic, Tent, and improved method) with calculation precision . Moreover, for improved method, we set . Results of autocorrelation test are shown in Figure 6. Obviously, autocorrelation function of the improved method approximates the function and shows good randomness. However, autocorrelation functions of original Logistic and Tent generator show a serious short-period phenomenon.

4.3. PE Analysis

In this section, we calculated the PE of chaotic sequences generated by the above three different generators with the purpose of comparing their complexities. The parameters of PE are selected to be the same as that in Section 2.3, and MATLAB simulation results are shown in Figure 7. We generated 10 sets of data to compare the complexity of chaotic sequences. As can be seen from the figure, improved method can significantly increase the complexity of chaotic sequences. The PE of sequence generated by improved method is larger than original Logistic and Tent sequences. Therefore, the method can improve the dynamical degradation of a digital chaotic map obviously.

5. Conclusion

In this paper, we analyze the Logistic chaotic sequences with different computational precision in detail through autocorrelation function, permutation entropy and statistical analysis of sequence periodicity. Based on the above experimental results, we found that there are a variety of short-period phenomena in chaotic sequences under finite computational precision. Surprisingly, for every sequence of period , all periodic stages display the same periodic limit cycles with period length . This phenomenon will seriously affect the key space and security of chaotic stream ciphers. Further, we did the same experiment for Tent mapping with the purpose of analyzing the periodicity of Tent sequence. The experimental results show a similar regularity to the discrete Logistic sequences. In view of this problem, we designed a novel discrete chaotic sequence generator. The experimental results show that the chaotic sequence generator can generate good pseudorandom chaotic sequences. This method has the advantages of simple structure and easy realization in hardware. In the case of finite computational precision, it can overcome the short-period behavior of chaotic sequence and effectively increase the key space. This method provides a feasible way for the application of chaos theory in the field of secure communication.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare no conflicts of interest.

Acknowledgments

This work was supported by the Natural Science Foundation of China (no. 61471158) and the “Modern Sensing Technology” Innovation Team Project of Heilongjiang Province (no. 2012TD007).