Table of Contents Author Guidelines Submit a Manuscript
Mathematical Problems in Engineering
Volume 2012, Article ID 931802, 9 pages
http://dx.doi.org/10.1155/2012/931802
Research Article

A Novel True Random Number Generator Based on Mouse Movement and a One-Dimensional Chaotic Map

Faculty of Electronic Information and Electrical Engineering, Dalian University of Technology, Dalian 116024, China

Received 14 July 2011; Revised 19 October 2011; Accepted 26 October 2011

Academic Editor: Stefano Lenci

Copyright © 2012 Wang Xingyuan et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Linked References

  1. D. E. Knuth, The Art of Computer Programming. Vol. 2: Seminumerical Algorithms, Addison-Wesley, Reading, Mass, USA, 2nd edition, 1981.
  2. G. Jakimoski and L. Kocarev, “Chaos and cryptography: block encryption ciphers based on chaotic maps,” IEEE Transactions on Circuits and Systems. I, vol. 48, no. 2, pp. 163–169, 2001. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  3. R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the Association for Computing Machinery, vol. 21, no. 2, pp. 120–126, 1978. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  4. B. Wang, Q. Wu, and Y. Hu, “A knapsack-based probabilistic encryption scheme,” Information Sciences, vol. 177, no. 19, pp. 3981–3994, 2007. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  5. F. Cao and Z. Cao, “A secure identity-based proxy multi-signature scheme,” Information Sciences, vol. 179, no. 3, pp. 292–302, 2009. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  6. D. Xiao, X. Liao, and S. Deng, “A novel key agreement protocol based on chaotic maps,” Information Sciences, vol. 177, no. 4, pp. 1136–1142, 2007. View at Publisher · View at Google Scholar
  7. D. Xiao, X. Liao, and S. Deng, “Using time-stamp to improve the security of a chaotic maps-based key agreement protocol,” Information Sciences, vol. 178, no. 6, pp. 1598–1602, 2008. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  8. C. Tokunaga, D. Blaauw, and T. Mudge, “True random number generator with a metastability-based quality control,” IEEE Journal of Solid-State Circuits, vol. 43, no. 1, pp. 78–85, 2008. View at Google Scholar
  9. M. Bucci, L. Germani, R. Luzzi, A. Trifiletti, and M. Varanonuovo, “A high-speed oscillator-based truly random number source for cryptographic applications on a smart card IC,” IEEE Transactions on Computers, vol. 52, no. 4, pp. 403–409, 2003. View at Publisher · View at Google Scholar · View at Scopus
  10. D. Davis, R. Ihaka, and P. Fenstermacher, “Cryptographic randomness from air turbulence in disk drives,” Advances in Cryptology, vol. 839, pp. 114–120, 1994. View at Google Scholar
  11. W. T. Holman, J. Alvin Connelly, and A. B. Dowlatabadi, “An integrated analog/digital random noise source,” IEEE Transactions on Circuits and Systems I, vol. 44, no. 6, pp. 521–528, 1997. View at Google Scholar · View at Scopus
  12. Y. Hu, X. Liao, K. W. Wong, and Q. Zhou, “A true random number generator based on mouse movement and chaotic cryptography,” Chaos, Solitons and Fractals, vol. 40, no. 5, pp. 2286–2293, 2009. View at Publisher · View at Google Scholar · View at Scopus
  13. Q. Zhou, X. Liao, K.-W. Wong, Y. Hu, and D. Xiao, “True random number generator based on mouse movement and chaotic hash function,” Information Sciences, vol. 179, no. 19, pp. 3442–3450, 2009. View at Publisher · View at Google Scholar
  14. J. M. Aguirregabiria, “Robust chaos with variable Lyapunov exponent in smooth one-dimensional maps,” Chaos, Solitons and Fractals, vol. 42, no. 4, pp. 2531–2539, 2009. View at Publisher · View at Google Scholar · View at Scopus
  15. Z. Hong and L. Xieting, “Generating chaotic secure sequences with desired statistical properties and high security,” International Journal of Bifurcation and Chaos in Applied Sciences and Engineering, vol. 7, no. 1, pp. 205–213, 1997. View at Google Scholar · View at Scopus
  16. P. Li, Z. Li, S. Fettinger, Y. Mao, and W. A. Halang, “Application of chaos-based pseudo-random-bit generators in internet-based online payments,” Studies in Computational Intelligence, vol. 37, pp. 667–685, 2007. View at Publisher · View at Google Scholar · View at Scopus
  17. C. Ling and S. G. Sun, “4-phase spreading sequences by chaotic maps for CDMA,” Journal of China Institute of Communications, vol. 19, no. 3, pp. 40–44, 1998. View at Google Scholar
  18. T. Kohda and A. Tsuneda, “Statistics of chaotic binary sequences,” IEEE Transactions on Information Theory, vol. 43, no. 1, pp. 104–112, 1997. View at Publisher · View at Google Scholar · View at Zentralblatt MATH
  19. NIST, “A statistical test suite for random and pseudo-random number generators for cryptographic applications,” 2010, http://csrc.nist.gov/publications/nistpubs/800-22-rev1a/SP800-22rev1a.pdf.
  20. “NIST Special Publication 800-22,” 2001, http://csrc.nist.gov/rng/rng2.html.