X-Git-Url: https://bilbo.iut-bm.univ-fcomte.fr/and/gitweb/prng_gpu.git/blobdiff_plain/e55d237aba022a66cc2d7650d295b29169878f45..9e057cd5768916849c2767ef4bd0f54dd9adc3b4:/prng_gpu.tex?ds=sidebyside diff --git a/prng_gpu.tex b/prng_gpu.tex index 20e2566..90f00f8 100644 --- a/prng_gpu.tex +++ b/prng_gpu.tex @@ -11,6 +11,8 @@ \usepackage[ruled,vlined]{algorithm2e} \usepackage{listings} \usepackage[standard]{ntheorem} +\usepackage{algorithmic} +\usepackage{slashbox} % Pour mathds : les ensembles IR, IN, etc. \usepackage{dsfont} @@ -161,7 +163,7 @@ We show in Section~\ref{sec:security analysis} that, if the inputted generator is cryptographically secure, then it is the case too for the generator provided by the post-treatment. Such a proof leads to the proposition of a cryptographically secure and -chaotic generator on GPU based on the famous Blum Blum Shum +chaotic generator on GPU based on the famous Blum Blum Shub in Section~\ref{sec:CSGPU}, and to an improvement of the Blum-Goldwasser protocol in Sect.~\ref{Blum-Goldwasser}. This research work ends by a conclusion section, in which the contribution is @@ -224,7 +226,10 @@ We can finally remark that, to the best of our knowledge, no GPU implementation \label{section:BASIC RECALLS} This section is devoted to basic definitions and terminologies in the fields of -topological chaos and chaotic iterations. +topological chaos and chaotic iterations. We assume the reader is familiar +with basic notions on topology (see for instance~\cite{Devaney}). + + \subsection{Devaney's Chaotic Dynamical Systems} In the sequel $S^{n}$ denotes the $n^{th}$ term of a sequence $S$ and $V_{i}$ @@ -237,7 +242,7 @@ Consider a topological space $(\mathcal{X},\tau)$ and a continuous function $f : \mathcal{X} \rightarrow \mathcal{X}$. \begin{definition} -$f$ is said to be \emph{topologically transitive} if, for any pair of open sets +The function $f$ is said to be \emph{topologically transitive} if, for any pair of open sets $U,V \subset \mathcal{X}$, there exists $k>0$ such that $f^k(U) \cap V \neq \varnothing$. \end{definition} @@ -256,7 +261,7 @@ necessarily the same period). \begin{definition}[Devaney's formulation of chaos~\cite{Devaney}] -$f$ is said to be \emph{chaotic} on $(\mathcal{X},\tau)$ if $f$ is regular and +The function $f$ is said to be \emph{chaotic} on $(\mathcal{X},\tau)$ if $f$ is regular and topologically transitive. \end{definition} @@ -264,12 +269,12 @@ The chaos property is strongly linked to the notion of ``sensitivity'', defined on a metric space $(\mathcal{X},d)$ by: \begin{definition} -\label{sensitivity} $f$ has \emph{sensitive dependence on initial conditions} +\label{sensitivity} The function $f$ has \emph{sensitive dependence on initial conditions} if there exists $\delta >0$ such that, for any $x\in \mathcal{X}$ and any neighborhood $V$ of $x$, there exist $y\in V$ and $n > 0$ such that $d\left(f^{n}(x), f^{n}(y)\right) >\delta $. -$\delta$ is called the \emph{constant of sensitivity} of $f$. +The constant $\delta$ is called the \emph{constant of sensitivity} of $f$. \end{definition} Indeed, Banks \emph{et al.} have proven in~\cite{Banks92} that when $f$ is @@ -328,17 +333,15 @@ Let us now recall how to define a suitable metric space where chaotic iterations are continuous. For further explanations, see, e.g., \cite{guyeux10}. Let $\delta $ be the \emph{discrete Boolean metric}, $\delta -(x,y)=0\Leftrightarrow x=y.$ Given a function $f$, define the function: -%%RAPH : ici j'ai coupé la dernière ligne en 2, c'est moche mais bon -\begin{equation} +(x,y)=0\Leftrightarrow x=y.$ Given a function $f$, define the function +$F_{f}: \llbracket1;\mathsf{N}\rrbracket\times \mathds{B}^{\mathsf{N}} +\longrightarrow \mathds{B}^{\mathsf{N}}$ +\begin{equation*} \begin{array}{lrll} -F_{f}: & \llbracket1;\mathsf{N}\rrbracket\times \mathds{B}^{\mathsf{N}} & -\longrightarrow & \mathds{B}^{\mathsf{N}} \\ -& (k,E) & \longmapsto & \left( E_{j}.\delta (k,j)+ \right.\\ -& & & \left. f(E)_{k}.\overline{\delta -(k,j)}\right) _{j\in \llbracket1;\mathsf{N}\rrbracket},% +& (k,E) & \longmapsto & \left( E_{j}.\delta (k,j)+ f(E)_{k}.\overline{\delta +(k,j)}\right) _{j\in \llbracket1;\mathsf{N}\rrbracket}% \end{array}% -\end{equation}% +\end{equation*}% \noindent where + and . are the Boolean addition and product operations. Consider the phase space: \begin{equation} @@ -591,11 +594,11 @@ faster, does not deflate their topological chaos properties. \subsection{Proofs of Chaos of the General Formulation of the Chaotic Iterations} \label{deuxième def} Let us consider the discrete dynamical systems in chaotic iterations having -the general form: +the general form: $\forall n\in \mathds{N}^{\ast }$, $ \forall i\in +\llbracket1;\mathsf{N}\rrbracket $, \begin{equation} -\forall n\in \mathds{N}^{\ast }, \forall i\in -\llbracket1;\mathsf{N}\rrbracket ,x_i^n=\left\{ + x_i^n=\left\{ \begin{array}{ll} x_i^{n-1} & \text{ if } i \notin \mathcal{S}^n \\ \left(f(x^{n-1})\right)_{S^n} & \text{ if }i \in \mathcal{S}^n. @@ -620,15 +623,13 @@ Let us introduce the following function: where $\mathcal{P}\left(X\right)$ is for the powerset of the set $X$, that is, $Y \in \mathcal{P}\left(X\right) \Longleftrightarrow Y \subset X$. Given a function $f:\mathds{B}^\mathsf{N} \longrightarrow \mathds{B}^\mathsf{N} $, define the function: -%%RAPH : j'ai coupé la dernière ligne en 2, c'est moche -\begin{equation} -\begin{array}{lrll} -F_{f}: & \mathcal{P}\left(\llbracket1;\mathsf{N}\rrbracket \right) \times \mathds{B}^{\mathsf{N}} & -\longrightarrow & \mathds{B}^{\mathsf{N}} \\ -& (P,E) & \longmapsto & \left( E_{j}.\chi (j,P)+\right.\\ -& & &\left.f(E)_{j}.\overline{\chi(j,P)}\right) _{j\in \llbracket1;\mathsf{N}\rrbracket},% +$F_{f}: \mathcal{P}\left(\llbracket1;\mathsf{N}\rrbracket \right) \times \mathds{B}^{\mathsf{N}} +\longrightarrow \mathds{B}^{\mathsf{N}}$ +\begin{equation*} +\begin{array}{rll} + (P,E) & \longmapsto & \left( E_{j}.\chi (j,P)+f(E)_{j}.\overline{\chi(j,P)}\right) _{j\in \llbracket1;\mathsf{N}\rrbracket}% \end{array}% -\end{equation}% +\end{equation*}% where + and . are the Boolean addition and product operations, and $\overline{x}$ is the negation of the Boolean $x$. Consider the phase space: @@ -758,16 +759,16 @@ thus after $n_{2}$, the $k+2$ first terms of $S^n$ and $S$ are equal. \noindent As a consequence, the $k+1$ first entries of the strategies of $% G_{f}(S^n,E^n)$ and $G_{f}(S,E)$ are the same ($G_{f}$ is a shift of strategies) and due to the definition of $d_{s}$, the floating part of the distance between $(S^n,E^n)$ and $(S,E)$ is strictly less than $% -10^{-(k+1)}\leqslant \varepsilon $.\bigskip \newline +10^{-(k+1)}\leqslant \varepsilon $. + In conclusion, %%RAPH : ici j'ai rajouté une ligne -\begin{flushleft}$$ -\forall \varepsilon >0,\exists N_{0}=max(n_{0},n_{1},n_{2})\in \mathds{N}% -,\forall n\geqslant N_{0},$$ -$$ d\left( G_{f}(S^n,E^n);G_{f}(S,E)\right) +$ +\forall \varepsilon >0,$ $\exists N_{0}=max(n_{0},n_{1},n_{2})\in \mathds{N} +,$ $\forall n\geqslant N_{0},$ +$ d\left( G_{f}(S^n,E^n);G_{f}(S,E)\right) \leqslant \varepsilon . -$$ -\end{flushleft} +$ $G_{f}$ is consequently continuous. \end{proof} @@ -807,7 +808,7 @@ where $(s^0,s^1, \hdots)$ is the strategy of $Y$, satisfies the properties claimed in the lemma. \end{proof} -We can now prove Theorem~\ref{t:chaos des general}... +We can now prove the Theorem~\ref{t:chaos des general}. \begin{proof}[Theorem~\ref{t:chaos des general}] Firstly, strong transitivity implies transitivity. @@ -836,6 +837,434 @@ have $d((S,E),(\tilde S,E))<\epsilon$. \end{proof} +\begin{color}{red} +\section{Improving Statistical Properties Using Chaotic Iterations} + + +\subsection{The CIPRNG family} + +Three categories of PRNGs have been derived from chaotic iterations. They are +recalled in what follows. + +\subsubsection{Old CIPRNG} + +Let $\mathsf{N} = 4$. Some chaotic iterations are fulfilled to generate a sequence $\left(x^n\right)_{n\in\mathds{N}} \in \left(\mathds{B}^4\right)^\mathds{N}$ of Boolean vectors: the successive states of the iterated system. Some of these vectors are randomly extracted and their components constitute our pseudorandom bit flow~\cite{bgw09:ip}. +Chaotic iterations are realized as follows. Initial state $x^0 \in \mathds{B}^4$ is a Boolean vector taken as a seed and chaotic strategy $\left(S^n\right)_{n\in\mathds{N}}\in \llbracket 1, 4 \rrbracket^\mathds{N}$ is constructed with $PRNG_2$. Lastly, iterate function $f$ is the vectorial Boolean negation. +At each iteration, only the $S^n$-th component of state $x^n$ is updated. Finally, some $x^n$ are selected by a sequence $m^n$, provided by a second generator $PRNG_1$, as the pseudorandom bit sequence of our generator. + +The basic design procedure of the Old CI generator is summed up in Algorithm~\ref{Chaotic iteration}. +The internal state is $x$, the output array is $r$. $a$ and $b$ are those computed by $PRNG_1$ and $PRNG_2$. + + +\begin{algorithm} +\textbf{Input:} the internal state $x$ (an array of 4-bit words)\\ +\textbf{Output:} an array $r$ of 4-bit words +\begin{algorithmic}[1] + +\STATE$a\leftarrow{PRNG_1()}$; +\STATE$m\leftarrow{a~mod~2+13}$; +\WHILE{$i=0,\dots,m$} +\STATE$b\leftarrow{PRNG_2()}$; +\STATE$S\leftarrow{b~mod~4}$; +\STATE$x_S\leftarrow{ \overline{x_S}}$; +\ENDWHILE +\STATE$r\leftarrow{x}$; +\STATE return $r$; +\medskip +\caption{An arbitrary round of the old CI generator} +\label{Chaotic iteration} +\end{algorithmic} +\end{algorithm} + +\subsubsection{New CIPRNG} + +The New CI generator is designed by the following process~\cite{bg10:ip}. First of all, some chaotic iterations have to be done to generate a sequence $\left(x^n\right)_{n\in\mathds{N}} \in \left(\mathds{B}^{32}\right)^\mathds{N}$ of Boolean vectors, which are the successive states of the iterated system. Some of these vectors will be randomly extracted and our pseudo-random bit flow will be constituted by their components. Such chaotic iterations are realized as follows. Initial state $x^0 \in \mathds{B}^{32}$ is a Boolean vector taken as a seed and chaotic strategy $\left(S^n\right)_{n\in\mathds{N}}\in \llbracket 1, 32 \rrbracket^\mathds{N}$ is +an \emph{irregular decimation} of $PRNG_2$ sequence, as described in Algorithm~\ref{Chaotic iteration1}. + +Another time, at each iteration, only the $S^n$-th component of state $x^n$ is updated, as follows: $x_i^n = x_i^{n-1}$ if $i \neq S^n$, else $x_i^n = \overline{x_i^{n-1}}$. +Finally, some $x^n$ are selected +by a sequence $m^n$ as the pseudo-random bit sequence of our generator. +$(m^n)_{n \in \mathds{N}} \in \mathcal{M}^\mathds{N}$ is computed from $PRNG_1$, where $\mathcal{M}\subset \mathds{N}^*$ is a finite nonempty set of integers. + +The basic design procedure of the New CI generator is summarized in Algorithm~\ref{Chaotic iteration1}. +The internal state is $x$, the output state is $r$. $a$ and $b$ are those computed by the two input +PRNGs. Lastly, the value $g_1(a)$ is an integer defined as in Eq.~\ref{Formula}. + +\begin{equation} +\label{Formula} +m^n = g_1(y^n)= +\left\{ +\begin{array}{l} +0 \text{ if }0 \leqslant{y^n}<{C^0_{32}},\\ +1 \text{ if }{C^0_{32}} \leqslant{y^n}<\sum_{i=0}^1{C^i_{32}},\\ +2 \text{ if }\sum_{i=0}^1{C^i_{32}} \leqslant{y^n}<\sum_{i=0}^2{C^i_{32}},\\ +\vdots~~~~~ ~~\vdots~~~ ~~~~\\ +N \text{ if }\sum_{i=0}^{N-1}{C^i_{32}}\leqslant{y^n}<1.\\ +\end{array} +\right. +\end{equation} + +\begin{algorithm} +\textbf{Input:} the internal state $x$ (32 bits)\\ +\textbf{Output:} a state $r$ of 32 bits +\begin{algorithmic}[1] +\FOR{$i=0,\dots,N$} +{ +\STATE$d_i\leftarrow{0}$\; +} +\ENDFOR +\STATE$a\leftarrow{PRNG_1()}$\; +\STATE$m\leftarrow{f(a)}$\; +\STATE$k\leftarrow{m}$\; +\WHILE{$i=0,\dots,k$} + +\STATE$b\leftarrow{PRNG_2()~mod~\mathsf{N}}$\; +\STATE$S\leftarrow{b}$\; + \IF{$d_S=0$} + { +\STATE $x_S\leftarrow{ \overline{x_S}}$\; +\STATE $d_S\leftarrow{1}$\; + + } + \ELSIF{$d_S=1$} + { +\STATE $k\leftarrow{ k+1}$\; + }\ENDIF +\ENDWHILE\\ +\STATE $r\leftarrow{x}$\; +\STATE return $r$\; +\medskip +\caption{An arbitrary round of the new CI generator} +\label{Chaotic iteration1} +\end{algorithmic} +\end{algorithm} + + +\subsubsection{Xor CIPRNG} + +Instead of updating only one cell at each iteration as Old CI and New CI, we can try to choose a +subset of components and to update them together. Such an attempt leads +to a kind of merger of the two random sequences. When the updating function is the vectorial negation, +this algorithm can be rewritten as follows~\cite{arxivRCCGPCH}: + +\begin{equation} +\left\{ +\begin{array}{l} +x^0 \in \llbracket 0, 2^\mathsf{N}-1 \rrbracket, S \in \llbracket 0, 2^\mathsf{N}-1 \rrbracket^\mathds{N} \\ +\forall n \in \mathds{N}^*, x^n = x^{n-1} \oplus S^n, +\end{array} +\right. +\label{equation Oplus} +\end{equation} +%This rewriting can be understood as follows. The $n-$th term $S^n$ of the +%sequence $S$, which is an integer of $\mathsf{N}$ binary digits, presents +%the list of cells to update in the state $x^n$ of the system (represented +%as an integer having $\mathsf{N}$ bits too). More precisely, the $k-$th +%component of this state (a binary digit) changes if and only if the $k-$th +%digit in the binary decomposition of $S^n$ is 1. + +The single basic component presented in Eq.~\ref{equation Oplus} is of +ordinary use as a good elementary brick in various PRNGs. It corresponds +to the discrete dynamical system in chaotic iterations. + +\subsection{About some Well-known PRNGs} +\label{The generation of pseudo-random sequence} + + + + +Let us now give illustration on the fact that chaos appears to improve statistical properties. + +\subsection{Details of some Existing Generators} + +Here are the modules of PRNGs we have chosen to experiment. + +\subsubsection{LCG} +This PRNG implements either the simple or the combined linear congruency generator (LCGs). The simple LCG is defined by the recurrence: +\begin{equation} +x^n = (ax^{n-1} + c)~mod~m +\label{LCG} +\end{equation} +where $a$, $c$, and $x^0$ must be, among other things, non-negative and less than $m$~\cite{testU01}. In what follows, 2LCGs and 3LCGs refer as two (resp. three) combinations of such LCGs. +For further details, see~\cite{combined_lcg}. + +\subsubsection{MRG} +This module implements multiple recursive generators (MRGs), based on a linear recurrence of order $k$, modulo $m$~\cite{testU01}: +\begin{equation} +x^n = (a^1x^{n-1}+~...~+a^kx^{n-k})~mod~m +\label{MRG} +\end{equation} +Combination of two MRGs (referred as 2MRGs) is also be used in this paper. + +\subsubsection{UCARRY} +Generators based on linear recurrences with carry are implemented in this module. This includes the add-with-carry (AWC) generator, based on the recurrence: +\begin{equation} +\label{AWC} +\begin{array}{l} +x^n = (x^{n-r} + x^{n-s} + c^{n-1})~mod~m, \\ +c^n= (x^{n-r} + x^{n-s} + c^{n-1}) / m, \end{array}\end{equation} +the SWB generator, having the recurrence: +\begin{equation} +\label{SWB} +\begin{array}{l} +x^n = (x^{n-r} - x^{n-s} - c^{n-1})~mod~m, \\ +c^n=\left\{ +\begin{array}{l} +1 ~~~~~\text{if}~ (x^{i-r} - x^{i-s} - c^{i-1})<0\\ +0 ~~~~~\text{else},\end{array} \right. \end{array}\end{equation} +and the SWC generator designed by R. Couture, which is based on the following recurrence: +\begin{equation} +\label{SWC} +\begin{array}{l} +x^n = (a^1x^{n-1} \oplus ~...~ \oplus a^rx^{n-r} \oplus c^{n-1}) ~ mod ~ 2^w, \\ +c^n = (a^1x^{n-1} \oplus ~...~ \oplus a^rx^{n-r} \oplus c^{n-1}) ~ / ~ 2^w. \end{array}\end{equation} + +\subsubsection{GFSR} +This module implements the generalized feedback shift register (GFSR) generator, that is: +\begin{equation} +x^n = x^{n-r} \oplus x^{n-k} +\label{GFSR} +\end{equation} + + +\subsubsection{INV} +Finally, this module implements the nonlinear inversive generator, as defined in~\cite{testU01}, which is: + +\begin{equation} +\label{INV} +\begin{array}{l} +x^n=\left\{ +\begin{array}{ll} +(a^1 + a^2 / z^{n-1})~mod~m & \text{if}~ z^{n-1} \neq 0 \\ +a^1 & \text{if}~ z^{n-1} = 0 .\end{array} \right. \end{array}\end{equation} + + + + + +\subsection{Statistical tests} +\label{Security analysis} + +%A theoretical proof for the randomness of a generator is impossible to give, therefore statistical inference based on observed sample sequences produced by the generator seems to be the best option. +Considering the properties of binary random sequences, various statistical tests can be designed to evaluate the assertion that the sequence is generated by a perfectly random source. We have performed some statistical tests for the CIPRNGs proposed here. These tests include NIST suite~\cite{ANDREW2008} and DieHARD battery of tests~\cite{DieHARD}. For completeness and for reference, we give in the following subsection a brief description of each of the aforementioned tests. + + + +\subsubsection{NIST statistical tests suite} + +Among the numerous standard tests for pseudo-randomness, a convincing way to show the randomness of the produced sequences is to confront them to the NIST (National Institute of Standards and Technology) statistical tests, being an up-to-date tests suite proposed by the Information Technology Laboratory (ITL). A new version of the Statistical tests suite has been released in August 11, 2010. + +The NIST tests suite SP 800-22 is a statistical package consisting of 15 tests. They were developed to test the randomness of binary sequences produced by hardware or software based cryptographic pseudorandom number generators. These tests focus on a variety of different types of non-randomness that could exist in a sequence. + +For each statistical test, a set of $P-values$ (corresponding to the set of sequences) is produced. +The interpretation of empirical results can be conducted in various ways. +In this paper, the examination of the distribution of P-values to check for uniformity ($ P-value_{T}$) is used. +The distribution of $P-values$ is examined to ensure uniformity. +If $P-value_{T} \geqslant 0.0001$, then the sequences can be considered to be uniformly distributed. + +In our experiments, 100 sequences (s = 100), each with 1,000,000-bit long, are generated and tested. If the $P-value_{T}$ of any test is smaller than 0.0001, the sequences are considered to be not good enough and the generating algorithm is not suitable for usage. + + + + + +\subsubsection{DieHARD battery of tests} +The DieHARD battery of tests has been the most sophisticated standard for over a decade. Because of the stringent requirements in the DieHARD tests suite, a generator passing this battery of +tests can be considered good as a rule of thumb. + +The DieHARD battery of tests consists of 18 different independent statistical tests. This collection + of tests is based on assessing the randomness of bits comprising 32-bit integers obtained from +a random number generator. Each test requires $2^{23}$ 32-bit integers in order to run the full set +of tests. Most of the tests in DieHARD return a $P-value$, which should be uniform on $[0,1)$ if the input file +contains truly independent random bits. These $P-values$ are obtained by +$P=F(X)$, where $F$ is the assumed distribution of the sample random variable $X$ (often normal). +But that assumed $F$ is just an asymptotic approximation, for which the fit will be worst +in the tails. Thus occasional $P-values$ near 0 or 1, such as 0.0012 or 0.9983, can occur. +An individual test is considered to be failed if the $P-value$ approaches 1 closely, for example $P>0.9999$. + + +\subsection{Results and discussion} +\label{Results and discussion} +\begin{table*} +\renewcommand{\arraystretch}{1.3} +\caption{NIST and DieHARD tests suite passing rates for PRNGs without CI} +\label{NIST and DieHARD tests suite passing rate the for PRNGs without CI} +\centering + \begin{tabular}{|l||c|c|c|c|c|c|c|c|c|c|} + \hline\hline +Types of PRNGs & \multicolumn{2}{c|}{Linear PRNGs} & \multicolumn{4}{c|}{Lagged PRNGs} & \multicolumn{1}{c|}{ICG PRNGs} & \multicolumn{3}{c|}{Mixed PRNGs}\\ \hline +\backslashbox{\textbf{$Tests$}} {\textbf{$PRNG$}} & LCG& MRG& AWC & SWB & SWC & GFSR & INV & LCG2& LCG3& MRG2 \\ \hline +NIST & 11/15 & 14/15 &\textbf{15/15} & \textbf{15/15} & 14/15 & 14/15 & 14/15 & 14/15& 14/15& 14/15 \\ \hline +DieHARD & 16/18 & 16/18 & 15/18 & 16/18 & \textbf{18/18} & 16/18 & 16/18 & 16/18& 16/18& 16/18\\ \hline +\end{tabular} +\end{table*} + +Table~\ref{NIST and DieHARD tests suite passing rate the for PRNGs without CI} shows the results on the batteries recalled above, indicating that almost all the PRNGs cannot pass all their tests. In other words, the statistical quality of these PRNGs cannot fulfill the up-to-date standards presented previously. We will show that the CIPRNG can solve this issue. + +To illustrate the effects of this CIPRNG in detail, experiments will be divided in three parts: +\begin{enumerate} + \item \textbf{Single CIPRNG}: The PRNGs involved in CI computing are of the same category. + \item \textbf{Mixed CIPRNG}: Two different types of PRNGs are mixed during the chaotic iterations process. + \item \textbf{Multiple CIPRNG}: The generator is obtained by repeating the composition of the iteration function as follows: $x^0\in \mathds{B}^{\mathsf{N}}$, and $\forall n\in \mathds{N}^{\ast },\forall i\in \llbracket1;\mathsf{N}\rrbracket,$ +\begin{equation} +\begin{array}{l} +x_i^n=\left\{ +\begin{array}{l} +x_i^{n-1}~~~~~\text{if}~S^n\neq i \\ +\forall j\in \llbracket1;\mathsf{m}\rrbracket,f^m(x^{n-1})_{S^{nm+j}}~\text{if}~S^{nm+j}=i.\end{array} \right. \end{array} +\end{equation} +$m$ is called the \emph{functional power}. +\end{enumerate} + + +We have performed statistical analysis of each of the aforementioned CIPRNGs. +The results are reproduced in Tables~\ref{NIST and DieHARD tests suite passing rate the for PRNGs without CI} and \ref{NIST and DieHARD tests suite passing rate the for single CIPRNGs}. +The scores written in boldface indicate that all the tests have been passed successfully, whereas an asterisk ``*'' means that the considered passing rate has been improved. + +\subsubsection{Tests based on the Single CIPRNG} + +\begin{table*} +\renewcommand{\arraystretch}{1.3} +\caption{NIST and DieHARD tests suite passing rates for PRNGs with CI} +\label{NIST and DieHARD tests suite passing rate the for single CIPRNGs} +\centering + \begin{tabular}{|l||c|c|c|c|c|c|c|c|c|c|c|c|} + \hline +Types of PRNGs & \multicolumn{2}{c|}{Linear PRNGs} & \multicolumn{4}{c|}{Lagged PRNGs} & \multicolumn{1}{c|}{ICG PRNGs} & \multicolumn{3}{c|}{Mixed PRNGs}\\ \hline +\backslashbox{\textbf{$Tests$}} {\textbf{$Single~CIPRNG$}} & LCG & MRG & AWC & SWB & SWC & GFSR & INV& LCG2 & LCG3& MRG2 \\ \hline\hline +Old CIPRNG\\ \hline \hline +NIST & \textbf{15/15} * & \textbf{15/15} * & \textbf{15/15} & \textbf{15/15} & \textbf{15/15} * & \textbf{15/15} * & \textbf{15/15} *& \textbf{15/15} * & \textbf{15/15} * & \textbf{15/15} \\ \hline +DieHARD & \textbf{18/18} * & \textbf{18/18} * & \textbf{18/18} * & \textbf{18/18} * & \textbf{18/18} & \textbf{18/18} * & \textbf{18/18} *& \textbf{18/18} * & \textbf{18/18} *& \textbf{18/18} * \\ \hline +New CIPRNG\\ \hline \hline +NIST & \textbf{15/15} * & \textbf{15/15} * & \textbf{15/15} & \textbf{15/15} & \textbf{15/15} * & \textbf{15/15} * & \textbf{15/15} *& \textbf{15/15} * & \textbf{15/15} * & \textbf{15/15} \\ \hline +DieHARD & \textbf{18/18} * & \textbf{18/18} * & \textbf{18/18} * & \textbf{18/18} * & \textbf{18/18} & \textbf{18/18} * & \textbf{18/18} * & \textbf{18/18} * & \textbf{18/18} *& \textbf{18/18} *\\ \hline +Xor CIPRNG\\ \hline\hline +NIST & 14/15*& \textbf{15/15} * & \textbf{15/15} & \textbf{15/15} & 14/15 & \textbf{15/15} * & 14/15& \textbf{15/15} * & \textbf{15/15} *& \textbf{15/15} \\ \hline +DieHARD & 16/18 & 16/18 & 17/18* & \textbf{18/18} * & \textbf{18/18} & \textbf{18/18} * & 16/18 & 16/18 & 16/18& 16/18\\ \hline +\end{tabular} +\end{table*} + +The statistical tests results of the PRNGs using the single CIPRNG method are given in Table~\ref{NIST and DieHARD tests suite passing rate the for single CIPRNGs}. +We can observe that, except for the Xor CIPRNG, all of the CIPRNGs have passed the 15 tests of the NIST battery and the 18 tests of the DieHARD one. +Moreover, considering these scores, we can deduce that both the single Old CIPRNG and the single New CIPRNG are relatively steadier than the single Xor CIPRNG approach, when applying them to different PRNGs. +However, the Xor CIPRNG is obviously the fastest approach to generate a CI random sequence, and it still improves the statistical properties relative to each generator taken alone, although the test values are not as good as desired. + +Therefore, all of these three ways are interesting, for different reasons, in the production of pseudorandom numbers and, +on the whole, the single CIPRNG method can be considered to adapt to or improve all kinds of PRNGs. + +To have a realization of the Xor CIPRNG that can pass all the tests embedded into the NIST battery, the Xor CIPRNG with multiple functional powers are investigated in Section~\ref{Tests based on Multiple CIPRNG}. + + +\subsubsection{Tests based on the Mixed CIPRNG} + +To compare the previous approach with the CIPRNG design that uses a Mixed CIPRNG, we have taken into account the same inputted generators than in the previous section. +These inputted couples $(PRNG_1,PRNG_2)$ of PRNGs are used in the Mixed approach as follows: +\begin{equation} +\left\{ +\begin{array}{l} +x^0 \in \llbracket 0, 2^\mathsf{N}-1 \rrbracket, S \in \llbracket 0, 2^\mathsf{N}-1 \rrbracket^\mathds{N} \\ +\forall n \in \mathds{N}^*, x^n = x^{n-1} \oplus PRNG_1\oplus PRNG_2, +\end{array} +\right. +\label{equation Oplus} +\end{equation} + +With this Mixed CIPRNG approach, both the Old CIPRNG and New CIPRNG continue to pass all the NIST and DieHARD suites. +In addition, we can see that the PRNGs using a Xor CIPRNG approach can pass more tests than previously. +The main reason of this success is that the Mixed Xor CIPRNG has a longer period. +Indeed, let $n_{P}$ be the period of a PRNG $P$, then the period deduced from the single Xor CIPRNG approach is obviously equal to: +\begin{equation} +n_{SXORCI}= +\left\{ +\begin{array}{ll} +n_{P}&\text{if~}x^0=x^{n_{P}}\\ +2n_{P}&\text{if~}x^0\neq x^{n_{P}}.\\ +\end{array} +\right. +\label{equation Oplus} +\end{equation} + +Let us now denote by $n_{P1}$ and $n_{P2}$ the periods of respectively the $PRNG_1$ and $PRNG_2$ generators, then the period of the Mixed Xor CIPRNG will be: +\begin{equation} +n_{XXORCI}= +\left\{ +\begin{array}{ll} +LCM(n_{P1},n_{P2})&\text{if~}x^0=x^{LCM(n_{P1},n_{P2})}\\ +2LCM(n_{P1},n_{P2})&\text{if~}x^0\neq x^{LCM(n_{P1},n_{P2})}.\\ +\end{array} +\right. +\label{equation Oplus} +\end{equation} + +In Table~\ref{DieHARD fail mixex CIPRNG}, we only show the results for the Mixed CIPRNGs that cannot pass all DieHARD suites (the NIST tests are all passed). It demonstrates that Mixed Xor CIPRNG involving LCG, MRG, LCG2, LCG3, MRG2, or INV cannot pass the two following tests, namely the ``Matrix Rank 32x32'' and the ``COUNT-THE-1's'' tests contained into the DieHARD battery. Let us recall their definitions: + +\begin{itemize} + \item \textbf{Matrix Rank 32x32.} A random 32x32 binary matrix is formed, each row having a 32-bit random vector. Its rank is an integer that ranges from 0 to 32. Ranks less than 29 must be rare, and their occurences must be pooled with those of rank 29. To achieve the test, ranks of 40,000 such random matrices are obtained, and a chisquare test is performed on counts for ranks 32,31,30 and for ranks $\leq29$. + + \item \textbf{COUNT-THE-1's TEST} Consider the file under test as a stream of bytes (four per 2 bit integer). Each byte can contain from 0 to 8 1's, with probabilities 1,8,28,56,70,56,28,8,1 over 256. Now let the stream of bytes provide a string of overlapping 5-letter words, each ``letter'' taking values A,B,C,D,E. The letters are determined by the number of 1's in a byte: 0,1, or 2 yield A, 3 yields B, 4 yields C, 5 yields D and 6,7, or 8 yield E. Thus we have a monkey at a typewriter hitting five keys with various probabilities (37,56,70,56,37 over 256). There are $5^5$ possible 5-letter words, and from a string of 256,000 (over-lapping) 5-letter words, counts are made on the frequencies for each word. The quadratic form in the weak inverse of the covariance matrix of the cell counts provides a chisquare test: Q5-Q4, the difference of the naive Pearson sums of $(OBS-EXP)^2/EXP$ on counts for 5- and 4-letter cell counts. +\end{itemize} + +The reason of these fails is that the output of LCG, LCG2, LCG3, MRG, and MRG2 under the experiments are in 31-bit. Compare with the Single CIPRNG, using different PRNGs to build CIPRNG seems more efficient in improving random number quality (mixed Xor CI can 100\% pass NIST, but single cannot). + +\begin{table*} +\renewcommand{\arraystretch}{1.3} +\caption{Scores of mixed Xor CIPRNGs when considering the DieHARD battery} +\label{DieHARD fail mixex CIPRNG} +\centering + \begin{tabular}{|l||c|c|c|c|c|c|} + \hline +\backslashbox{\textbf{$PRNG_1$}} {\textbf{$PRNG_0$}} & LCG & MRG & INV & LCG2 & LCG3 & MRG2 \\ \hline\hline +LCG &\backslashbox{} {} &16/18&16/18 &16/18 &16/18 &16/18\\ \hline +MRG &16/18 &\backslashbox{} {} &16/18&16/18 &16/18 &16/18\\ \hline +INV &16/18 &16/18&\backslashbox{} {} &16/18 &16/18&16/18 \\ \hline +LCG2 &16/18 &16/18 &16/18 &\backslashbox{} {} &16/18&16/18\\ \hline +LCG3 &16/18 &16/18 &16/18&16/18&\backslashbox{} {} &16/18\\ \hline +MRG2 &16/18 &16/18 &16/18&16/18 &16/18 &\backslashbox{} {} \\ \hline +\end{tabular} +\end{table*} + +\subsubsection{Tests based on the Multiple CIPRNG} +\label{Tests based on Multiple CIPRNG} + +Until now, the combination of at most two input PRNGs has been investigated. +We now regard the possibility to use a larger number of generators to improve the statistics of the generated pseudorandom numbers, leading to the multiple functional power approach. +For the CIPRNGs which have already pass both the NIST and DieHARD suites with 2 inputted PRNGs (all the Old and New CIPRNGs, and some of the Xor CIPRNGs), it is not meaningful to consider their adaption of this multiple CIPRNG method, hence only the Multiple Xor CIPRNGs, having the following form, will be investigated. +\begin{equation} +\left\{ +\begin{array}{l} +x^0 \in \llbracket 0, 2^\mathsf{N}-1 \rrbracket, S \in \llbracket 0, 2^\mathsf{N}-1 \rrbracket^\mathds{N} \\ +\forall n \in \mathds{N}^*, x^n = x^{n-1} \oplus S^{nm}\oplus S^{nm+1}\ldots \oplus S^{nm+m-1} , +\end{array} +\right. +\label{equation Oplus} +\end{equation} + +The question is now to determine the value of the threshold $m$ (the functional power) making the multiple CIPRNG being able to pass the whole NIST battery. +Such a question is answered in Table~\ref{threshold}. + + +\begin{table*} +\renewcommand{\arraystretch}{1.3} +\caption{Functional power $m$ making it possible to pass the whole NIST battery} +\label{threshold} +\centering + \begin{tabular}{|l||c|c|c|c|c|c|c|c|} + \hline +Inputted $PRNG$ & LCG & MRG & SWC & GFSR & INV& LCG2 & LCG3 & MRG2 \\ \hline\hline +Threshold value $m$& 19 & 7 & 2& 1 & 11& 9& 3& 4\\ \hline\hline +\end{tabular} +\end{table*} + +\subsubsection{Results Summary} + +We can summarize the obtained results as follows. +\begin{enumerate} +\item The CIPRNG method is able to improve the statistical properties of a large variety of PRNGs. +\item Using different PRNGs in the CIPRNG approach is better than considering several instances of one unique PRNG. +\item The statistical quality of the outputs increases with the functional power $m$. +\end{enumerate} + +\end{color} \section{Efficient PRNG based on Chaotic Iterations} \label{sec:efficient PRNG} @@ -1232,8 +1661,10 @@ $y\bigoplus_{i=1}^{i=j} w_i^\prime=y\bigoplus_{i=1}^{i=j} w_i$. It follows, by a direct induction, that $w_i=w_i^\prime$. Furthermore, since $\mathbb{B}^{kN}$ is finite, each $\varphi_y$ is bijective. Therefore, and using (\ref{PCH-1}), one has +$\mathrm{Pr}[D^\prime(U_{kN})=1]=\mathrm{Pr}[D(\varphi_y(U_{kN}))=1]$ and, +therefore, \begin{equation}\label{PCH-2} -\mathrm{Pr}[D^\prime(U_{kN})=1]=\mathrm{Pr}[D(\varphi_y(U_{kN}))=1]=\mathrm{Pr}[D(U_{kN})=1]. +\mathrm{Pr}[D^\prime(U_{kN})=1]=\mathrm{Pr}[D(U_{kN})=1]. \end{equation} Now, using (\ref{PCH-1}) again, one has for every $x$, @@ -1269,7 +1700,7 @@ It is possible to build a cryptographically secure PRNG based on the previous algorithm (Algorithm~\ref{algo:gpu_kernel2}). Due to Proposition~\ref{cryptopreuve}, it simply consists in replacing the {\it xor-like} PRNG by a cryptographically secure one. -We have chosen the Blum Blum Shum generator~\cite{BBS} (usually denoted by BBS) having the form: +We have chosen the Blum Blum Shub generator~\cite{BBS} (usually denoted by BBS) having the form: $$x_{n+1}=x_n^2~ mod~ M$$ where $M$ is the product of two prime numbers (these prime numbers need to be congruent to 3 modulus 4). BBS is known to be very slow and only usable for cryptographic applications. @@ -1388,6 +1819,40 @@ secure. +\begin{color}{red} +\subsection{Practical Security Evaluation} + +Suppose now that the PRNG will work during +$M=100$ time units, and that during this period, +an attacker can realize $10^{12}$ clock cycles. +We thus wonder whether, during the PRNG's +lifetime, the attacker can distinguish this +sequence from truly random one, with a probability +greater than $\varepsilon = 0.2$. +We consider that $N$ has 900 bits. + +The random process is the BBS generator, which +is cryptographically secure. More precisely, it +is $(T,\varepsilon)-$secure: no +$(T,\varepsilon)-$distinguishing attack can be +successfully realized on this PRNG, if~\cite{Fischlin} +$$ +T \leqslant \dfrac{L(N)}{6 N (log_2(N))\varepsilon^{-2}M^2}-2^7 N \varepsilon^{-2} M^2 log_2 (8 N \varepsilon^{-1}M) +$$ +where $M$ is the length of the output ($M=100$ in +our example), and $L(N)$ is equal to +$$ +2.8\times 10^{-3} exp \left(1.9229 \times (N ~ln(2)^\frac{1}{3}) \times ln(N~ln 2)^\frac{2}{3}\right) +$$ +is the number of clock cycles to factor a $N-$bit +integer. + +A direct numerical application shows that this attacker +cannot achieve its $(10^{12},0.2)$ distinguishing +attack in that context. + +\end{color} + \subsection{Toward a Cryptographically Secure and Chaotic Asymmetric Cryptosystem} \label{Blum-Goldwasser} We finish this research work by giving some thoughts about the use of @@ -1470,10 +1935,10 @@ namely the BigCrush. Furthermore, we have shown that when the inputted generator is cryptographically secure, then it is the case too for the PRNG we propose, thus leading to the possibility to develop fast and secure PRNGs using the GPU architecture. -Thoughts about an improvement of the Blum-Goldwasser cryptosystem, using the -proposed method, has been finally proposed. +\begin{color}{red} An improvement of the Blum-Goldwasser cryptosystem, making it +behaves chaotically, has finally been proposed. \end{color} -In future work we plan to extend these researches, building a parallel PRNG for clusters or +In future work we plan to extend this research, building a parallel PRNG for clusters or grid computing. Topological properties of the various proposed generators will be investigated, and the use of other categories of PRNGs as input will be studied too. The improvement of Blum-Goldwasser will be deepened. Finally, we