1 \chapter{Conclusions and Future Work}
2 \label{Conclusions and Future Work}
6 Chaos, being a special class of nonlinear dynamics, has aroused a lot of interests since its
7 discovery. It is well-known with its distinct characteristics, such as the exhibition of
8 random-like behaviors, the sensitive dependence on initial conditions and control parameters,
9 the ergodic and mixing nature, and so on.
10 Recently, many research works have been witnessed where the chaotic dynamics are
11 applied for cryptographical applications and designs. Being a major element in cryptography,
12 the nature of randomness and chaos have been related, and the blossom of chaos-based
13 random number generators and cryptographical systems is observed, even though it causes
14 considerable controversy to comment that chaos is a very good candidate.
15 In most of the designs, the generation of chaos is obtained by a recurrence relationship
16 or a set of state differential equations, in which perfect model is assumed. It always requires a
17 continuous space domain so that the actual chaotic dynamics can be observed. However, this
18 compact space domain implies the use of real-number or infinite bit representation in system
20 In this paper, a family of pseudorandom generators called CI PRNGs is detailed and evaluated.
21 The generation of pseudorandom numbers is realized by combining two well-known PRNGs with chaotic iterations.
22 By doing so, we obtain fast generators which additionally satisfy chaotic properties.
23 In addition to passing the NIST and DieHARD tests suites, some generators in this family successfully pass all the stringent TestU01 battery of tests.
24 The randomness and disorder generated by these algorithms have been evaluated, leading to the conclusion that these generators possess properties such that they can be considered as candidates for a large variety of applications in computer science security field.
25 An application example in this field is finally given at the end of this paper.
30 In future work, we will continue to improve the speed and security of this family of PRNGs, by exploring new strategies and iteration functions.
31 Their chaotic behavior will be studied more deeply by using various tools provided by the mathematical theory of chaos.
32 New statistical tests will be used to compare these PRNGs to existing ones.
33 Additionally a probabilistic study of their security will be done.
34 Lastly, new applications in computer science will be proposed, as in the Internet security field.