We propose a fully photonics-based approach for ultrafast physical random bit generation. This approach exploits a compact nonlinear loop mirror (called a terahertz optical asymmetric demultiplexer, TOAD) to sample the chaotic optical waveform in an all-optical domain and then generate random bit streams through further comparison with a threshold level. This method can efficiently overcome the electronic jitter bottleneck confronted by existing RBGs in practice. A proof-of-concept experiment demonstrates that this method can continuously extract 5 Gb/s random bit streams from the chaotic output of a distributed feedback laser diode (DFB-LD) with optical feedback. This limited generation rate is caused by the bandwidth of the used optical chaos.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1364/OL.41.003347 | DOI Listing |
This paper proposes a covert chaotic encryption (CCE) scheme based on compressive sensing (CS). The chaotic sequences used are generated by a six-dimensional hyper-chaotic D-system, where the sequence is utilized for a chaotic index sparse block (CISB), the sequence is used for generating the CS measurement matrix effectively, the , , and sequences are employed for variable-parameter iterative Arnold transformations, and the sequence is used for dual-random least significant bit (LSB) scrambling and embedding. The combination of these technologies enabled the scheme to achieve multi-domain, multi-dimensional, ultra-high-security encryption for multimedia image data.
View Article and Find Full Text PDFEntropy (Basel)
January 2025
School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China.
With the increasing importance of securing images during network transmission, this paper introduces a novel image encryption algorithm that integrates a 3D chaotic system with V-shaped scrambling techniques. The proposed method begins by constructing a unique 3D chaotic system to generate chaotic sequences for encryption. These sequences determine a random starting point for V-shaped scrambling, which facilitates the transformation of image pixels into quaternary numbers.
View Article and Find Full Text PDFEntropy (Basel)
January 2025
Centro Atómico Bariloche and Instituto Balseiro, Comisión Nacional de Energía Atómica, Universidad Nacional de Cuyo, Av. E. Bustillo 9500, San Carlos de Bariloche 8400, Argentina.
We study the structural properties of networks formed by random sets of bit strings-namely the ordered arrays of binary variables representing, for instance, genetic information or cultural profiles. Two bit strings are connected by a network link when they are sufficiently similar to each other, i.e.
View Article and Find Full Text PDFEntropy (Basel)
January 2025
Electrical Engineering College, Heilongjiang University, Harbin 150080, China.
In recent years, many chaotic image encryption algorithms have been cracked by chosen plaintext attack. Therefore, the method of associating the key with the plaintext to resist the cryptanalysis has received extensive attention from designers. This paper proposes a new method of cryptanalysis for image encryption algorithms with a key associated with plaintext.
View Article and Find Full Text PDFEntropy (Basel)
December 2024
Faculty of Computing and Telecommunications, Poznań University of Technology, 60-965 Poznań, Poland.
In this paper, we propose a method to enhance the performance of a random number generator (RNG) that exploits ring oscillators (ROs). Our approach employs additional phase detectors to extract more entropy; thus, RNG uses fewer resources to produce bit sequences that pass all statistical tests proposed by National Institute of Standards and Technology (NIST). Generating a specified number of bits is on-demand, eliminating the need for continuous RNG operation.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!