Code-Based Cryptography and Chaotic Maps as Pseudo-Random Bit Generator

Authors

  • Tayseer Karam Alshekly Department of Computer Science, Al-Imam Al-Adham University, Baghdad, Iraq
  • Ekhlas Abbas AlBahrani Department of Computer Science, Mustansiriyah University, Baghdad, Iraq
  • Leila Ben Ayed Department of Computer Science, University of Manouba, Tunisia
Volume: 15 | Issue: 6 | Pages: 29041-29048 | December 2025 | https://doi.org/10.48084/etasr.13718

Abstract

Random number generation is a fundamental requirement in cryptography, as the security of secret keys depends on their unpredictability. Yet, many existing Pseudo-Random Number Generators (PRNGs) face challenges such as limited key space, weak statistical performance, high computational cost, and vulnerability to post-quantum attacks. These limitations restrict their use in applications such as the Internet of Things (IoT), where both efficiency and strong security are needed. To address this problem, this paper presents a new PRNG that combines Code-based Cryptography (CBC) with a 3D logistic chaotic map. Chaotic maps provide sensitivity to initial conditions and a large key space, whereas code-based encryption offers resistance to quantum adversaries. The proposed scheme is based on the Cipher Feedback (CFB) mode, where chaotic outputs are converted into binary sequences and applied as key arrays. Due to its lightweight design, the generator is suitable for resource-constrained devices, such as IoT nodes. Experimental results show that the generated sequences pass the National Institute of Standards and Technology (NIST) statistical test suite with p-values between 0.98056 and 0.99944. Additional tests confirm low inter-sequence correlation (Pearson Correlation Coefficient (PCC) within -0.16591–0.14187), balanced Hamming distances (0.429–0.583), and favorable Sum of Absolute Differences (SAD ) results (0.3173–0.3849). Overall, the proposed PRNG achieves efficiency, scalability, and post-quantum security, making it a strong candidate for future cryptographic systems. 

Keywords:

Code-based Cryptography (CBC), 3D logistic map, Pseudo-Random Number Generator (PRNG), National Institute of Standards and Technology (NIST) test

Downloads

Download data is not yet available.

References

M. Farajallah, M. Abutaha, M. A. Joodeh, O. Salhab, and N. Jweihan, "Pseudo Random Number Generator Based on Look-up Table and Chaotic Maps," Journal of Theoretical and Applied Information Technology, vol. 98, no. 20, pp. 3130–3139, Oct. 2020.

M. François, D. Defour, and P. Berthomé, "A Pseudo-Random Bit Generator Based on Three Chaotic Logistic Maps and IEEE 754-2008 Floating-Point Arithmetic," in 11th Annual Conference on Theory and Applications of Models of Computation, Chennai, India, 2014, pp. 229–247. DOI: https://doi.org/10.1007/978-3-319-06089-7_16

D. Lambić and M. Nikolić, "Pseudo-random number generator based on discrete-space chaotic map," Nonlinear Dynamics, vol. 90, no. 1, pp. 223–232, Oct. 2017. DOI: https://doi.org/10.1007/s11071-017-3656-1

E. İnce, B. Karakaya, and M. Türk, "Chaos Based Pseudo Random Bit Generator Design and Its Application in Secure Image Encryption," Traitement du Signal, vol. 39, no. 5, pp. 1647–1653, Oct. 2022. DOI: https://doi.org/10.18280/ts.390522

A. T and V. R, "Pseudo Random Key Generator Using Fractal Based Trellis Coded Genetic Algorithm for Image Encryption," International Journal of Network Security & Its Applications, vol. 15, no. 3, pp. 23–32, May 2023. DOI: https://doi.org/10.5121/ijnsa.2023.15302

C. Banerjee, D. Datta, and D. Datta, "A Random Bit Generator Using Rössler Chaotic System," in 1st International Conference on Computational Advancement in Communication Circuits and Systems, Kolkata, India, 2014, pp. 81–87. DOI: https://doi.org/10.1007/978-81-322-2274-3_10

E. A. Albahrani and T. K. Alshekly, "A New Key Stream Generator Based on 3D Henon map and 3D Cat map," International Journal of Scientific & Engineering Research, vol. 8, no. 1, pp. 2114–2120, Jan. 2017.

G. Narayanan, R. Narayanan, N. Haneef, N. B. Chittaragi, and S. G. Koolagudi, "A Novel Approach to Video Steganography using a 3D Chaotic Map," in TENCON 2019 - 2019 IEEE Region 10 Conference, Kochi, India, 2019, pp. 955–959. DOI: https://doi.org/10.1109/TENCON.2019.8929347

R. Overbeck and N. Sendrier, "Code-based cryptography," in Post-Quantum Cryptography, D. J. Bernstein, J. Buchmann, and E. Dahmen, Eds. Berlin, Heidelberg, Germany: Springer, 2009, pp. 95–145. DOI: https://doi.org/10.1007/978-3-540-88702-7_4

A. Rukhin et al., "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications," National Institute of Standards and Technology, NIST Special Publication (SP) 800-22 Rev. 1, Apr. 2010.

V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud, "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," Optics Communications, vol. 284, no. 19, pp. 4331–4339, Sep. 2011. DOI: https://doi.org/10.1016/j.optcom.2011.05.028

L. F. Jalil, H. H. Saleh, and E. A. Albhrany, "New Pseudo-Random Number Generator System Based on Jacobian Elliptic maps and Standard Map," Iraqi Journal of Computers, Communications, Control and Systems Engineering, vol. 15, no. 3, pp. 77–89, Nov. 2015.

W. Alexan, N. H. E. Shabasy, N. Ehab, and E. A. Maher, "A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations," Scientific Reports, vol. 15, no. 1, Aug. 2025, Art. no. 31246. DOI: https://doi.org/10.1038/s41598-025-15794-z

Z. A. Mohammed and K. A. Hussein, "PILEA, an Advanced Hybrid Lightweight Algorithm utilizing Logical Mathematical Functions and Chaotic Systems," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16260–16265, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7799

T. S. Ali and R. Ali, "A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box," Multimedia Tools and Applications, vol. 81, no. 15, pp. 20585–20609, Jun. 2022. DOI: https://doi.org/10.1007/s11042-022-12268-6

T. A. Al-Maadeed, I. Hussain, A. Anees, and M. T. Mustafa, "A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes," Multimedia Tools and Applications, vol. 80, no. 16, pp. 24801–24822, Jul. 2021. DOI: https://doi.org/10.1007/s11042-021-10695-5

F. Yu, X. Gong, H. Li, and S. Wang, "Differential cryptanalysis of image cipher using block-based scrambling and image filtering," Information Sciences, vol. 554, pp. 145–156, Apr. 2021. DOI: https://doi.org/10.1016/j.ins.2020.12.037

F. J. Farsana, V. R. Devi, and K. Gopakumar, "An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams," Applied Computing and Informatics, vol. 19, no. 3–4, pp. 239–264, Aug. 2020. DOI: https://doi.org/10.1016/j.aci.2019.10.001

M. Gabr et al., "Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem," Symmetry, vol. 14, no. 12, Dec. 2022, Art. no. 2559. DOI: https://doi.org/10.3390/sym14122559

Downloads

How to Cite

[1]
T. K. Alshekly, E. A. AlBahrani, and L. B. Ayed, “Code-Based Cryptography and Chaotic Maps as Pseudo-Random Bit Generator”, Eng. Technol. Appl. Sci. Res., vol. 15, no. 6, pp. 29041–29048, Dec. 2025.

Metrics

Abstract Views: 355
PDF Downloads: 235

Metrics Information