Code-Based Cryptography and Chaotic Maps as Pseudo-Random Bit Generator
Received: 29 July 2025 | Revised: 27 August 2025 and 8 September 2025 | Accepted: 11 September 2025 | Online: 8 December 2025
Corresponding author: Tayseer Karam Alshekly
Abstract
Random number generation is a fundamental requirement in cryptography, as the security of secret keys depends on their unpredictability. Yet, many existing Pseudo-Random Number Generators (PRNGs) face challenges such as limited key space, weak statistical performance, high computational cost, and vulnerability to post-quantum attacks. These limitations restrict their use in applications such as the Internet of Things (IoT), where both efficiency and strong security are needed. To address this problem, this paper presents a new PRNG that combines Code-based Cryptography (CBC) with a 3D logistic chaotic map. Chaotic maps provide sensitivity to initial conditions and a large key space, whereas code-based encryption offers resistance to quantum adversaries. The proposed scheme is based on the Cipher Feedback (CFB) mode, where chaotic outputs are converted into binary sequences and applied as key arrays. Due to its lightweight design, the generator is suitable for resource-constrained devices, such as IoT nodes. Experimental results show that the generated sequences pass the National Institute of Standards and Technology (NIST) statistical test suite with p-values between 0.98056 and 0.99944. Additional tests confirm low inter-sequence correlation (Pearson Correlation Coefficient (PCC) within -0.16591–0.14187), balanced Hamming distances (0.429–0.583), and favorable Sum of Absolute Differences (SAD ) results (0.3173–0.3849). Overall, the proposed PRNG achieves efficiency, scalability, and post-quantum security, making it a strong candidate for future cryptographic systems.
Keywords:
Code-based Cryptography (CBC), 3D logistic map, Pseudo-Random Number Generator (PRNG), National Institute of Standards and Technology (NIST) testDownloads
References
M. Farajallah, M. Abutaha, M. A. Joodeh, O. Salhab, and N. Jweihan, "Pseudo Random Number Generator Based on Look-up Table and Chaotic Maps," Journal of Theoretical and Applied Information Technology, vol. 98, no. 20, pp. 3130–3139, Oct. 2020.
M. François, D. Defour, and P. Berthomé, "A Pseudo-Random Bit Generator Based on Three Chaotic Logistic Maps and IEEE 754-2008 Floating-Point Arithmetic," in 11th Annual Conference on Theory and Applications of Models of Computation, Chennai, India, 2014, pp. 229–247. DOI: https://doi.org/10.1007/978-3-319-06089-7_16
D. Lambić and M. Nikolić, "Pseudo-random number generator based on discrete-space chaotic map," Nonlinear Dynamics, vol. 90, no. 1, pp. 223–232, Oct. 2017. DOI: https://doi.org/10.1007/s11071-017-3656-1
E. İnce, B. Karakaya, and M. Türk, "Chaos Based Pseudo Random Bit Generator Design and Its Application in Secure Image Encryption," Traitement du Signal, vol. 39, no. 5, pp. 1647–1653, Oct. 2022. DOI: https://doi.org/10.18280/ts.390522
A. T and V. R, "Pseudo Random Key Generator Using Fractal Based Trellis Coded Genetic Algorithm for Image Encryption," International Journal of Network Security & Its Applications, vol. 15, no. 3, pp. 23–32, May 2023. DOI: https://doi.org/10.5121/ijnsa.2023.15302
C. Banerjee, D. Datta, and D. Datta, "A Random Bit Generator Using Rössler Chaotic System," in 1st International Conference on Computational Advancement in Communication Circuits and Systems, Kolkata, India, 2014, pp. 81–87. DOI: https://doi.org/10.1007/978-81-322-2274-3_10
E. A. Albahrani and T. K. Alshekly, "A New Key Stream Generator Based on 3D Henon map and 3D Cat map," International Journal of Scientific & Engineering Research, vol. 8, no. 1, pp. 2114–2120, Jan. 2017.
G. Narayanan, R. Narayanan, N. Haneef, N. B. Chittaragi, and S. G. Koolagudi, "A Novel Approach to Video Steganography using a 3D Chaotic Map," in TENCON 2019 - 2019 IEEE Region 10 Conference, Kochi, India, 2019, pp. 955–959. DOI: https://doi.org/10.1109/TENCON.2019.8929347
R. Overbeck and N. Sendrier, "Code-based cryptography," in Post-Quantum Cryptography, D. J. Bernstein, J. Buchmann, and E. Dahmen, Eds. Berlin, Heidelberg, Germany: Springer, 2009, pp. 95–145. DOI: https://doi.org/10.1007/978-3-540-88702-7_4
A. Rukhin et al., "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications," National Institute of Standards and Technology, NIST Special Publication (SP) 800-22 Rev. 1, Apr. 2010.
V. Patidar, N. K. Pareek, G. Purohit, and K. K. Sud, "A robust and secure chaotic standard map based pseudorandom permutation-substitution scheme for image encryption," Optics Communications, vol. 284, no. 19, pp. 4331–4339, Sep. 2011. DOI: https://doi.org/10.1016/j.optcom.2011.05.028
L. F. Jalil, H. H. Saleh, and E. A. Albhrany, "New Pseudo-Random Number Generator System Based on Jacobian Elliptic maps and Standard Map," Iraqi Journal of Computers, Communications, Control and Systems Engineering, vol. 15, no. 3, pp. 77–89, Nov. 2015.
W. Alexan, N. H. E. Shabasy, N. Ehab, and E. A. Maher, "A secure and efficient image encryption scheme based on chaotic systems and nonlinear transformations," Scientific Reports, vol. 15, no. 1, Aug. 2025, Art. no. 31246. DOI: https://doi.org/10.1038/s41598-025-15794-z
Z. A. Mohammed and K. A. Hussein, "PILEA, an Advanced Hybrid Lightweight Algorithm utilizing Logical Mathematical Functions and Chaotic Systems," Engineering, Technology & Applied Science Research, vol. 14, no. 5, pp. 16260–16265, Oct. 2024. DOI: https://doi.org/10.48084/etasr.7799
T. S. Ali and R. Ali, "A novel color image encryption scheme based on a new dynamic compound chaotic map and S-box," Multimedia Tools and Applications, vol. 81, no. 15, pp. 20585–20609, Jun. 2022. DOI: https://doi.org/10.1007/s11042-022-12268-6
T. A. Al-Maadeed, I. Hussain, A. Anees, and M. T. Mustafa, "A image encryption algorithm based on chaotic Lorenz system and novel primitive polynomial S-boxes," Multimedia Tools and Applications, vol. 80, no. 16, pp. 24801–24822, Jul. 2021. DOI: https://doi.org/10.1007/s11042-021-10695-5
F. Yu, X. Gong, H. Li, and S. Wang, "Differential cryptanalysis of image cipher using block-based scrambling and image filtering," Information Sciences, vol. 554, pp. 145–156, Apr. 2021. DOI: https://doi.org/10.1016/j.ins.2020.12.037
F. J. Farsana, V. R. Devi, and K. Gopakumar, "An audio encryption scheme based on Fast Walsh Hadamard Transform and mixed chaotic keystreams," Applied Computing and Informatics, vol. 19, no. 3–4, pp. 239–264, Aug. 2020. DOI: https://doi.org/10.1016/j.aci.2019.10.001
M. Gabr et al., "Application of DNA Coding, the Lorenz Differential Equations and a Variation of the Logistic Map in a Multi-Stage Cryptosystem," Symmetry, vol. 14, no. 12, Dec. 2022, Art. no. 2559. DOI: https://doi.org/10.3390/sym14122559
Downloads
How to Cite
License
Copyright (c) 2025 Tayseer Karam Al-Shekly, Ekhlas Abbas Al-Bahrani, Leila Ben Ayed

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors who publish with this journal agree to the following terms:
- Authors retain the copyright and grant the journal the right of first publication with the work simultaneously licensed under a Creative Commons Attribution License that allows others to share the work with an acknowledgement of the work's authorship and initial publication in this journal.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgement of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) after its publication in ETASR with an acknowledgement of its initial publication in this journal.
