You are on page 1of 16

Chaos-Based

Cryptography:
A Brief Overview
by Ljupčo Kocarev*

Abstract—In this brief article, chaos-


based cryptography is discussed from
a point of view which I believe is closer
to the spirit of both cryptography and
chaos theory than the way the subject
has been treated recently by many re-
searchers. I hope that, although this
paper raises more questions than pro-
vides answers, it nevertheless contains
seeds for future work.

1531-636X/10/$10.00©2001IEEE

6
posed methods generate cryptographi-
Introduction cally weak and slow algorithms.
Over the past decade, there has Cryptography is generally ac-
been tremendous interest in studying knowledged as the best method of data
the behavior of chaotic systems. They protection against passive and active
are characterized by sensitive depen- fraud [3]. An overview of recent devel-
dence on initial conditions, similarity opments in the design of conventional
to random behavior, and continuous cryptographic algorithms is given in
broad-band power spectrum. Chaos [4]. The main conclusion of the paper
has potential applications in several can be summarized in the following
functional blocks of a digital commu- quote:
nication system: compression, encryp-
tion and modulation. The possibility “It is quite clear that someone
for self-synchronization of chaotic os- with a good understanding of
cillations [1] has sparked an avalanche present day cryptanalysis can de-
of works on application of chaos in sign secure but slow algorithms
cryptography. An attempt only to men- with very little effort:
tion all related papers on chaos and For a block cipher, it is sufficient
cryptography in this short presentation to define a round function based on
will result in a prohibitively long list; a nonlinear operation (avoid lin-
and, therefore, we refer the reader to ear rotations) and a simple mixing
some recent work [2]. Despite a huge component (to spread local
number of papers published in the field changes); add round keys in be-
of chaos-based cryptography, the im- tween the rounds (and at the begin-
pact that this research has made on ning and the end of the cipher),
conventional cryptography is rather which are derived in a complex
marginal. This is due to two reasons: way from the key (e.g., by using the
• First, almost all chaos-based crypto- block cipher itself with fixed round
graphic algorithms use dynamical keys). If the number of rounds is
systems defined on the set of real 32, or even better 64, breaking this
numbers, and therefore are difficult slow cipher will be very difficult.
for practical realization and circuit (Of course it is possible to follow
implementation. this “recipe” and to come up with
• Second, security and performance of a weak cipher, but this will require
almost all proposed chaos-based some cryptographic skills!).”
methods are not analyzed in terms of
the techniques developed in cryptog- Unfortunately many researchers in
raphy. Moreover, most of the pro- chaos-based cryptography, while rush-
ing to publish a novel cryptographic
* This work was supported in part by the ARO algorithm, do not follow the above
(grant DAAG55-98-1-0269, MURI Project “Digi- recipe and come up, although without
tal Communication Devices Based on Nonlinear
Dynamics and Chaos”), by the DOE (grant DE-
any cryptographic skills, with both
FG03-95ER14516), and by ST Microelectronics. weak and slow ciphers. For example,
The author is with the Institute for Nonlinear Sci- in an algorithm proposed in [5] each
ence, University of California, San Diego, 9500
Gilman Drive, La Jolla, CA 92093-0402. E-mail:
character of the message is encrypted
lkocarev@ucsd.edu. as the integer number of iterations per-

7
formed in the logistic equation. This the two scientific areas lies in the fact
results in a weak and slow cipher. In- that the systems used in cryptography
deed, while in conventional crypto- work on a finite set, while those ap-
graphic ciphers the number of rounds plied in chaos have meaning only on
(iterations) performed by an encryp- a continuum. The main aim of this
tion transformation is usually less than short communication is to discuss pos-
32, in [5] this number can be as large sible connections between chaos and
as 65536, and is always larger then cryptography and to point out some
250. On the other hand the algorithm directions for future research.
is also weak: it can be easily broken
using known-plaintext attack [6]. Preliminaries
The author of this note strongly We assume that the reader is famil-
believes that the research on chaos- iar with chaos theory†. In order to make
based cryptography should be shifted this paper self-contained we now
from the ad hoc design of algorithms briefly describe three most common
that are usually weak and slow, and cryptographic objects (called also
therefore not comparable with conven- primitives): block-encryption algo-
tional algorithms, toward better under- rithms (private-key algorithms),
standing of possible relationships be- pseudo-random number generators
tween chaos and cryptography. Many (additive stream ciphers) and crypto-
fundamental concepts in chaos theory graphic hash functions. The complete
such as mixing, measure preserving description of these primitives and
transformations and sensitivity have their properties can be found in [4].
been already applied for a long time in Block ciphers transform a rela-
cryptography. Almost 15 years before tively short string (typically 64 or 128
the dawn of chaos, Shannon in his bits) to a string of the same length un-
masterpiece wrote [7]: der control of a secret key. A block-
encryption algorithm is usually written
“Good mixing transformations in the form of a mapping x n + 1 =
are often formed by repeated prod- E(xn, z), n = 0, …, k – 1, where the
ucts of two simple non-commuting plaintext x0, the cryptogram xk and the
operations. Hopf has shown, for secret key z are sequences of letters in
example, that pastry dough can be finite alphabets. The advantage of
mixed by such a sequence of op- block ciphers is that they form a
erations. The dough is first rolled flexible tool that can be used in cryp-
out into a thin slab, then folded tography: they can be used to construct
over, then rolled, and then folded other primitives.
again, etc. . . . A pseudo-random number genera-
In a good mixing transforma- tor is a deterministic method, usually
tion . . . functions are complicated, described with a mapping, to produce
involving all variables in a sensi- from a small set of “random” numbers,
tive way. A small variation of any called the seed, a larger set of random-
one (variable) changes (the out- looking numbers called pseudo-ran-
puts) considerably.” dom numbers. The pseudo-random

A deep relation between chaos and † Editor’s comment: See “Nonlinear Dynamics of
Discrete-Time Electronic Systems” by Orla Feely,
cryptography has not been established March 2000 IEEE CAS Newsletter, http://
yet. An important difference between www.nd.edu/~stjoseph/newscas.

8
number generator is cryptographically
secure if, given the mapping that Chaotic Cryptographic
defines the generator and an arbitrary systems algorithms
sequence of numbers generated by the
generator, but not knowing the seed of
the generator, it is hard to compute the
next and the previous numbers in the Phase space: Phase space:
(sub)set of real finite set
sequence. numbers of integers
A one-way function H operates on
an arbitrary-length pre-image message
M and returns a fixed-length value, h,
h = H(M), such that given M it is easy
to compute h, given h it is hard to com- Iterations Rounds
pute M, and it is hard to find two dif-
ferent inputs with the same hash result.
Note that the above definitions are only
informal and to some level useless
without defining the word “hard”. This
Parameters Key
may be related to the question of when
a cryptographic object is secure which
at popular level is discussed in the sec-
Sensitivity to a change
tion Cryptography from an Informa-
tion-Theory Point of View. However,
in initial conditions Diffusion
and parameters
we should stress that primitives which
are probable secure (based on some
reasonable assumptions) are several
Security
orders of magnitude slower than the
fastest algorithms currently in use. ? and
performance
Figure 1 summarizes similarities
and differences between chaotic maps
and cryptographic algorithms. Chaotic Figure 1. Similarities and differences between chaotic systems and
cryptographic algorithms.
maps and cryptographic algorithms (or
more generally maps defined on finite
sets) have some similar properties: on finite sets, while chaos has mean-
sensitivity to a change in initial con- ing only on real numbers. Moreover,
ditions and parameters, random-like for the time being, the notions of cryp-
behavior and unstable periodic orbits tographic security and performance of
with long periods. Encryption rounds cryptographic algorithms have no
of a cryptographic algorithm lead to counterpart in chaos theory.
the desired diffusion and confusion We now illustrate with two simple
properties of the algorithm. Iterations examples the similarities and differ-
of a chaotic map spread the initial re- ences between chaotic systems and
gion over the entire phase space. The maps defined on finite sets. As an ex-
parameters of the chaotic map may ample of a chaotic map we consider
represent the key of the encryption al- the shift map,
gorithm. An important difference be-
x(t + 1) = ax(t) (mod 1) (1)
tween chaos and cryptography is that
encryption transformations are defined where the phase space X = [0, 1] is the

9
unit interval and a > 1 is an integer. In value of PN. The answer is unknown
other words, (1) is a shift over a sym- and is related to a class of number
bols. The resulting dynamics mirrors theoretical problems, centered around
the properties of the digits in base a of the so-called Artin’s conjecture (see [8]
the numbers in the unit interval. The and references therein). Computing
map is chaotic for all a > 1 with posi- typical values of some quantity calls
tive Lyapunov exponent. for ergodic theory. This example
A variety of functions and/or dis- shows the difficulties in developing an
crete-time systems have been proposed ergodic theory of finite phase space dy-
for use in cryptography: in all of them namical systems. On the other hand,
the phase space of the corresponding the ergodic theory of the map (1) is
mapping is a finite set of integers and much simpler.
all the parameters are integers. The The Lyapunov exponent (LE) of
simplest example is the discrete phase- the system (2) is trivially equal to 0,
space version of the shift map (1): because every orbit is eventually peri-
odic and will repeat itself. Therefore,
p(t + 1) = ap(t) (mod N) (2)
the central problem here is to estimate
where a > 1, N, and p are integers, LE of a typical orbit for time not ex-
and p ∈ {0, 1, …, N – 1}. If N is co- ceeding its period. The analysis of pe-
prime to a the map (2) is invertible; riodic orbits depends crucially on the
note that the shift map (1) is not invert- ordering with which the orbits are con-
ible for all a. All trajectories in finite sidered. Two orderings, both corre-
phase space dynamical systems are sponding to Lebesgue measure, are
eventually periodic. Therefore, one considered in the literature: ordering
may introduce the period functions PN according to the system size N, and
to characterize the least period of the ordering according to the minimal pe-
map F, that is FP is identity and PN is
N
riod PN and then lexicographically
minimal, as a function of the system within the same period. In the case of
size N. As a rule, these functions are the map (2), with a = 2, two different
among the most complex objects orderings lead to two opposite an-
found in discrete-time dynamical sys- swers: ordering by system size yields
tems with finite set phase space. To logarithmic compressibility of infor-
show this we consider, as an example, mation and zero finite-time LE (or lack
the map (2), with a = 2. PN has two of randomness) [9], while ordering by
extreme values, the smallest being the minimal period leads to positive
[log log N] + 1, which occurs for N = finite-time LE and randomness [8].
2k – 1, and the largest N – 1, which
occurs for prime values of N and for Choosing a Chaotic Map
which 2 is a generator of the multipli- Dynamical systems with chaos
cative group U(N). However, the main seem to be good candidates for encryp-
question remains what is the typical tion algorithms. Indeed, because

10
Two general principles which guide
the design of practical algorithms are
diffusion and confusion. Diffusion
block-encryption algorithms can be re- means spreading out of the influence
written as discrete-time dynamical sys-
tems, x n + 1 = F(x n) where the initial
of a single plaintext digit over many
condition x0 is plain-text to be en- ciphertext digits so as to hide the sta-
crypted, and the final state x k is a tistical structure of the plaintext. An
ciphertext, then it is the property of the
map being chaotic that implies
extension of this idea is to spread the
“spreading out of the influence of a influence of a single key digit over
single plaintext digit over many many digits of ciphertext. Confusion
ciphertext digits”. To ensure a compli-
cated structure of trajectories of the
means use of transformations which
dynamical system proposed for an en- complicate dependence of the statis-
cryption algorithm, we postulate that, tics of ciphertext on the statistics of
except being chaotic, the system
should be mixing (more precisely K-
plaintext.
mixing). Moreover, to ensure that the
parameters of the system can be used as two measurable sets A1 and A2, we
encryption keys, we postulate that the have lim n → ∞ µ ( F – n A 1 ∩ A 2 ) =
system has robust chaos, that is, the sys- µ ( A 1 ) µ ( A 2 ) [10]. In other words, any
tem is chaotic for a large set of param- set of initial conditions of nonzero
eters. We now explain the effect of K- measure will eventually spread over
mixing and robust chaos on encryption. the whole phase space as the system
Two general principles which evolves [10]. If we think of the set of
guide the design of practical algo- possible (sensible) plaintexts as an ini-
rithms are diffusion and confusion. tial region in the phase space of the
Diffusion means spreading out of the map (transformation), then it is the
influence of a single plaintext digit mixing property (or in other terms,
over many ciphertext digits so as to sensitivity to initial conditions) that
hide the statistical structure of the implies “spreading out of the influence
plaintext. An extension of this idea is of a single plaintext digit over many
to spread the influence of a single key ciphertext digits”.
digit over many digits of ciphertext. Mixing systems have also the fol-
Confusion means use of transforma- lowing useful property [10]: if µ0 is
tions which complicate dependence of arbitrary measure (normalized and ab-
the statistics of ciphertext on the sta- solutely continuous with respect to µ),
tistics of plaintext. The mixing prop- and µn = µ0(F – n A), then µn(A) → µ(A)
erty of chaotic maps is closely related for any measurable A. Thus we can say
to the property of diffusion in encryp- that in dynamical systems with the
tion transformations (algorithms). The mixing property, any non-equilibrium
system F possesses the mixing prop- distribution tends to an equilibrium. In
erty (or simply, is mixing), if for any other words, in the limit when the

11
Chaos-Based Cryptography:
A Brief Overview
number of iterations tends to infinity, in smooth systems, while structurally
the statistics of the ciphertext (com- stable chaos can occur in piece-wise
puted through the invariant measure) smooth maps [12].
do not depend on the statistics of the One should consider only systems
plaintext (which correspond to the ini- that have robust chaos for a large set
tial region in the phase space of the map). of parameters (keys). The entropy of
A good encryption algorithm a crypto-system is the measure of the
spreads also the influence of a single size of the key-space and is usually ap-
key digit over many digits of proximated by log2 K, where K is the
ciphertext. The keys of an encryption number of keys. Therefore, a larger pa-
algorithm represent its parameters. rameter space of the dynamical system
Therefore, we should consider only implies that its discretized version will
such transformations in which both have larger K.
parameters and variables are involved
in a sensitive way, that is “a small Chaos from an Information-
variation of any one” (variable, param- Theory Point of View
eter) “changes the outputs consider- Chaos theory, as a branch of the
ably”. In other words, a kind of “mix- theory of nonlinear dynamical sys-
ing property” should hold also in the tems, has brought to our attention a
parameter space of the map, if we somewhat surprising fact: low-dimen-
would like to use chaotic maps as en- sional dynamical systems are capable
cryption algorithm. This implies that of complex and unpredictable behav-
we consider only the maps for which ior. What is the origin of chaos in de-
chaos is persistent under small pertur- terministic systems?
bations of parameters (keys). For simplicity we consider here a
A dynamical system is structurally discrete-time dynamical system de-
1
stable when small C perturbations fined by iteration of the function

yield a topologically equivalent sys- F: X → X, X — RN. The set of points
2
tem. In another words, a structurally {x, F(x), F (x), …} is called a trajec-
stable or robust system retrains its tory (or orbit) of the initial condition
qualitative properties under small per- x. We assume that F has a chaotic
turbations. Robust or structurally attractor. Informally, an attractor is
stable chaotic attractors can, eventu- called chaotic if the motion on it is un-
ally, ensure the diffusion property in predictable: two nearby states on the
the key space. Algorithms based on attractor have different and unrelated
non-robust systems may have weak behavior within the attractor.
keys. However, the majority of chaotic The evolution of a deterministic
attractors are structurally unstable [11]. system is completely determined by
Therefore, one should take great cau- the vector field F and the initial con-
tion in choosing chaotic maps. It is dition x. However, to specify com-
known that robust chaos cannot occur pletely the initial condition an infinite

12
Choosing a Mixing and/or
chaotic map exact maps

Introducing the Structurally


parameters stable systems

The result
Discretization should be a
1-to-1 mapping.

Prove (or check very


carefully) the
resistance to
differential and
linear attacks.

Check for the extensions Figure 2. A procedure for a design


and generalizations of a chaos-based block-encryption
of differential and algorithm.
linear attacks.
Security
evaluation
Take into account several
dedicated attacks applicable
to cipher with a small
number of rounds.

Proving and checking that


resistance to these
attacks does not imply that
the cipher is secure:
other attacks may exist.

"Someone with a good


understanding of present
Performance day cryptanalysis can
design secure but slow
evaluation algorithms with very
little effort".

13
amount of information and a measur- (denoted by hKS ) is the measure of as-
ing system with an infinite precision ymptotic rate of creation of informa-
are required, which are both intrac- tion by iterating F. Systems with posi-
table. What are the effects of a mea- tive entropy are usually considered as
suring system’s finite precision? Mea- chaotic. The unpredictability of cha-
suring an initial (and future) state is otic trajectories is caused by exponen-
equivalent to partitioning the state tial separation of nearby points.
space into a finite number of regions, Unpredictability means uncertainty;
and observing the evolution in this therefore, one should expect that the
macroscopic world. Any set of a finite entropy of a dynamical system is re-
number of disjoint regions which lated to its positive Lyapunov expo-
cover the state space is called a parti- nents. This deep mathematical result
tion of the system. The process of par- (known as the Pesin theorem [13]) is
titioning the state space, assigning rigorously proven only for so called
symbols to every region from the par- Sinai-Ruelle-Bowen measure.
tition, and the resulting macroscopic From the viewpoint of any measur-
dynamics are called symbolic dynamics. ing device, if the dynamical system
If the system is chaotic, then dif- produces unpredictable sequences,
ferent initial states belonging to the then the dynamical system is called
same region will produce different ob- chaotic. While the motion of the dy-
servations at some later time. From the namical system in the continuous (mi-
viewpoint of our measuring system, croscopic) state space is deterministic,
identical macroscopic initial states its motion in the partitioned (macro-
evolve differently. A loss of determin- scopic) space is stochastic and the tra-
ism occurred, and transitions between jectories are sequences of symbols. On
the regions of the partition can only be the basis of the knowledge of the past
specified by means of probabilities. coarse-grained trajectory of the system
Partitioning of the state space turns the we can predict its future macroscopic
deterministic chaotic system into an states only in probabilistic terms. Turn-
ergodic information source which can ing a deterministic chaotic system into
be analyzed in terms of information an information source via partitioning
theory. The Kolmogorov-Sinai entropy of the state space is not in collision

Ljupčo Kocarev is associate research scientist at the Institute for Nonlinear Science at the University of Califor-
nia, San Diego. He has been working in all aspects of nonlinear sciences since 1986. He is now interested in relation-
ships between chaos theory, coding theory, and cryptography. L. Kocarev has authored more than 60 journal articles
in various international journals, including Chaos: An Interdisciplinary Journal of Nonlinear Science; Chaos, Soli-
tons, and Fractals; Geophysical Research Letters; International Journal of Bifurcation and Chaos; International
Journal of Circuit Theory and Application; IEEE Transactions on Circuits and Systems, Part I: Fundamental Theory
and Applications; IEEE Transactions on Circuits and Systems, Part II: Analog and Digital Signal Processing; IEICE
Transactions on Fundamentals and Electronics, Communications and Computer Science; Journal of Applied Mathematics
and Mechanics; Journal of Circuits, Systems and Computers; Journal of Physics A: Mathematical and General Physics;
Journal of the Franklin Institute; Physica D; Physical Review E; Physical Review Letters; and Physics Letters A.

14
The publication in 1949 by C. E. Shannon of the paper “Communication
Theory of Secrecy Systems” [7] ushered in the era of scientific secret-key cryp-
tography. Shannon provided a theory of secrecy systems almost as compre-
hensive as the theory of communication that he had published a year before.
Indeed, he built his 1949 paper on the foundation of the 1948 one, which had
established the new discipline of information theory [14].

with Shannon’s note [14] that a deter- jectories of a dynamical system; for
ministic system cannot generate infor- example a dynamical system with a
mation. Actually, a chaotic system stable equilibrium would contradict
does not generate information, that is, such a conjecture. What is the source
its evolution is completely determined of the unpredictability and information
by its initial state. A chaotic system generation of a chaotic behavior? The
merely converts the information about finite precision of any real measuring
its initial state into a form which is vis- system and the sensitive dependence
ible to the measuring system. Every of a chaotic evolution to a change in
letter in the coarse-grained trajectory, initial states combine to an inability for
which is a sequence of letters, brings long-term prediction of chaotic behav-
an additional amount of information ior.
about the initial state. Hopefully, this section resolves the
The word random in deterministic juxtaposition of three seemingly con-
dynamical systems is linked to incom- tradictory terms: “random”, “deter-
pressibility of information: a trajectory ministic” and “chaos”. Determinism of
of the system is termed random when the defining equations implies exist-
the shortest program that generates it ence and uniqueness of solutions, but
has (essentially) the same size as the it does not imply computability of so-
trajectory itself. The trajectory of a lutions. Chaoticity of the behavior im-
point x is called random if its algorith- plies random trajectories that are not
mic complexity is positive. The fol- computable by any finite computer
lowing theorem is of essential signifi- program. More on this relationship can
cance in this case [15]: For chaotic be found in the inspired papers by Jo-
systems the trajectories of almost all seph Ford [16, 17].
state points x ∈ X are random and their
algorithmic complexity is equal to the Cryptography from an
Kolmogorov-Sinai entropy hKS. As a Information-Theory Point of View
disturbing consequence, no finite com- Cryptography has come to be un-
puter program can produce or predict derstood to be the science of secure
a chaotic trajectory, or in the language communication. The publication in
of Joseph Ford [16], for any additional 1949 by C. E. Shannon of the paper
bit of the initial state, a computer pro- “Communication Theory of Secrecy
gram can output only one additional bit Systems” [7] ushered in the era of sci-
about the chaotic trajectory. entific secret-key cryptography. Shan-
Clearly, positive algorithmic com- non provided a theory of secrecy sys-
plexity of almost all initial states does tems almost as comprehensive as the
not suffice for the randomness of tra- theory of communication that he had

15
However, Shannon’s 1949 paper did not lead to the same explosion of re-
search in cryptography that his 1948 paper had triggered in information theory.
The real explosion came with the publication in 1976 by W. Diffie and M. E.
Hellman of their paper, “New Directions in Cryptography” [18]. Diffie and
Hellman showed for the first time that secret communication was possible
without any transfer of a secret key between sender and receiver, thus estab-
lishing the turbulent epoch of public-key cryptography.
published a year before. Indeed, he when unlimited computing power is
built his 1949 paper on the foundation available. However, computational
of the 1948 one, which had established cost may play a central role in cryptog-
the new discipline of information raphy, and, therefore, the classical in-
theory [14]. However, Shannon’s 1949 formation theory may not provide a
paper did not lead to the same explo- complete framework for the analysis
sion of research in cryptography that of cryptographic algorithms. After
his 1948 paper had triggered in infor- Diffie and Hellman proposed the use
mation theory. The real explosion of a trapdoor function as the corner-
came with the publication in 1976 by stone for a new form of cryptography,
W. Diffie and M. E. Hellman of their this deficiency was practically drama-
paper, “New Directions in Cryptogra- tized. Indeed, it may happen that al-
phy” [18]. Diffie and Hellman showed though the ciphertext contains all the
for the first time that secret communi- information about the plaintext, this
cation was possible without any trans- information is inaccessible, and there-
fer of a secret key between sender and fore cannot be efficiently computed.
receiver, thus establishing the turbulent Thus, the question in the beginning of
epoch of public-key cryptography. this paragraph should be replaced
Moreover, they suggested that compu- with: What is accessible information?
tational complexity theory might serve Can two successful theories, namely
as a basis for future research in cryp- Information Theory and Computa-
tography. Another line of research was tional Complexity Theory, be com-
established by A. C. Yao in 1982 [19] bined to capture the notion of acces-
in such a way as to preserve the origi- sible information? A. C. Yao in 1982
nal Shannon’s information-theory provided the affirmative answer to this
based approach to cryptography. question. Yao proposed the definition
What is information? The amount of computationally accessible infor-
of randomness in a probability distri- mation and used it to discuss security
bution is measured by its entropy (or for conventional cryptosystems,
information) which for a discrete prob- pseudo-random number generators,
ability distribution P is and trapdoor functions, subjects where
information and computational com-
H(P) = – ∑ p(x) log p(x)
plexity are closely intertwined.
where x runs over the atoms of P. In a The central question in cryptogra-
fundamental sense, the concept of in- phy is security. The basic properties
formation proposed by Shannon in his characterizing a secure object are “ran-
1948 paper captures only the case domness-increasing” and “computa-

16
tionally unpredictable”. It is well Yao [19] provided the basic insight
known that, if one of the following ob- on the nature of cryptographically se-
jects exist—a secure pseudo-random cure objects: it is the notion of
number generator, a secure one-way computationally unpredictable. The
function, and a secure block encryp- following informal definition of
tion algorithm—then all exist. The rig- computationally unpredictable is due
orous definitions for “randomness-in- to Blum, Blum and Shub [21]. We say
creasing” and “computationally unpre- that a pseudo-random number genera-
dictable” are far beyond the scope of tor is polynomial-time unpredictable if
this paper and we refer the reader to and only if for every finite initial seg-
[19]. The following informal defini- ment of a sequence that has been pro-
tions of “randomness-increasing” and duced by such a generator, but with
“computationally unpredictable” are any element deleted from that seg-
adopted from Largarias [20] and Blum, ment, a probabilistic Turing machine
Blum and Shub [21]. Without loss of cannot, roughly speaking, do better in
generality, in the following we con- guessing in polynomial time what the
sider only pseudo-random number missing element is, than by flipping a
generators. A pseudo-random bit (or fair coin. Yao proved that a pseudo-
number) generator is a deterministic random number generator is secure if
method (usually defined as a mapping and only if it is polynomial-time un-
G : M1 → M2, where Mi are finite sets) predictable.
to produce from a small set of random The central unsolved question in
bits (called the seed) a larger set of ran- the theory outlined above is whether a
dom-looking bits (called pseudo-ran- secure object exists. A major difficulty
dom bits). The notion of randomness- in settling the existence problem for
increasing is impossible in classical this theory is summarized in the fol-
information theory because any deter- lowing heuristic unpredictability para-
ministic mapping G applied to a dis- dox [19]: If a deterministic function is
crete probability distribution P never unpredictable, then it is difficult to
increases entropy, i.e., H(G(P)) ≤ H(P). prove anything about it, in particular,
However, this may be possible when it is difficult to prove that is unpredict-
computer power is limited. Indeed, able. Most of the results about
what may happen is that G(P) may ap- unpredictability and cryptographic se-
proximate a target distribution Q hav- curity follow from certain assumptions
ing a much higher entropy so well that, concerning the intractability of certain
within the limits of computing power number-theoretical problems by proba-
available, one cannot tell the distribu- bilistic polynomial-time procedures. For
tions G(P) and Q apart. If H(Q) is example, the statement that the x2 mod N
much larger than H(P), then we can generator is unpredictable is proven un-
say G is computationally randomness- der the so called quadratic residuacity
increasing. assumption; see [21] for details.

17
However, it may happen that when
Conclusion: What Is Next? computer power is limited the map-
We may summarize our discussion ping is computationally unpredictable:
in previous sections as follows. a probabilistic Turing machine cannot
(i) The word random in determin- do better in guessing in polynomial
istic dynamical systems is linked to in- time what is the next (previous) state
compressibility of information: a tra- of the trajectory, than by flipping a fair
jectory of the system is termed random coin. Whether and under what condi-
when the shortest program that gener- tions these two different properties of
ates it has (essentially) the same size being computationally unpredictable
as the trajectory itself. Determinism of can be related to each other is a cen-
the defining equations implies exist- tral problem of chaos-based cryptog-
ence and uniqueness of solutions, but raphy. The future impact chaos-based
it does not imply computability of so- cryptography may have on conven-
lutions. Chaoticity of the behavior im- tional cryptography depends strongly
plies random trajectories that are not on the successful solution of this prob-
computable by any finite computer lem. A good cryptographic algorithm
program. offers an optimal trade-off between
(ii) The amount of randomness in security and performance. Therefore,
a probability distribution is measured another important problem in chaos-
by its entropy. A deterministic map- based cryptography is whether chaos
ping applied to a discrete probability can offer improvements to the perfor-
distribution never increases entropy. mances of cryptographic algorithms.
However, a computationally random- In closing this paper, more detailed de-
ness-increasing deterministic mapping scriptions of the problems that are of
has the property that when computer importance for the future research on
power is limited it may increase the en- chaos-based cryptography will be of-
tropy of the distribution within the lim- fered.
its of computing power available. • Chaos and security—Chaos is a nec-
Equivalently we may say that this essary but not sufficient property of
mapping generates computationally encryption algorithms. In accor-
unpredictable sequences of numbers. dance with Shannon’s prescriptions
A deterministic mapping defined [7], every encryption algorithm pos-
on a (sub)set of real numbers may have sesses properties of confusion, diffu-
chaotic behavior; in this case the map- sion, mixing and sensitivity to
ping is computationally unpredictable: changes in plaintext and secret key.
a trajectory of the system is not com- This almost guarantees that an exten-
putable by any finite computer pro- sion of the domain of an encryption
gram. A deterministic mapping defined algorithm from a lattice to a con-
on a finite set is always predictable: all tinuum will give rise to a chaotic
its trajectories are eventually periodic. map. We have done the domain ex-

18
What is information? The amount of randomness in a probability dis-
tribution is measured by its entropy (or information) which for a discrete
probability distribution P is
H(P) = – ∑ p(x) log p(x)
where x runs over the atoms of P. In a fundamental sense, the concept of
information proposed by Shannon in his 1948 paper captures only the case
when unlimited computing power is available. However, computational cost
may play a central role in cryptography, and therefore the classical infor-
mation theory may not provide a complete framework for the analysis of
cryptographic algorithms.

tension for the round function of the its discrete version is a good crypto-
international data encryption algo- algorithm. It is a must that one
rithm (IDEA) [22, 23], and have nu- proves its cryptographic security. At
merically confirmed that the newly present, the notion of cryptographic
obtained map is chaotic. A linear in- security has no counterpart in chaos
terpolation between the points of the theory, and the cryptographic secu-
lattice was used to extend definition rity of a chaos-derived encryption
of the round function to the con- algorithm can be checked only by
tinuum. The other way around, if a means of crypto-tools.
nonlinear map is chaotic when de- Chaotic systems are characterized
fined on a continuum, then it will by positive Lyapunov exponent,
exhibit properties of confusion, dif- positive entropy and positive algo-
fusion, mixing, and sensitivity to rithmic complexity. On the other
changes in variables. However, in hand, mappings and/or discrete-time
addition a good encryption algorithm systems that have been proposed for
must also be irreducible to any other use in cryptography are defined on
(simpler) form which makes its finite sets of integers. In such sys-
cryptanalysis tractable. An excellent tems, the largest Lyapunov exponent
example is IDEA whose basic de- and the complexity of an infinite se-
signing principle is the usage of three quence is trivially equal to 0, because
different algebraic groups: XOR, every orbit is eventually periodic and
addition modulo 216 and multiplica- will repeat itself. Therefore, the cen-
tion modulo 216 + 1. The groups are tral problem here is to estimate the
not mutually isomorphic, which Lai properties (LE, entropy, complexity
and Massey, the authors of IDEA, and so on) of a typical orbit for time
employ to prove that it is impossible not exceeding its period. The ques-
to reduce IDEA to a simpler form tions one should try to answer are:
[22, 23]. Therefore, sensitivity to What is the impact of these proper-
changes in initial conditions and pa- ties on the security of the crypto-
rameters, and the mixing property of graphic algorithms? When and under
a chaotic map do not guarantee that what conditions is a deterministic

19
Pseudo-random Chaotic systems tial points (plaintext) spread uni-
ensembles formly through the whole space such
Probabilistic that the average number of zeros (or
Unpredictable polynomial-time ? ones) in the block of 2p bits is p. This
Turing machines number gives the strength of the dif-
fusion property in an algorithm in a
similar way that LEs measure the
Infinite powerful strength of the chaos in continuous
? Unpredictable
systems. Do there exist measures for
machines
the confusion? What are the proper-
ties of chaotic systems relevant for
the performance of cryptographic al-
Central question of gorithms? Can chaos theory gain in-
chaos-based cryptography: sight into the theory of designing
cryptographic algorithms? The main
Whether and under what conditions questions to be addressed by a de-
a chaotic system is unpredictable signer of cryptographic algorithms,
by probabilistic polynomial-time including also chaos-based crypto-
machines? graphic algorithms, are: what is the
most efficient way to design an al-
gorithm for a particular environment,
Figure 3. Pseudo-random ensembles are unpredictable by probabilistic polynomial-
time machines, but may or may not be predictable by infinite powerful machines. or, on which type of processor is a
Chaotic systems are unpredictable by infinite powerful machines (analog particular cipher more efficient than
computers), but may or may not be predictable by probabilistic polynomial-time other ciphers?
machines.
• A continuous model of cryptogra-
phy—A central assumption in com-
mapping computationally random- puter science is that the Turing-ma-
ness-increasing? Can the property of chine model is an appropriate
being secure be expressed in terms model of a digital computer and
of the known properties from chaos computer simulation. However, it
theory? was recently argued that another
• Chaos and performance—A good model of computation based on
cryptographic algorithm offers an real numbers [24, 25] is also appro-
optimal trade-off between security priate and in some cases more use-
and performance. “It is quite clear ful as a model of a computer. Both
that someone with a good under- models are, of course, abstractions
standing of present day cryptanalysis (The Turing machine employs a
can design secure but slow algo- type of unbounded, infinite length,
rithms with very little effort”. The while it takes an infinite number of
properties of chaotic systems are as- bits to represent a single real num-
ymptotic ones, however the crypto- ber). It seems to me that it is also
graphic algorithms usually are built appropriate, at least at the theoreti-
on very rapid diffusion and/or con- cal level, to consider a continuous
fusion properties. (real-number) model for solving
One may numerically verify the some of the problems in cryptog-
diffusion property of an algorithm in raphy. This model when used in
a simple way: after how many itera- cryptography would be inherently
tions (rounds) is a small cloud of ini- connected to chaos theory.

20
Acknowledgement Ergodic Theory. Berlin: Springer, 1982.
[11] J. Palis and F. Takens, Hyperbolicity and
The author is grateful to Prof. Sensitive Chaotic Dynamics at
Chen, advisory editor of this maga- Homoclinic Bifurcations. Cambridge:
zine, for the opportunity he has been University Press, 1993.
given to express some ideas about [12] S. Banerjee, J. A. Yorke, and C. Grebogi,
“Robust Chaos”, Physical Review Letters,
chaos-based cryptography. He would vol. 80, no. 14, pp. 3049–3052, 1998.
like to thank R. Chen, G. Maggio, T. [13] D. Ruelle, Chaotic Evolution and Strange
Stojanovski and G. Jakimoski for help- Attractors. Cambridge: University Press,
ful discussion. 1989.
[14] C. E. Shannon, “A Mathematical Theory
References of Communication”, The Bell System
Technical Journal, vol. 27, no. 3, pp. 379–
[1] L. M. Pecora and T. L. Carroll, “Synchro- 423, July 1948.
nization in Chaotic Systems”, Physical [15] A. A. Brudno, “The Complexity of the
Review Letters, vol. 64, no. 8, pp. 821– Trajectories of a Dynamical System”,
824, 1990. Russian Mathematical Surveys, vol. 33,
[2] G. Jakimoski and L. Kocarev, “Chaos and no. 1, pp. 197–198, 1978.
Cryptography: Block Encryption Ciphers [16] J. Ford, “What Is Chaos, That We Should
Based on Chaotic Maps”, to appear in be Mindful of It?”, in The New Physics,
IEEE Transactions on Circuits and Sys- P.Davies, ed., Cambridge University
tems—Part I; L. Kocarev and G. Press, 1992.
Jakimoski, “Chaos and Cryptography: [17] J. Ford, “How Random Is a Coin Toss?”,
From Chaotic Maps to Encryption Algo- Physics Today, vol. 4, pp. 40–47, April
rithms” submitted for publication; N. 1983.
Masuda and K. Aihara, “Cryptosystems [18] W. Diffie and M. E. Hellman, “New Di-
with Discretized Chaotic Maps” submit- rections in Cryptography”, IEEE Trans-
ted for publication. actions on Information Theory, vol. 22,
[3] B. Schneier, Applied Cryptography: Pro- pp. 644–454, 1976.
tocols, Algorithms, and Source Code in C, [19] A. Yao, “Theory and Applications of
2nd Edition. New York: John Wiley & Trapdoor Functions”, IEEE 23rd Sympo-
Sons, 1996. sium on Foundations of Computer Sci-
[4] B. Preneel, V. Rijmen, and A. Bosselears, ence, pp. 80–91, 1982.
“Recent Developments in the Design of [20] J. C. Largaris, “Pseudo-Random Num-
Conventional Cryptographic Algo- bers”, in Probability and Algorithms, Na-
rithms”, Lecture Notes in Computer Sci- tional Academy Press, pp. 65–85, 1992.
ence, vol. 1528, pp. 105–130, Springer - [21] L. Blum, M. Blum, and M. Shub, “A
Verlag, Berlin, 1998. Simple Unpredictable Pseudo-Random
[5] M. S. Baptista, “Cryptography with Number Generator”, SIAM Journal on
Chaos”, Physics Letters A, vol. 240, pp. Computing, vol. 15, no. 2, pp. 364–383,
50–54, 1998. 1986.
[6] G. Jakimoski and L. Kocarev, “Analysis [22] X. Lai and J. L. Massey, “A Proposal for
of Some Recently Proposed Chaos-Based a New Block Encryption Standard”, Ad-
Encryption Algorithms”, submitted for vances in Cryptology - EUROCRYPT’90,
publication. pp. 389–404, Springer-Verlag, Berlin,
[7] C. E. Shannon, “Communication Theory 1991.
of Secrecy Systems”, The Bell System [23] X. Lai, J. L. Massey, and S. Murphy,
Technical Journal, vol. 28, no. 4, pp. 656– “Markov Ciphers and Differential
715, October 1949. Cryptanalysis”, Advances in Cryptology
[8] T. Kruger and S. Troubetzkoy, “Complex- - EUROCRYPT’91, pp. 17–38, Springer-
ity, Randomness, Discretization: Some Verlag, Berlin, 1991.
Remarks on a Program of J. Ford”, [24] L. Blum, F. Cucker, M. Shub, and S.
Physica D, vol. 105, pp. 97–104, 1997. Smale, Complexity and Real Computa-
[9] B. V. Chirikov and F. Vivaldi, “An Algo- tion. New York: Springer-Verlag, 1998.
rithmic View of Pseudochaos”, Physica, [25] J. F. Traub, “A Continuous Model of
D 129, pp. 223–235, 1999. Computation”, Physics Today, pp. 39–43,
[10] I. P. Cornfeld, S. V. Fomin, and Ya. G. Sinai, May 1999.
21

You might also like