# Zooming into chaos for a fast, light and reliable cryptosystem

In previous work, the k-logistic map [Machicao and Bruno, Chaos, vol. 27, 053116 (2017)] was introduced as a transformation operating in the k less significant digits of the Logistic map. It exploited the map's pseudo-randomness character that is present in its less significant digits. In this work, we comprehensively analyze the dynamical and ergodic aspects of this transformation, show its applicability to generic chaotic maps or sets, and its potential impact on enabling the creation of a cryptosystem that is fast, light and reliable.

## Authors

• 4 publications
• 22 publications
• 3 publications
• ### Exploiting ergodicity of the logistic map using deep-zoom to improve security of chaos-based cryptosystems

This paper explores the deep-zoom properties of the chaotic k-logistic m...
08/08/2018 ∙ by Jeaneth Machicao, et al. ∙ 0

• ### Fast 2D Map Matching Based on Area Graphs

We present a novel area matching algorithm for merging two different 2D ...
11/18/2019 ∙ by Jiawei Hou, et al. ∙ 0

• ### An Efficient Analyses of the Behavior of One Dimensional Chaotic Maps using 0-1 Test and Three State Test

In this paper, a rigorous analysis of the behavior of the standard logis...
12/08/2020 ∙ by Joan S. Muthu, et al. ∙ 0

• ### On Generalized q-logistic Distribution and its Characterizations

Several generalizations of the logistic distribution, and certain relate...
03/18/2019 ∙ by Seema S Nair, et al. ∙ 0

• ### Persistence in sampled dynamical systems faster

We call a continuous self-map that reveals itself through a discrete set...
09/12/2017 ∙ by Ulrich Bauer, et al. ∙ 0

• ### Fast and Efficient Depth Map Estimation from Light Fields

The paper presents an algorithm for depth map estimation from the light ...
05/01/2018 ∙ by Yuriy Anisimov, et al. ∙ 0

• ### Bistability: a common feature in some "aggregates" of logistic maps

As it was argued by Anderson [Science 177, 393 (1972)], the "reductionis...
02/01/2007 ∙ by Ricardo Lopez-Ruiz, et al. ∙ 0

##### This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.

## I Introduction

The secrecy in chaos-based cryptosystems relies on mathematical transformations that generate a trajectory whose correlation decays rapidly. The correlation of chaotic trajectories will always decay to zero after a sufficiently long time. This is due to the mixing property that allows nearby points to be quickly mapped anywhere in the transformation domain, and due to the sensibility to the initial condition chaotic transformations have. In fact, the speed of correlation decay and the sensibility to the initial conditions quantified by the Lyapunov exponent are intimately connected Slipantschuk et al. (2013). A chaotic system with a very large positive Lyapunov exponent is thus desirable for cryptography Pisarchik and Zanin (2012), since it allows for very rapid decay of correlations. Moreover, chaotic signals can be generated by low-powered, small area and simple integrated as well as analog circuits operating in very large frequency bandwidths.

Cryptosystems need to perform heavy calculations. For example, chaos-based block ciphers Fridrich (1997); Farajallah et al. (2016); Zhang et al. (2013) such as those that encrypt images, movies and audio employ a series of complex mathematical transformations over too many bits of information. If one wants a light cryptosystem that can be run in any portable devices or that can be considered even for massive streaming, the use of real numbers with higher precision should be avoided. To improve on the performance of chaos-based cryptosystems, the underlying chaotic transformation has been discretized by considering transformations operating on an integer domain. Discretization can preserve important ergodic properties as the mixing property and the sensibility to the initial conditions, but might also create spurious periodic cycles of low-period Farajallah et al. (2016); Garasym et al. (2016), which result in correlations weakening the security of cryptosystems that rely on these transformations. Even chaotic transformations (such as the Bernoulli shift map) acting on real numbers with finite resolution might create spurious periodic cycles due to numerical errors.

With recent advances, it is relatively easy today to perform numerical computation with arbitrary precision, and thus current efficient cryptosystems can rely on maps with real arithmetics of higher precision. However, any meaningful encoding of the chaotic trajectory that allows decoding, such as those used to create a pseudo-random number (PRN) generator or binary secret keys, would be strongly correlated with the most significant digits of the trajectory. To create a stream cipher based on chaos Vidal et al. (2014), where a binary information stream is encoded by XOR transformation to a binary secret key created by encoding a chaotic trajectory, Gerard Vidal Cassanya Cassanya (2017) has proposed the use of the less significant digits of a trajectory obtained from a higher-dimensional chaotic system of ODEs to create the binary secret key. The idea of using the less significant digits of chaotic trajectories has appeared before in the work of Ref. Lee et al. (2003), however it was in Ref. Cassanya (2017) (and other previous patent applications cited within) that less significant digits were taken by a transformation that this work claims to be optimal to support a fast, light and reliable cryptosystem.

Inspired by today huge volume of data that needs to be handled in secrecy, there is a desire to develop not only fast (quick run time) and light (little computational cost) but also reliable (highly entropic, sensitive to the initial conditions, low correlation) cryptosystems. An important aspect of a cryptosystem is its initialization. For example, one might employ a PRN to choose parameters. Secret keys, which can be created from PRNs, are also used to encrypt the information and represent a core operation in any cryptosystem. Any innovative invention that creates reliable PRNs or secret keys with optimized use of computational resources will contribute tremendously to a world that wants to communicate massive amounts of information, but securely. PRNs are not only important for secrecy in communication. It is also fundamental to the functioning of several autonomous machines, toys, and they are essential for several numerical algorithms. This work demonstrates that looking at the less significant digits of chaotic trajectories is indeed a pathway for the creation of fast, light and reliable PRNs.

The work of Ref. Machicao and Bruno (2017) has analyzed the dynamics and the statistical properties of the deep-zoom transformation to a chaotic trajectory, a transformation that takes up the less significant digits of a real number. This transformation applied to the Logistic map regarded as the -logistic map Machicao and Bruno (2017) was defined by the less significant digits located at digits to the right of the decimal point. It was shown that a PRN based on the -logistic map has strong properties regarding statistical randomness tests DIEHARD and NIST, and thus demonstrating from a statistical perspective that the -logistic map can sustain secure cryptosystems. The -logistic map takes advantage of not only having trajectory points with arbitrarily large precision, and thus within principle no detectable spurious cycle, but also on hiding the information about the most significant digits, which could reveal information about the algorithm behind the generation of the PRNs.

The interest in the present work is to understand how the deep-zoom transformation changes a particular map ergodic properties such as its space partition, density measure, Lyapunov exponent, Topological and Shannon’s entropies. Our results, mostly illustrated by how the deep-zoom transformation operates into the Logistic map are valid to generic 1D chaotic maps or a set of numbers generated by any other process. The deep-zoom transformation is a complementary operation to chaos-based cryptosystem: we first quickly generate a chaotic trajectory by a low-dimensional map, and then we use the deep-zoom transformation to quickly and lightly enhance security. This is our strategy for the creation of a fast, light and reliable chaos-based cryptosystem.

Our first result is to demonstrate that the -deep-zoom (-DZ) transformation to a point is mathematically equivalent to iterating for times the decimal shift map (DSM) Graham et al. (1989); Hilborn and others (2000). This map is well known, and it is since decades considered to be a mathematical toy model to demonstrate how a shift into the less significant digits results in strong chaos. Despite its tremendous appeal due to the nice way this map deals with decimal digits, scientists working with encryption based on nonlinear transformations have focused their attention on other more known similar maps, such as the Bernoulli shift map Saito and Yamaguchi (2018) or the Baker’s map, instead of the DSM. The main difference is whereas the DSM operates by shifting the decimal numbers, Bernoulli shift and Baker’s map shift the binary sequence encoding the real numbers of the trajectory.

Then, we demonstrate that by applying the -DZ transformation only once to generic chaotic trajectories, the mapped trajectories will approach a uniform invariant measure for a sufficiently large but in practice small , thus requiring much less computational effort to create numbers with uniform statistics, a standard requirement for reliable PRNs. The convergence to the uniform invariant measure also dictates the convergence of the Lyapunov exponent (LE) to the Topological and Shanon’s entropy of the mapped trajectories, indicating that the transformed points have achieved the largest sensibility to the initial conditions that is possible. Having a trajectory for which the level of chaos is the same as the level of entropy means that uncertainty about the past and the future is as large as one could wish for the particular chaotic map being considered. Moreover, all these quantities are linearly proportional to , thus implying that randomness (higher entropy) and the sensibility to the initial conditions (large LE) can be trivially increased by the resolution with which a trajectory is observed, and not by increasing a systems dimension or by considering higher-order iterates of the map onto itself, operations that would require computational resources.

Throughout this paper, we will show how this map amazing properties applied to any 1D chaotic systems with finite probability measure allows for a clear path to the creation of fast (quick run time, low number of iterations), light (little computational effort, low-dimension) and reliable (uniform statistics, strongly sensitive to the initial conditions, high entropy) pseudo-random numbers or symbolic secret keys, thus supporting fast, light and reliable chaos-based cryptosystems.

## Ii The k-deep-zoom (k-DZ) transformation and its equivalence to the Decimal shift map (DSM)

Given a 1D map defined in a domain and producing an orbit generated by the initial condition , with a given invariant density and probability measure , such that for an interval we have that , the -DZ transformation was defined in Machicao and Bruno (2017) by

 ϕk(x)=x10k−⌊x10k⌋, (1)

where stands for the floor function. In Ref. Machicao and Bruno (2017), and motivated mostly for practical reasons, a parameter was considered which set the number of less significant digits for the function . In here, we drop this definition, and assume that , or is a large number.

This map can be analogously described by

 ϕk(x)=10k(x,mod10−k). (2) ϕk(x)=10kx,mod1. (3)

The DSM map is defined by

 D(x)=10x,mod1, (4)

and its -folded version (the -th iteration of ) which we represent by is basically

 Dk(x)=10kx,mod1, (5)

which is exactly equal to Eq. (3). Thus, the -fold DSM map is mathematically equal to the -DZ transformation.

To illustrate the action of the DZ transformation, given the value , then

### ii.1 The k-DZ transformation and others maps in literature

The idea of using a cryptosystem based on mod transformations that extract the less significant digits of real numbers generated by chaotic systems was to the best of our knowledge first proposed in Ref. Lee et al. (2003). Given a real number generated by a chaotic system (discrete or continuous), this work has proposed to cipher by

 Rn≡Axn,\ mod S, (6)

with and representing arbitrary constants.

Equation (4) can be seen as a particular case of Eq. (6), but not of the Eq. (3) because the k-DZ transformation introduces the extra parameter .

Our work shows when this parameter can generate suitable PRNs. However, in the work of Ref. Lee et al. (2003), only the case for and was studied, and without the rigour and deepness presented in the present work to study the ergodic and dynamic manifestations of these transformations. The choice of , which turns the map of Eq. (6) not equivalent to the DSM map, was made to organize the number into a two-dimensional gray-scale image for further processing. This choice, however, is not optimal for the security of the encryption, measured in terms of the entropy and sensibility to the initial conditions. The optimal choice, demonstrated further, is obtained for , as in Eqs. (3) or (5). The choice made of as an arbitrary constant is also per se not always optimal to extract the less significant digits, unless this arbitrary constant is of the form , as in Eq. (3).

## Iii The Logistic map

The logistic map has been extensively studied over the past years May (1976). Since it is a well know system and that produces typical chaotic behaviour Ott (2002), we focus the application of the -DZ transformation to trajectory points being iterated by the logistic map, which we refer as the -logistic map, adopting previously defined terminology. It is described by

 f(xt+1)=bxt(1−xt), (7)

where . In Eq. (7), , and as such each trajectory point is assumed to have infinite precision. However, in practice, has finite precision, but this does not prevent one from solving Eq. (7) by numerical means. The shadowing lemma Grebogi et al. (1990) guarantees that numerical solutions of this map are stable even if trajectory points have finite resolution, in the sense that the numerical trajectory will remain close to a true trajectory for a very long time, this time depending on the resolution of the trajectory considered.

## Iv Analysis

### iv.1 Phase space, partition, and topological entropy

Equation (2) is useful because it provides the key to calculate the location of the partition points, where the map becomes discontinuous. The points of discontinuities happen at the boundaries created by the mod function, so at multiples of , more specifically at , for and . There will be then discontinuous intervals. Figure  1 show the original Logistic map with =4 (, left panel), and the corresponding -DZ transformation for (second panel to the right), (third panel to the right), and (right-most panel).

So, the set containing the points where discontinuities appear can be obtained by solving the following equation

 x∗(m)=m10−k. (8)

We can define a topological entropy of the -DZ transformation, which is an upper bound for the Shannon-entropy, by the Boltzmann entropy of gas measuring the entropy of it in terms of the number of observable states. Here, we can define the states as being the fall of a trajectory point into an interval within the partition provided by Eq. (8). Regardless of the value of , and actually regardless of which kind of 1D chaotic map is used, this number is given by the number of partition points of the -DZ transformation and it is equal to , which is also the number of possible symbolic sequences that the -logistic map produces. It is given by

 HT=kln(10). (9)

It is useful to compare this result with the topological entropy of the original Logistic map, defined in terms of the number of subintervals in its generating Markov partition, and equal to , where is the order of the partition representing the resolution of the subintervals composing the partition (measuring in length). That results in that . Here we see an advantage of the use of the -logistic map to produce efficient pseudo-random numbers in a light fashion, so without requiring too expensive computational resources. Assuming and to be of the same order, the topological entropy of the -logistic map be larger than that of the Logistic map.

It is also worthwhile to compare the result in Eq. (9) with the topological entropy, , obtained by applying Eq. (6). Defining , we obtain that the topological entropy equals for Eq. (6). Thus, the entropy achieved in Eq. (9) for the -DZ transformation in Eq. (3) can only be achieved by applying Eq. (6) to that same chaotic set if .

### iv.2 k-logistic map probability density

One of the most important characteristics of a good PRN generator is that successive output values of it, say

are independent random variables from the uniform distribution over the interval [0, 1]. It was shown in

Machicao and Bruno (2017) that as

increases the probability distribution of the map becomes more and more uniform. This is reproduced in Fig.

2, in terms of the histogram (frequency) analysis. As can be seen in this figure, for (a) this distribution is not uniform as it is to be expected from the Logistic map with =4, with a high probability of finding points close to 1 and 0. As grows with , , and , the distribution tends to become increasingly uniform, as can be observed in the Figure 2(b). In (c) we show a magnification of (b) for the region close to zero.

### iv.3 The natural invariant measure of the k-DZ transformation and its Shannon’s entropy

To calculate the asymptotic Lyapunov exponent of the -DZ transformation, which is independent on the choice of the chaotic map, we notice that the -DZ is piecewise linear, wherein each partition sub-interval the map has a constant derivative function. Arranging the values of in Eq. (8) in a ranking of crescent order and indicating it by, i.e., such that , each partition subinterval comprises the interval

 di=[x∗i,x∗i+1[, (10)

for and .

The derivative of the piecewise-linear map for each sub-interval can be calculated by

 ωi=|di|−1=10−k, (11)

since , where represents the length of the sub-partition .

The evolution of an arbitrary initial probability measure to a 1D nonlinear transformation is dictated by the Perron-Frobenious operator. For piecewise linear systems, the Perron-Frobenious operator can be cast in terms of a linear system of equations operating in each subinterval of the map partition. The -DZ transformation takes as the initial measure generated by the nonlinear Logistic map and then applies times the . If we assume that the measure in each subinterval of the -DZ is uniform (which initially will be not) and we represent it by the component

of the vector

() with , and we define the density in each interval as given by

 ρi=μidi (12)

an equation for the evolution of the non-normalized density at iteration can be obtained Alligood et al. (2012).

 Zρ′t=ρ′t+1, (13)

where the square matrix with component is the reciprocal of the absolute value of the slope of the map taking the measure from the interval to the interval and can be defined by a matrix with equal rows as

 Z=⎡⎢ ⎢ ⎢ ⎢ ⎢⎣ω−10ω−11…ω−1n−1ω−1nω−10ω−11…ω−1n−1ω−1n\omit\span\omit\span\omit\span\omit\span\omitω−10ω−11…ω−1n−1ω−1n⎤⎥ ⎥ ⎥ ⎥ ⎥⎦.

Equation (13), representing how the measure evolves concerning only 10 intervals are valid if the measure and the density is uniform for every sub-partition since it has been derived from the continuous Perron-Frobenious operator integrated over intervals where the measure was assumed to be constant. If the initial measure is not uniform for each subpartition interval, as it is the case since the initial measure was generated by the logistic map, we either should consider the continuous operator (effectively described by an infinite dimension matrix) or alternatively, we can adopt a much simpler strategy. We take Eq. (13) and study it in the limit, when .

Defining the vector and the diagonal matrix , the element of the matrix represents the percentage of the measure in the interval that goes to the interval . The matrix has equal rows because the piecewise equivalent of the -logistic map takes measure from each interval to all others with the same proportion in each of the intervals .

The equilibrium point of Eq. (13) is obtained when

 Zρ∗=ρ∗, (14)

which means that the time invariant density is a normalized eigenvector of

.

The matrix

is a stochastic matrix, since it is a non-negative matrix and the sum of all elements in a row totals 1. This is easy to see since

 ∑iω−1i=∑idi=1. (15)

The Perron-Frobenious theorem guarantees that a square stochastic matrix has a unique dominant real unitary eigenvalue, with all other eigenvalues smaller than 1. This means that the density of the

-DZ transformation in the limit of is natural (it is unique), regardless of the initial probability measure that is fed into the -DZ transformation. The natural density can be recovered by proper normalization dividing by so that the physical natural density in each interval is given by

 [ρ]i=[ρ∗]i∑i[ρ∗]idi. (16)

This is to guarantee that the density produces the natural measure by Eq. (12).

It is also easy to see that the unique unitary eigenvalue has associated to it a uniform eigenvector with all components equal to a constant value : , so, the piecewise -DZ transformation has a uniform density given by

 [ρ]i=c∑i[c]di=1. (17)

This leads us to an invariant natural measure in each interval that equals the Lebesgue measure of the interval, and thus

 μi=di=10−k. (18)

So, for sufficiently large , it is to be expected that the -logistic map will have a uniform natural invariant density, although the density of the Logistic map is not uniform for each interval. In practice, this sufficiently large number is around =4, when this map generates PRNs with all the good statistical characteristics for security Machicao and Bruno (2017). Being invariant means that any initial probability measure will eventually evolve to the same invariant measure. Thus, the reliability of the security for the PRNs generated by the -DZ transformation is substantially more dependable on the properties of the DSM, than on the statistical properties of the chaotic set of points being iterated by the -DZ transformation, or also on the chaotic map considered to initially generate the chaotic trajectory to be fed into the -DZ transformation. Since the invariant measure of the -logistic map is constant (for sufficiently large ), this means that any encoding supported by the partition defined in Eq. (8) will produce equiprobable symbols, this rendering cryptoanalysis based on frequency statistics to be inappropriate.

The asymptotic Shannon’s entropy of the -DZ transformation is therefore equal to the Topological entropy:

 HS=−n∑i=1μilnμi=−n∑i=1dilndi=HT (19)

### iv.4 The Lyapunov exponent of the k-DZ transformation

The Lyapunov exponent (LE) of the -DZ transformation can always be calculated regardless of the chaotic map being used as the generator of the initial measure. This is so because the map is piecewise linear with constant derivative everywhere (except the partition points). The Lyapunov exponent can be calculated by

 λ=∫ln(\absdϕk(x)dx)dμ (20)

where , represents the invariant measure of the -DZ transformation.

The chaotic map has its own domain of validity. This domain must be normalized to fit within the domain of the -DZ transformation. For the Logistic map, the domain is , the same as the domain of the -DZ transformation. Therefore, its LE is equal to

 λ=∫10ln(\abs10k)dx=kln(10)=HT. (21)

So, we see that for a sufficiently large , the -DZ transformation produces a LE that approaches the topological entropy which is also equal to Shannon’s entropy. A light cryptosystem that does not require much computational effort demands the use of transformations that can be as entropic as possible and with the largest as possible sensibility to the initial conditions (which implies in a quick decay of correlation).

When compared the LE of the -DZ transformation in Eq. (3 (result in Eq. (20)) with the LE of the transformation Eq. (6) (proposed in Ref. Lee et al. (2003)),

assuming , we notice that Eq. (6) can be equivalently written as

 Rn=S(10kSxn,\ mod 1), (22)

which can be rewritten as

 Rn=SΦ(xn), (23)

where . Noticing that the LE of the function is the same as the one obtained if is multiplied by a constant, then the LE of Eq. (6) is equal to

 λ(S)=ln(10kS)=H(S)T. (24)

Thus, the LE of Eq. (6) is only equal to the one of Eq. (3), if . In the result of Eq. (24), we have assumed that the speed of convergence of the probability density measure Boyd et al. (2009) of Eq. (6) is the same as the one of Eq. (3). This is to be expected, since the second largest eigenvalue of the matrix regulating the evolution of the density measure for Eq. (3) is the same as the one for this matrix regulating the evolution of the density measure for Eq. (6), and both are equal to zero.

### iv.5 Enhancement of sensibility to the initial conditions of the k-logistic map

The LE of the -DZ transformation does not depend on the choice of the chaotic map generating the measure. It is nevertheless interesting to understand how much chaos is enhanced by the application of the -DZ transformation into a chaotic map. Considering this chaotic map to be the logistic map (Eq. (7)), we then want to understand how much chaos is enhanced if the DZ transformation with is applied not to the trajectory points generated by the logistic map, but to the map itself. So, we calculate the Lyapunov exponent of the map , whose state space () is shown in Fig. 3. Additionally, Fig. 4 show a colored version of this previous picture for parameters in region .

This map is described by

 ϕk(f(x))=10k(f(xt),mod10−k). (25)

Its LE can be calculated by

 λ=∫ln(\absdϕk(f(x))dx)dμ (26)

where now represents the measure of the Logistic map.

The first derivative of the map in Eq. (25) is

 dϕk(x)dx=10kb(1−2x), (27)

whereas its density for is given by

 ρ(x)=π−1[x(1−x)]1/2 (28)

Placing Eqs. (27) and (28) in Eq. (26) and integrating over the map domain (), we obtain that

 λ=∫10kln10+ln4+ln|(1−2x)|π√x(1−x)dx=kln(10)+ln(2), (29)

since

 ∫10ln|(1−2x)|π√x(1−x)dx=ln2.

So, the first thing to notice is that the LE of the map in Eq. (25) is equal to the LE of the -logistic map plus the LE of the original logistic map for (which is equal to ). This tells us that when creating a cryptosystem based on a chaotic map, more entropy and sensibility to the initial conditions can be achieved by a simple inspection to the least significant digits, instead of doing more iterations in the chaotic map generating the initial chaotic sequence.

This analysis can be easily extended to the logistic map operating under any parameter that produces chaotic motion.

The Lyapunov exponent of the map in Eq. (25) can be calculated using the time approach by

 λ(b)=limT→∞1TT∑t=1ln\abs10kb(1−2xi), (30)

 λ(b)=kln10+limT→∞1TT∑t=1ln\absb(1−2xi), (31)

and finally to

 λ(b)=kln10+λ0(b), (32)

where is just the Lyapunov exponent of the Logistic map for the parameter . Thus, here it is obvious that the gain for sensibility to the initial conditions is trivially achieved by just choosing a sufficiently large .

## V Pseudo-random numbers and symbolic secret keys

Once the output of the -DZ transformation generates real points in the unit interval, these values can be considered directly as a pseudo-random number that can be re-scaled as required. The security analysis of the so-called -logistic map PRN was analysed in Machicao and Bruno (2017), showing high-quality pseudo-random numbers for through statistical randomness tests such as DIEHARD Marsaglia (1998) and NIST Rukhin et al. (2001).

Another strategy to generate PRNs is by means of the symbolic representation of the trajectory of the -DZ transformation. Thus, a partition that is not the natural partition of the -DZ transformation needs to be considered. This natural partition is given by whose borders are defined by Eq. (8). Then, for a given , there will be symbols for the natural partition. The point is encoded by the -th symbol of the alphabet (), represented by . A transformed trajectory of length represented by will have the symbolic representation , where . The vector fully represents the information about the location of the points being mapped (within the resolution of the partition cells), and therefore should be avoided for the creation of the secret key. The partition to create a secret key should have a minimal number of intervals, for example a binary partition where is encoded by ‘0’ and is encoded by ‘1’. In this way, points within will be encoded with equal probabilities for ‘0’ and ‘1’.

## Vi Conclusions

Cryptography relies on the application of several transformations to eliminate all existing correlations between the message and its ciphered version. A preliminary requirement for achieving this relies on the use of highly entropic and non-correlated pseudo-random numbers. The sensitivity to the initial conditions property chaotic systems have is the key to this goal. The interest today is to be able to accomplish such a task for reliable encryption but by relying on transformations that require little computational effort (light) and quick running time (fast).

In this work, we characterize the properties of the so-called the -Deep Zoom (-DZ) to support reliable cryptosystems that uses pseudo-random numbers or secret keys that were created fast and lightly. Besides the Decimal Shift Map (DSM) is not conceptually equivalent to the k-DZ, we show that the k-DZ is mathematically equivalent to the DSM map iterated k times. More than that, we show that the -fold DSM can be rewritten into a form completely equivalent to the -DZ transformation. So, all the good properties of the DSM map such as uniform statistics, high entropy, and sensibility to the initial conditions are inherited by the -DZ. There is a semantic difference between both maps. Whereas the -DZ transformation effectively represents an algorithm that simply extracts the less significant digits of a real number, the DSM is a map that transforms a point into another point. This semantic interpretation of the DZ-transformation can be in the future exploited for the creation of dedicated electronic chips operating at the hardware level that only work with less significant digits, thus potentially bringing the encryption process to the physical level. We show that the entropy and the Lyapunov exponent is linearly proportional to . This means that the trivial and light task of peeking onto the sequence of less significant digits positioned digits to the decimal floating-point is sufficient to drastically increase the entropy and therefore the uncertainty past and future numbers, at a minimal computational cost.

Several of the properties of the -DZ transformation depend only on the map itself, not on the chaotic system being considered as the generator of the original trajectory being encoded, or any other set of numbers being generated by any other process (e.g. stochastic processes). Thus, one might wonder why to use the -DZ transformation into a chaotic set of numbers after all? The reason is that chaotic trajectories have several advantages. They are easy to be generated and do not require the use of higher-dimensional systems, in both digital or analog domains, they require less algorithmic complexity, less-power electronics, less CPU dedication and can be generated at impressive large bandwidths. Chaos, however, is deterministic and correlation does decay quickly, but not as quickly as one would wish. The additional application of the -DZ transformations to chaotic trajectories fast and lightly enhances the already existing wished properties of chaos to cryptography. A transformation that optimizes essential ingredients to a secure cryptosystem, but with minimal computational effort.

Our strategy to create pseudo-random numbers or secret keys requires the use of a chaotic system whose simulated trajectory is guaranteed to be chaotic for a long period, and that can be additionally generated using minimal computational resources. For this reason, the Logistic map is a good candidate. The -DZ transformation is then applied a single time to this stable chaotic trajectory. Our claim is that this strategy quickly generates secure and light PRNs. Another strategy to generate secure PRNs, which might increase the computational cost to some extent, was proposed in Ref. Saito and Yamaguchi (2018), where an approximate true trajectory of the Bernoulli map is calculated directly using real algebraic numbers.

## Acknowledgments

J. M. acknowledges a scholarship from the National Council for Scientific and Technological Development (CNPq grant #155957/2018-0). O. M. B. acknowledges support from CNPq (grant #307897/2018-4) and FAPESP (grant #16/18809-9).

## References

• K.T. Alligood, T.D. Sauer, and J.A. Yorke (2012) Chaos: an introduction to dynamical systems. Textbooks in Mathematical Sciences, Springer New York. External Links: ISBN 9781468493191 Cited by: §IV.3.
• S. Boyd, P. Diaconis, P. Parrilo, and L. Xiao (2009)

Fastest mixing markov chain on graphs with symmetries

.
SIAM Journal on Optimization 20 (2), pp. 792–819. Cited by: §IV.4.
• G. V. Cassanya (2017) Method for generating a pseudorandom sequence, and method for coding or decoding a data stream. Google Patents. Note: US Patent 9,654,289 Cited by: §I.
• M. Farajallah, S. El Assad, and O. Deforges (2016) Fast and secure chaos-based cryptosystem for images. International Journal of Bifurcation and Chaos 26 (2), pp. 1650021. Cited by: §I.
• J. Fridrich (1997) Image encryption based on chaotic maps. In 1997 IEEE International Conference on Systems, Man, and Cybernetics. Computational Cybernetics and Simulation, Vol. 2, pp. 1105–1110. Cited by: §I.
• O. Garasym, I. Taralova, and R. Lozi (2016) New nonlinear cprng based on tent and logistic maps. In Complex Systems and Networks, pp. 131–161. Cited by: §I.
• R. L. Graham, D. E. Knuth, O. Patashnik, and S. Liu (1989) Concrete mathematics: a foundation for computer science. Computers in Physics 3 (5), pp. 106–107. Cited by: §I.
• C. Grebogi, S. M. Hammel, J. A. Yorke, and T. Sauer (1990) Shadowing of physical trajectories in chaotic dynamics: containment and refinement. Physical Review Letters 65 (13), pp. 1527. Cited by: §III.
• R. C. Hilborn et al. (2000) Chaos and nonlinear dynamics: an introduction for scientists and engineers. Oxford University Press on Demand. Cited by: §I.
• P. Lee, S. Pei, and Y. Chen (2003) Generating chaotic stream ciphers using chaotic systems. Chinese Journal of physics 41 (6), pp. 559–581. Cited by: §I, §II.1, §II.1, §IV.4.
• J. Machicao and O. M. Bruno (2017) Improving the pseudo-randomness properties of chaotic maps using deep-zoom. Chaos: an interdisciplinary journal of nonlinear science 27, pp. 53116. Cited by: §I, §II, §II, §IV.2, §IV.3, §V.
• G. Marsaglia (1998) The Marsaglia random number CDROM, with the DIEHARD battery of tests of randomness. The National Science Foundation, Florida, USA. External Links: Link Cited by: §V.
• R. M. May (1976) Simple mathematical models with very complicated dynamics. Nature 261 (5560), pp. 459–467. Cited by: §III.
• E. Ott (2002) Chaos in dynamical systems. Cambridge University Press. External Links: ISBN 9780521010849 Cited by: §III.
• A. N. Pisarchik and M. Zanin (2012) Chaotic map cryptography and security. International Journal of Computer Research 19 (1), pp. 49. Cited by: §I.
• A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, and A. Heckert (2001) NIST Special Publication 800-22: A statistical test suite for random number generator for criptographic applications. Technical report Pub-NIST, National Institute of Standards and Technology, Gaithersburg, MD, USA. Cited by: §V.
• A. Saito and A. Yamaguchi (2018) Pseudorandom number generator based on the bernoulli map on cubic algebraic integers. Chaos: An Interdisciplinary Journal of Nonlinear Science 28 (10), pp. 103122. Cited by: §I, §VI.
• J. Slipantschuk, O. F. Bandtlow, and W. Just (2013) On the relation between lyapunov exponents and exponential decay of correlations. Journal of Physics A: Mathematical and Theoretical 46 (7), pp. 75101. Cited by: §I.
• G. Vidal, M. S. Baptista, and H. Mancini (2014) A fast and light stream cipher for smartphones. The European Physical Journal Special Topics 223 (8), pp. 1601–1610. Cited by: §I.
• W. Zhang, K. Wong, H. Yu, and Z. Zhu (2013) An image encryption scheme using reverse 2-dimensional chaotic map and dependent diffusion. Communications in Nonlinear Science and Numerical Simulation 18 (8), pp. 2066–2080. Cited by: §I.