N Dimensional
N Dimensional
Abstract—Different from existing methods that use matrix For example, the initial condition sensitivity and ergodicity
multiplications and have high computation complexity, this paper of a chaotic system are analogous to the diffusion and con-
proposes an efficient generation method of n-dimensional (nD) fusion properties [21] in cryptography, and the deterministic
Cat maps using Laplace expansions. New parameters are also
introduced to control the spatial configurations of the nD dynamics in a chaotic system corresponds to the deterministic
Cat matrix. Thus, the proposed method provides an efficient pseudorandomness in cryptography [22], [23].
way to mix dynamics of all dimensions at one time. To investi- Among various developed chaotic maps, the Cat map is
gate its implementations and applications, we further introduce a 2-D chaotic map named after Vlamimir Arnold [24], [25].
a fast implementation algorithm of the proposed method with Except for the common properties of chaotic systems, the Cap
time complexity O(n4 ) and a pseudorandom number genera-
tor using the Cat map generated by the proposed method. The map has many unique properties.
experimental results show that, compared with existing genera- 1) It is in the integer form and can be easily adapted to
tion methods, the proposed method has a larger parameter space an arbitrary finite precision [24], which benefits to the
and simpler algorithm complexity, generates nD Cat matrices difference between the precision infiniteness of chaotic
with a lower inner correlation, and thus yields more random systems and precision finiteness of cryptosystems [26].
and unpredictable outputs of nD Cat maps.
2) It is invertible and its inverse is also in the integer form
Index Terms—Arnold’s cat map, cryptography, Laplace expan- because its Cat matrix has determinant 1.
sion, n-dimensional (nD) Cat map. 3) It is area preserving [24], indicating that the Cat map
can be directly used as a permutation function, which is
I. I NTRODUCTION the fundamental building blocks for cryptography.
4) It is topologically transitive [27] and thus it is chaotic
S A TYPE of dynamical systems closely related to nat-
A ural processes, chaotic systems are quite sensitive to
their initial conditions. This indicates that their trajectories are
with high randomness.
5) It is an Anosov diffeomorphism and structurally sta-
ble [25], indicating that small perturbations in the system
exactly decided by their initial states. Any small difference in do not affect the qualitative behaviors of the map’s tra-
their initial states yields significantly different outcomes after jectory, and thus the Cat map itself can resist a certain
long time system evolution [1]–[3]. This is commonly referred level of noise.
as butterfly effect [4]. Examples of chaotic systems include the With these significant properties, the Cat map has been
logistic map [5], Chua’s circuit [6], and Chen–Lee system [7]. studied in both theory and practice and used in different
With significant properties of initial state sensitivity, ergod- subjects. Examples include the Cat map period distribu-
icity, and unpredictability, chaotic systems have been widely tions [28], [29], Cat map properties [30], Quantum Cat
reported in various subjects including mathematics, physics, maps [31]–[34], Cat maps in other domains [35], and Cat map-
computer sciences, biology, engineering, economics, robotics, based pseudorandom number generator (PRNG) [36], image
geology, neuron science, and chemistry [8]–[11]. Among all encryption [24], and watermarking [18].
chaos-based applications, cryptography is the most popular A Cat map usually contains a transformation matrix called
one [12]–[18]. This is because many properties of chaotic the Cat matrix. Several Cat map generation methods have been
systems can be found similar in cryptography [19], [20]. developed to construct different Cat matrices such that the
generated Cat maps have high randomness and large param-
Manuscript received July 9, 2015; accepted September 21, 2015. This work
was supported in part by the Macau Science and Technology Development eter spaces. According to the dimensions of the Cat matri-
Fund under Grant FDCT/017/2012/A1, and in part by the Research ces, these generation methods can be roughly classified into
Committee at the University of Macau under Grant MYRG2014-00003-FST, 2-D [24], [25], 3-D [24], [37]–[39], and n-dimensional (nD)
Grant MRG017/ZYC/2014/FST, Grant MYRG113(Y1-L3)-FST12-ZYC, and
Grant MRG001/ZYC/2013/FST. This paper was recommended by Associate Cat map generation methods [40]–[42]. A 2-D Cat matrix is
Editor J. Cao. (Corresponding author: Yicong Zhou.) a 2 × 2 matrix containing four elements, while a 3-D Cat
Y. Wu is with the Department of Electrical and Computer Engineering, matrix is a 3 × 3 matrix with nine elements. When being used
Tufts University, Medford, MA 02155 USA (e-mail: [email protected]).
Z. Hua and Y. Zhou are with the Department of Computer and Information in a cryptosystem, they commonly have a parameter space
Science, University of Macau, Macau, China (e-mail: [email protected]; less than the required size to resist brute-force attacks [43],
[email protected]). and thus they have to be used with additional components
Color versions of one or more of the figures in this paper are available
online at http://ieeexplore.ieee.org. to ensure security [24]. On the other hand, an nD Cat map
Digital Object Identifier 10.1109/TCYB.2015.2483621 with a parametric nD Cat matrix seems to have a quite large
2168-2267 c 2015 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
parameter space. However, because of using a large number Based on the way how to construct the nD Cat matrix CnD
∗ ,
of matrix multiplications and dependency relationships among there exist several Cat map generation methods.
the elements in the Cat matrix, existing nD Cat map genera-
tion methods produce nD Cat matrices with highly correlated A. Arnold’s Cat Map Generation Method
matrix elements, which may downgrade the security of cryp- The original Cat map called the Arnold’s Cat map is a 2-D
tography applications [40]. A detailed literature review on Cat map. Its Cat matrix C2-D
these methods is given in Section II. A is defined by [25]
In this paper, we propose a new nD Cat map generation 1 1
C2-D
A = . (2)
method using Laplace expansions to iteratively construct an 1 2
nD Cat matrix. Its properties are discussed and theoretical
analysis is provided. The main contributions of this paper can In practice, the Arnold’s Cat matrix C2-DA is commonly
be summarized as follows. extended into a parametric form for cryptography applica-
1) To overcome the high computation complexity of exist- tions [24] and defined as follows:
ing methods that are rooted in matrix multiplications, we 1 a
propose a new nD Cat matrix generation method that is Cpara. =
2-D
(3)
b ab + 1
the first time to use Laplace expansions to efficiently
generate nD Cat matrices.
para. = 1 and Cpara.
where a and b are integers. Obviously, C2-D 2-D
2) We further propose new parameters to control the spatial
is indeed a Cat matrix with area preserving, invertibility, and
configurations of an nD Cat matrix. This provides an
other properties.
efficient way to mix dynamics of all dimensions at one
time.
3) We introduce a new fast algorithm to implement the pro- B. 3-D Cat Map Generation Methods
posed method. It can reduce the time complexity from To enhance the security level of the Cat-map-based cryptog-
O(n5 ) to O(n4 ). raphy and other applications, several 3-D Cat map generation
4) We provide theoretical analysis and comprehensive per- methods were developed.
formance evaluations of the proposed method with Lian et al. [37] extended C2-D para. into the x − z and
respect to the parameter space, algorithm complex- y − z planes, and then proposed a parametric 3-D Cat
ity, matrix element correlation, Shannon entropy, and matrix C3-D
L , as
Kolmogorov entropy. The comparison results show that ⎡ ⎤
1 0 a
the proposed method have a larger parameter space, less ⎢ ⎥
computation complexity, more independent, and random L =⎣
C3-D bc 1 abc + c ⎦ (4)
matrix elements and can generate outputs with better bcd + b d abcd + ab + cd + 1
randomness and unpredictability than existing methods.
where a, b, c, and d are integer parameters.
5) To investigate the real-world application of the proposed
Chen et al. [24] constructed a parametric 3-D Cat matrix by
method, we introduce a new PRNG using the Cat maps
firstly extending C2-D
para. with respect to the x, y, and z direc-
generated by the proposed method. The randomness
tions and then mixing all coupled Cat matrices using matrix
quality of the proposed PRNG is evaluated using two
multiplications. Consequently, their 3-D Cat matrix C3-D
C is the
test standards.
product of three extended Cat matrices of pairwise-coupled
The rest of this paper is organized as follows. Section II
dynamics as
briefly reviews the existing Cat map generation methods,
zy
C = CC CC CC
C3-D x
Section III introduces our nD Cat map generation method
using Laplace expansions, Section IV analyzes the proposed ⎡
ax az by + 1 az
method, Section V compares the proposed method with exist- = ⎣ bz + ax by (az bz + 1) az bz + 1
ing methods, Section VI proposes a new PRNG and evaluates by (ax bx + 1) bx
its performance, and Section VII concludes this paper. ⎤
ay + ax az (ay by + 1)
ay bz + ax (ay by + 1)(az bz + 1) ⎦ (5)
II. E XISTING C AT M AP G ENERATION M ETHODS (ax bx + 1)(ay by + 1)
This section briefly reviews the parametric Arnold’s, 3-D, where ax , bx , ay , by , az , and bz are six integer control
and nD Cat map generation methods, and discusses their parameters.
properties. Also based on C2-Dpara. , Liu et al. [38] introduced a para-
All discrete Cat maps can be represented as a general form
metric 3-D Cat matrix C3-D
U by mixing dynamics on all three
Y(t + 1) = CnD
∗ Y(t) mod N (1) dimensions into the extended dimension as
⎡ ⎤
1 a 0
where CnD∗ is an nD Cat matrix generated by the method ⎣ b ab + 1 0 ⎦
∗ and |CnD U =
C3-D (6)
∗ | = 1, Y(t) = [y1 (t), y2 (t), . . . , yn (t)] , and
T
c d 1
Y(t + 1) = [y1 (t + 1), y2 (t + 1), . . . , yn (t + 1)] are the input
T
and output of the nD Cat map. N is the number of finite states. where parameters a, b, c, and d are integers.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
(n−1)D (n−1)D
Recently, Pan and Li [39] also introduced their parametric where 0 denotes the zero matrix and CN , CN ,
I II
3-D Cat matrix adding two control parameters c and d, but (n−1)D (n−1)D (n−1)D
CN , and CN are four submatrices of CN par-
III IV
in a formulation different from Lian et al.’s [37] in (4). In titioned with respect to the pth row and pth column, that is
particular, Pan’s 3-D Cat matrix C3-D
P is defined as follows:
⎡ ⎤
(n−1)D (n−1)D
⎡ ⎤ (n−1)D
CNI C NII
1 a c CN = ⎣ (n−1)D (n−1)D
⎦.
⎣ b ab + 1 CN CN
P =
C3-D bc ⎦ (7) III IV
d abcd cd + 1 Since all |Bp | = 1, then |CnD
N | = 1 and CnD
N is indeed an nD
Cat matrix.
where a, b, c, and d are integer control parameters.
D. Discussion
C. nD Cat Map Generation Methods When given the number of finite states, the trajectory of the
Besides the efforts on generating 3-D Cat matrices, high- Arnold’s Cat map can be predicted. The parameter space of the
dimensional Cat map generation methods have also been parametric Arnold’s Cat matrix C2-D para. is obviously too small
explored. for cryptography applications. The 3-D Cat matrices gener-
Falcioni et al. [40] proposed their nD Cat matrix CnD F by ated by above-mentioned methods have the largest parameter
replacing parameters in C2-D
para. with matrix ones as defined space of M 6 (M is the number of possible values of each
matrix parameter) attained by C3-D C . Taking M = 256 as an
Im×m Pa example, then (256) = 2 2 , which is far smaller than
6 48 128
CnD = (8)
F Pb Pb Pa + Im×m the required size to resist brute-force attacks [43]. This implies
where I is the mth order identity matrix with 1 ≤ m ≤ n, and that applications directly using these parametric 3-D Cat matri-
Pa and Pb are arbitrary parameter matrices of size m × (n − m) ces are insecure. Consequently, these 3-D Cat matrices are
and (n − m) × m, respectively. It is easy to verify that commonly used with additional components [24].
The parametric nD Cat matrices have many matrix elements.
nD
C = |I| · (Pb Pa + I) − Pb I−1 Pa However, because of many matrix multiplications involved in
F
their generation methods, their computation complexity is high
= |I| · |I| and their matrix elements are strongly correlated with each
= 1. (9) other. Correlated elements are difficultly coprime even with
coprime parameters. For a Cat map system, coprime elements
When m = 1 and n = 2, this nD Cat matrix becomes the often result in a long period of outputs [28], which is desired
parametric 2-D Cat matrix C2-D para. in (3). for many applications [44]. Also, when used in cryptography
Tang and Tang [41] proposed an nD Cat map gen- applications, correlated elements might reduce the actual key
eration method by coupling 2-D dynamics developed by space of the security system and thus it is vulnerable for the
Chen et al. [24]. It firstly couples dynamics in any two of the brute-force attacks [40]. This is because with correlated ele-
nDs, and then mixes all these coupled matrices together as ments, the actual number of distinctive Cat matrices that can
be generated could be less than the parameter space where
T = CT1,2 CT1,3 · · · CT1,n CT2,3 · · · CTn−1,n
CnD nD nD nD nD nD
(10)
parameters are commonly used as keys.
where each coupled Cat matrix CnD Tp,q (q > p) is an identical III. P ROPOSED M ETHOD
matrix except for elements CTp,q (p, q) = apq , CnD
nD
Tp,q (q, p) = This section presents the proposed nD Cat map generation
bpq and CnD (q, q) = a b
pq pq + 1. In total, CnD is a method in detail. First, a theorem for the nD Cat matrix is
Tp,q
n T
mixed matrix of 2 nD pairwise-coupled Cat matrices. Since introduced. Based on this theorem, we then give a lemma
Tp,q | = 1, then |CT | = 1.
|CnD nD
of extending a Cat matrix from (n − 1)D to nD. Finally, we
Starting with C2-D N = Cpara. , Nance [42] recursively con-
2-D propose our method to generate nD Cat matrices.
structed his nD Cat matrix CnD N using matrix union, which is
defines as A. Theorem for nD Cat Matrix
An nD Cat matrix is an n × n square matrix with the
n
constraint that its determinant is 1. First of all, we intro-
N = B1 B2 · · · Bn =
CnD Bp (11)
p=1 duce Theorem 1 that allows us to construct an nD Cat matrix
conditionally.
where the pth basis Cat matrix Bp (1 ≤ p ≤ n) is obtained by Theorem 1: For an n × n square matrix X, if an element Xij
(n−1)D
expanding CN with respect to the pth diagonal elements as with a cofactor AXij = 1 satisfies the relation
⎡ (n−1)D ⎤ ⎛ ⎞
CN 0p×1 CN
(n−1)D n
⎢ I II
⎥ Xij = (−1)i+j ⎝1 − Xkj (−1)k+j AXkj ⎠ (12)
⎢ 01×(n−p−1) ⎥
Bp = ⎢ 01×p 1 ⎥ k=1,k=i
⎣ ⎦
(n−1)D (n−1)D for all other elements and their cofactors, then |X| = 1 and X
CN 0(n−p−1)×1 CN
III IV is an nD Cat matrix.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
Because (12) is also satisfied, X is then an nD Cat matrix as Fig. 1. Extending an (n − 1)D Cat matrix to nD. (a) (n − 1)D Cat
matrix C(n−1)D . (b) Extending matrix with respect to the element located
Theorem 1 states. nD .
at (i, j). (c) Adding new elements on the ith row or the jth column except Ci,j
Lemma 1 indicates that an nD Cat matrix CnD can be gen- (d) Computing the element Ci,j nD using (12) and generating new nD
erated in a parametric way, where the parameters consist of a Cat matrix CnD .
given (n − 1)D Cat matrix C(n−1)D , the location of the ele-
ment Xij associated with C(n−1)D , and 2(n − 1) additional
In the rest of this paper, when generating an nD Cat matrix
matrix elements. Fig. 1 illustrates the procedures of extending
using our proposed method, CnD ours∗ indicates that all parame-
an (n − 1)D Cat matrix to nD. As can be seen, two ran-
ters in I and J are restricted to be constant 2 (Fig. 2) and all
dom spatial parameters (i, j) divide the (n − 1)D Cat matrix
(n−1)D (n−1)D (n−1)D parameters in P and Q are randomly determined, while CnD ours
[Fig. 1(a)] into four parts: 1) CUL ; 2) CUR ; 3) CLL ;
(n−1)D denotes that all parameters in I, J, P, and Q are randomly
and 4) CLR , and then add new elements on the ith row and
determined.
jth column expect CnD i,j , whose value is computed using (12).
The generated nD Cat matrix is shown in Fig. 1(d).
IV. M ETHOD D ISCUSSION
Because most parameters to generate an nD Cat matrix
C. Proposed nD Cat Map Generation Method using Laplace expansions are highly independent, users have
Suppose 1-D Cat matrix C1-D = [1]1 , any Cat matrix with great flexibility to select different parameters to generate a
a desired dimension can be constructed using Lemma 1 and large number of nD Cat matrices. This section discusses
C1-D . The proposed nD Cat matrix generation method using the parameter settings and proposes a computation efficiency
Laplace expansions is defined as follows: improvement method for generating nD Cat matrices with
Laplace expansions.
Ours = L(I, J, P, Q)
CnD (13)
Fig. 2. Example of generating a 6-D Cat matrix. (a) 1-D Cat matrix C1-D (dummy). (b) 2-D Cat matrix C2-D . (c) 3-D Cat matrix C3-D . (d) 4-D Cat
matrix C4-D . (e) 5-D Cat matrix C5-D . (f) 6-D Cat matrix C6-D .
Ours = L(I, J, P, Q)
Algorithm 1 Proposed nD Cat Map Generation Method CnD
Input: I = {i1 , i2 , . . . , in−1 } is an vector with ik ∈ [1, k + 1] for all k ∈ [1, n − 1]
Input: J = { j1 , j2 , . . . , jn−1 } is an vector with jk ∈ [1, k + 1] for all k ∈ [1, n − 1]
Input: P = {P1 , P2 , . . . , Pn−1 } is a vector list and Pk is a k-length vector for all k ∈ [1, n − 1]
Input: Q = {Q1 , Q2 , . . . , Qn−1 } is a vector list and Qk is a k-length vector for all k ∈ [1, n − 1]
1: C1D = [1];
2: for k = 1 to n − 1 do
3: Extend CkD into a (k + 1) × (k + 1) matrix C(k+1)D by placing its partitions CkD kD kD kD
UL , CUR , CLL and CLR with respect to
the associated element location (ik , jk );
4: Set elements in the ik -th row and jk -th column in the extended matrix with respect to the parameter vectors Pk and Qk
as follows
(k+1)D Pkm if m < jk (k+1)D Qkm if m < ik
Cik ,m = and C m,jk = ;
Pm−1 if m > jk
k Qm−1 if m > ik
k
(k+1)D
5: Calculate element Cik ,jk using (12).
6:end for
Ensure: nD Cat matrix CnD with CnD = 1
TABLE I
When extending an (n − 1)D Cat matrix C(n−1)D to CnD , PARAMETER S PACES OF nD C AT M APS G ENERATED
2(n − 1) independent matrix elements are needed [Fig. 1(c)]. U SING L APLACE E XPANSIONS
Thus, the total number of MEPs can be computed as
NMEP = 2(n − 1) + 2(n − 2) + · · · + 2
= n2 − n.
If we assume that all MEPs are selected from a symbol set with
M possible values, then the total number of different choices
to form (n2 − n) MEPs is CMEP = M n −n . Finally, due to
2
the independency of SCPs and MEPs, the whole parameter (Q is an orthogonal matrix and R is an upper triangular
space is simply the production of their individual parameter matrix) [45]. Thus, computing the unknown element by (12)
spaces, namely CS = CSCP CMEP , which can be seen in costs the computation complexity of order O(n4 ). Extending
Table I. Thus users have great flexility to choose different an (n − 1)D Cat matrix to nD also requires the computation
parameter settings to generate a large number of different nD complexity of order O(n4 ) because it needs to compute only
Cat matrices. the unknown element in (12). Therefore, generating an nD Cat
matrix from the 1-D Cat matrix C1-D requires the computa-
B. Computation Efficiency Improvement tion complexity of order O(n5 ). In order to further improve
Computing the unknown element in (12) requires to per- the computation efficiency, we introduce Theorem 2.
form n multiplications and n additions and to evaluate the Theorem 2: In the context of (12), Xij can be alternatively
determinants of (n − 1) matrices with size of (n − 1) × computed as
(n − 1). Calculating the determinant of an n × n matrix
Xij = (−1)i+j (1 − |G|) (16)
requires the computation complexity of order O(n3 ) when
using some methods like the Gaussian elimination, lower- with the aid of an auxiliary matrix G, whose element Gij = 0
upper (LU) matrix decomposition, or QR decomposition and all other elements are identical to those in X.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE III
A LGORITHM C OMPLEXITY OF D IFFERENT nD C AT M AP G ENERATION M ETHODS
Fig. 4. Matrix element correlation analysis of different nD Cat map generation methods.
Because of the high complexity of generating a multidi- {0, 1, 2, 3}). Suppose p and q are two different indexes
mensional Cat matrix, the computation and memory costs (1 ≤ p, q ≤ n2 ), the correlation coefficient (CE) between pth
are quite important factors to evaluate whether an nD Cat and qth matrix elements in CnD ∗ is defined as follows:
map generation method is suitable for the applications.
CnD
E Sp − μSp Sq − μSq
Table III lists the algorithm complexity of different nD Cat CE (p, q) =
∗ (20)
map generation methods. As can be seen, for generating σSp σSq
an nD Cat matrix, the proposed method requires n2 mem- where μ and σ are the mean value and standard deviation and
ory cells and its computation complexity is O(n4 ), which Sp and Sq are sequences of matrix elements in the form of
is one magnitude less than the Tang and Tang’s [41] and
Nance’s [42] methods. Sp = CnD∗1 [p], . . . , C∗1000 [p]
nD
Sq = CnD∗1 [q], . . . , C∗1000 [q] .
nD
(21)
C. Matrix Element Correlation They contain the pth and qth elements in these 1000 ran-
nD
In the process of the nD Cat matrix generation, the set- domly generated matrices, respectively. Thus, CEC∗ (p, q) is
tings of matrix elements are totally decided by the generation the correlation coefficient between the sequences Sp and Sq .
method. The Cat matrices generated by different methods have The CE value closing to 0 means low correlation between
different degrees of inner correlations between their matrix Sp and Sq while closing to 1 means high correlation.
elements. As discussed in Section II-D, an nD Cat matrix Fig. 4 plots the magnitudes of these correlation coeffi-
with low inner correlation is commonly preferred for many cients for 3-D, 4-D, 5-D, and 6-D Cat matrices generated
applications. by various methods. As can be seen for each color matrix,
To analyze the correlations of matrix elements in nD Cat the values in the pth row denote the correlation coefficients
matrices generated by different methods, we perform the between the pth matrix element and all the n2 matrix ele-
nD nD nD
following correlation analysis: for each nD Cat map gen- ments, namely CEC∗ (p, 1), CEC∗ (p, 2), . . . , CEC∗ (p, n2 ),
nD nD nD
eration method ∗, we randomly generate 1000 Cat matrices because CEC∗ (p, q) = CEC∗ (q, p) and CEC∗ (p, p) = 1,
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE IV
S TATISTICS OF nD C AT M ATRIX E LEMENTS T HAT C OULD BE
C ONTROLLED BY D IFFERENT N UMBERS OF MEP S IN
D IFFERENT M ETHODS
(a) (b)
all magnitudes are on the main diagonal symmetry and the Fig. 5. Shannon entropy values of nD Cat maps for N = 2. (a) Mean of
magnitudes on the main diagonal line are 1, marked as red. Shannon entropy values of nD Cat maps versus map dimension n. (b) Sorted
Shannon entropy scores of 10-D Cat maps for each generation method.
It is easy to see that CnD ours∗ generated with specific spatial
configurations have patterns in their element correlation plots,
while CnDours generated with randomly determined spatial con- Hmin = 0 implies that the system is completely predictable
figurations have CE values close to 0. Besides, it is noticeable and Hmax = n log2 N when if and only if all observations
that multidimensional Cat matrices generated by the proposed absolutely uniformly distribute over the N n states.
method have smaller CE values, and thus have less correlated Two experiment groups of Shannon entropy analysis are
matrix elements than those of other methods. performed to evaluate the randomness of various nD Cat
All these methods have their own characteristics in gen- map generation methods. The first group of experiments is
erating multidimensional Cat matrices. For example, if the to analyze the Shannon entropy values against the Cat map
generated multidimensional Cat matrices always contain a con- dimension n by fixing N = 2. For each Cat map generation
stant element in a fixed position, the correlation between this method, we randomly generate 5N n nD Cat maps and com-
element and any other elements is always 0. On the other pute the Shannon entropy values of these nD Cat maps for
hand, the more elements controlled by a single MEP, the n ∈ {3, 4, . . . , 10}. The observation time series is of length
less correlation between two Cat matrix elements. For the 2n+1 with respect to the initial state Y(0) = 1n×1 .
multidimensional Cat matrices generated by various methods, The mean Shannon entropy results of different methods are
Table IV lists the statistics of their elements that could be con- given in Fig. 5(a). As can be seen, the values of all gener-
trolled by different numbers of MEPs. It is clear that CnD ours∗ ation methods increase as the dimension n increases except
generated by the proposed method with fixed spatial param- for the Cat maps generated by the Nance’s [42] method.
eters has the largest number of elements controlled by one The low randomness of the Nance’s method is caused by
MEP, implying that most of matrix elements in the nD Cat its small parameter space and high matrix element correla-
matrices are independent. Considering spatial parameters, no tions, which can be seen in Table II and Fig. 4, respectively.
element in CnDours is a constant and all of them are determined The nD Cat maps generated by the proposed methods achieve
in a more complicated way involving both SCPs and MEPs. high Shannon entropy values for all test dimensions. Fig. 5(b)
Consequently, for the Cat matrices generated by the proposed shows the Shannon entropy values of 10-D Cat maps gen-
method, any two of their elements are uncorrelated as shown erated by different methods in the ascending order. Our
in Fig. 4. methods CnD nD
ours∗ and Cours have bigger Shannon entropy val-
ues than other methods in the first 4000 10-D Cat maps.
D. Shannon Entropy Tang and Tang’s [41] method can achieve the biggest Shanon
Due to the finite precision of digital devices, the nD Cat entropy values when the number of 10-D Cat maps is over
maps are commonly used in discrete forms in real-world 4000. At last, our proposed and Tang and Tang’s [41] meth-
applications as shown in (1). In (1), Y(t) and Y(t + 1) are ods can achieve the same biggest Shannon entropy values.
observations of the outputs of the nD Cat map with respect to Fig. 5(b) also shows that the outputs of 10-D Cat maps
time t and t + 1. Each observation has n channels and each generated by our methods CnD nD
ours∗ and Cours have similar ran-
channel has N states. Thus observation Y(t) has the change to domness. This is because their MEPs are randomly selected
attain a finite number N n of states. from the same data set. Table V lists the maximum Shannon
The randomness of the discrete nD Cat map can be entropy values for nD Cat maps generated by different meth-
measured by the Shannon entropy [17] defined as follows: ods with various dimensions. It is noticeable that the proposed
n
and Tang and Tang’s [41] methods are able to generate nD
N
Cat maps with high Shannon entropy values that are quite
H=− Pr(k) log2 Pr(k) (22) close to the theoretical maximum Shannon entropy values
k=1
Hmax = n log2 N = n.
where Pr(k) denotes the probability of seeing an observation The second group of experiments is to analyze the Shannon
Y(t) in the kth state. Then we have 0 ≤ H ≤ n log2 N and entropy values against the state number N by fixing the dimen-
a bigger Shannon entropy value indicates better randomness. sion n = 3. The state number N = {2, 3, . . . , 10} and for each
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
TABLE V
M AXIMUM S HANNON E NTROPY VALUES OF nD C AT M APS
G ENERATED BY D IFFERENT M ETHODS W ITH N = 2
Fig. 6. Shannon entropy of 3-D Cat maps. (a) Mean of Shannon entropy E. Kolmogorov Entropy
values of 3-D Cat maps versus the number of channel states N. (b) Sorted
Shannon entropy scores of 3-D Cat maps with N = 10 for each generation The Kolmogorov entropy [49] can measure whether extra
method. information is needed to predict the trajectory of a dynamical
system, which is defined as follows:
TABLE VI
M AXIMUM S HANNON E NTROPY VALUES OF 3-D C AT M APS KE = lim τ −1 lim lim Km,τ (ε) (23)
G ENERATED BY D IFFERENT M ETHODS τ →0 ε→0 m→∞
where m is the embedding dimension, Km,τ (ε) is defined by
Km,τ (ε) = − p(i1 , . . . , im ) log p(i1 , . . . , im ). (24)
i1 ,...,im ≤n(ε)
TABLE VII
M AXIMUM KOLMOGOROV E NTROPY VALUES OF nD C AT M APS
G ENERATED BY D IFFERENT M ETHODS
As can be seen, the nD Cat maps generated by the proposed Fig. 8. Diehard statistical test results.
methods can achieve positive mean Kolmogorov entropy val-
ues and the values become bigger as the dimension n increases. TABLE VIII
For other methods, their randomly generated nD Cat maps T EST U01 R ESULTS FOR B INARY S EQUENCES
W ITH D IFFERENT L ENGTHS
achieve quite small mean Kolmogorov entropy values that are
close to 0. This is because the trajectories of the discrete Cat
map are periodic [29] and its period is small when the ele-
ments of its Cat matrix are highly correlated. Table VII lists
the maximum Kolmogorov entropy values of nD Cat maps
generated by different methods with various dimensions n.
It is obvious that the proposed method is able to generate nD
Cat maps with bigger Kolmogorov entropy values than other
TABLE IX
methods. P ERFORMANCE C OMPARISONS OF D IFFERENT nD
C AT M AP G ENERATION M ETHODS
VI. P ROPOSED P SEUDORANDOM N UMBER G ENERATOR
To show the effectiveness of the nD Cat maps generated by
our proposed method, as an example, this section introduces
a PRNG using the 5-D Cat maps generated by the proposed
method.
Here, we set N = 1 and the initial value Y(0) as a float
number in (1). Given I, J, P, and Q, we use (13) to produce
a 5-D Cat matrix C5-Dours . Suppose {Y(t)|t = 1, 2, . . .} is the
output of C5-D
ours with the initial value Y(0). Y(t) is with size The sorted 234 p-values are all distributed on or nearby the
of 5 × 1. The proposed PRNG is defined as follows: uniform distribution line (the red line in Fig. 8). This means
T(t) = Bin Y(t) (26) that the generated random number sequence can pass the
31:32 Diehard statistical test.
where Bin[α]31:32 is a function to convert the float number α
into a 52-bit binary stream using the IEEE 754 standard [51]
and then fetch its 31st and 32nd digital numbers. B. TestU01 Test
TestU01 is a random number test package that provides con-
A. Diehard Statistical Test vinced empirical description for the quality of the PRNG [53].
Diehard statistical test suit [52] is a battery of statistical It contains six test batteries and three of them (Rabbits,
tests that is widely used for measuring the quality of a PRNG. Alphabit, and BlockAlphabit) are used to test the random-
It contains 15 subtests and shows good performance for data ness of binary sequences. Rabbits applies 38 subtests while
sequences with a large size. These 15 empirical subtests are Alphabit and BlockAlphabit apply 17 subtests. Each subtest
designed to find the nonrandomness areas in a large-size data will generate a p-value and the random number sequence is
sequence and total 234 p-values are generated. For a ran- considered to pass the subtest if the generated p-value is within
dom number sequence with high quality, these p-values are the range of [0.001, 0.999].
expected to randomly distribute to pass the Diehard statistical In our experiment, binary sequences with different lengths
test. If six or more p-values with 0 or 1 are obtained, a data are generated by the proposed PRNG and tested by Rabbits,
sequence is considered to fail the test. The size of the test Alphabit, and BlockAlphabit. The test results are shown in
sequence is suggested as 11 468 800 byte. Table VIII. As can be seen, binary sequences with different
Fig. 8 plots the Diehard statistical test results of a ran- lengths can pass almost all the subtests except for one subtest
dom number sequence generated by the proposed PRNG. in Rabbits.
This article has been accepted for inclusion in a future issue of this journal. Content is final as presented, with the exception of pagination.
[16] Z. Li, K. Li, C. Wen, and Y. C. Soh, “A new chaotic secure communi- [44] N. J. Corron and S. D. Pethel, “Control of long-period orbits and
cation system,” IEEE Trans. Commun., vol. 51, no. 8, pp. 1306–1312, arbitrary trajectories in chaotic systems using dynamic limiting,”
Aug. 2003. Chaos Interdiscipl. J. Nonlin. Sci., vol. 12, no. 1, pp. 1–7, 2002.
[17] Z. Hua, Y. Zhou, C.-M. Pun, and C. L. P. Chen, “2D sine logistic [45] J. A. Storer, An Introduction to Data Structures and Algorithms. Basel,
modulation map for image encryption,” Inf. Sci., vol. 297, pp. 80–94, Switzerland: Springer, 2001.
Mar. 2015. [46] A. Wolf, J. B. Swift, H. L. Swinney, and J. A. Vastano, “Determining
[18] S. Chen and H. Leung, “Ergodic chaotic parameter modulation with Lyapunov exponents from a time series,” Physica, vol. 16, no. 3,
application to digital image watermarking,” IEEE Trans. Image Process., pp. 285–317, 1985.
vol. 14, no. 10, pp. 1590–1602, Oct. 2005. [47] K. J. Persohn and R. J. Povinelli, “Analyzing logistic map pseudo-
[19] T. Habutsu, Y. Nishio, I. Sasase, and S. Mori, A Secret Key random number generators for periodicity induced by finite precision
Cryptosystem by Iterating a Chaotic Map. Berlin, Germany: Springer, floating-point representation,” Chaos Solitons Fractals, vol. 45, no. 3,
1991, pp. 127–140. pp. 238–245, 2012.
[20] J. Fridrich, “Symmetric ciphers based on two-dimensional chaotic [48] A. M. Davie and A. J. Stothers, “Improved bound for complexity of
maps,” Int. J. Bifurcat. Chaos, vol. 8, no. 6, pp. 1259–1284, 1998. matrix multiplication,” Proc. Roy. Soc. Edin. Sect. A Math., vol. 143,
[21] D. Xiao, X. F. Liao, and S. J. Deng, “One-way hash function con- no. 2, pp. 351–369, 2013.
struction based on the chaotic map with changeable-parameter,” Chaos [49] P. Faure and H. Korn, “A new method to estimate the Kolmogorov
Solitons Fractals, vol. 24, no. 1, pp. 65–71, 2005. entropy from recurrence plots: Its application to neuronal signals,”
[22] V. Patidar, K. K. Sud, and N. K. Pareek, “A pseudo random bit Phys. D Nonlin. Phenom., vol. 122, no. 1, pp. 265–279, 1998.
generator based on chaotic logistic map and its statistical testing,” [50] J. A. C. Gallas, “Structure of the parameter space of the Hénon map,”
Inform. Slovenia, vol. 33, no. 4, pp. 441–452, 2009. Phys. Rev. lett., vol. 70, no. 18, p. 2714, 1993.
[23] Y. Zhou, L. Bao, and C. L. P. Chen, “A new 1D chaotic system for [51] IEEE Standard for Floating-Point Arithmetic, IEEE Standard 754-2008,
image encryption,” Signal Process., vol. 97, pp. 172–182, Apr. 2014. 2008.
[24] G. Chen, Y. Mao, and C. K. Chui, “A symmetric image encryption [52] G. Marsaglia. Diehard Statistical Tests. [Online]. Available:
scheme based on 3D chaotic cat maps,” Chaos Solitons Fractals, vol. 21, http://www.stat.fsu.edu/pub/diehard/, accessed Sep. 22, 2015.
no. 3, pp. 749–761, 2004. [53] P. L’Ecuyer and R. Simard, “Testu01: A C library for empirical testing
[25] J. Ford, G. Mantica, and G. Ristow, “The Arnol’d cat: Failure of the of random number generators,” ACM Trans. Math. Softw., vol. 33, no. 4,
correspondence principle,” Phys. D Nonlin. Phenom., vol. 50, no. 3, p. 22, 2007.
pp. 493–520, 1991.
[26] L. Kocarev and S. Lian, Chaos-Based Cryptography: Theory, Algorithms
and Applications, vol. 354. Berlin, Germany: Springer, 2011.
[27] X. Tong and M. Cui, “Image encryption with compound chaotic Yue Wu (S’08–M’12) received the B.E. degree in
sequence cipher shifting dynamically,” Image Vis. Comput., vol. 26, telecommunication engineering from the Huazhong
no. 6, pp. 843–850, 2008. University of Sciences and Technologies, Hubei,
[28] G. Gaspari, “The Arnold cat map on prime lattices,” Phys. D Nonlin. China, in 2001, the M.Sc. degree in applied mathe-
Phenom., vol. 73, no. 4, pp. 352–372, 1994. matics from the University of Toledo, Toledo, OH,
[29] F. Chen, K.-W. Wong, X. Liao, and T. Xiang, “Period distribution of USA, in 2008, and the Ph.D. degree in electrical
the generalized discrete Arnold cat map for N = 2e ,” IEEE Trans. Inf. engineering from Tufts University, Medford, MA,
Theory, vol. 59, no. 5, pp. 3249–3255, May 2013. USA, in 2012.
[30] I. Antoniou, B. Qiao, and Z. Suchanecki, “Generalized spectral He was a Scientist with the Raytheon BBN
decomposition and intrinsic irreversibility of the Arnold Cat Map,” Technologies, Cambridge, U.K. He is currently a
Chaos Solitons Fractals, vol. 8, no. 1, pp. 77–90, 1997. Computer Scientist with the Information Sciences
[31] S. Weigert, “Quantum chaos in the configurational quantum cat map,” Institute, University of Southern California Viterbi School of Engineering.
Phys. Rev. A, vol. 48, no. 3, pp. 1780–1798, 1993. His current research interests include information security, image processing,
[32] A. Lakshminarayan and N. Balazs, “On the quantum cat and sawtooth pattern recognition, and their real applications.
maps—Return to generic behaviour,” Chaos Solitons Fractals, vol. 5,
no. 7, pp. 1169–1179, 1995.
[33] S. P. Kuznetsov, “Disheveled Arnold’s cat and the problem of quantum- Zhongyun Hua (S’14) received the B.S. degree
classic correspondence,” Phys. D Nonlin. Phenom., vol. 137, no. 3, in software engineering from Chongqing University,
pp. 205–227, 2000. Chongqing, China, in 2011, and the M.S. degree in
[34] S. V. Neshveyev, “On the K-property of quantized Arnold cat maps,” software engineering from the University of Macau,
J. Math. Phys., vol. 41, no. 4, pp. 1961–1965, 2000. Macau, China, in 2013, where he is currently pur-
[35] A. M. F. Rivas, M. Saraceno, and A. M. Ozorio de Almeida, suing the Ph.D. degree from the Department of
“Quantization of multidimensional cat maps,” Nonlinearity, vol. 13, Computer and Information Science.
no. 2, p. 341, 2000. His current research interests include chaos-based
[36] L. Barash and L. N. Shchur, “Periodic orbits of the ensemble applications, multimedia security, and signal/image
of Sinai-Arnold cat maps and pseudorandom number generation,” processing.
Phys. Rev. E, vol. 73, no. 3, 2006, Art. ID 036701.
[37] S. Lian, Y. Mao, and Z. Wang, “3D extensions of some 2D chaotic
maps and their usage in data encryption,” in Proc. 4th Int. Conf. Control
Autom., Montreal, QC, Canada, 2003, pp. 819–823. Yicong Zhou (M’07–SM’14) received the B.S.
[38] H. Liu, Z. Zhu, H. Jiang, and B. Wang, “A novel image encryption degree from Hunan University, Changsha, China,
algorithm based on improved 3D chaotic cat map,” in Proc. 9th Int. in 1992, and the M.S. and Ph.D. degrees from Tufts
Conf. Young Comput. Sci., Hunan, China, 2008, pp. 3016–3021. University, Medford, MA, USA, in 2008 and 2010,
[39] T. G. Pan and D. Y. Li, “A new algorithm of image encryption based on respectively, all in electrical engineering.
3D Arnold Cat,” in Adv. Eng. Forum, vol. 1, pp. 183–187, Sep. 2011. He is currently an Assistant Professor with
[40] M. Falcioni, L. Palatella, S. Pigolotti, and A. Vulpiani, “Properties the Department of Computer and Information
making a chaotic system a good pseudo random number generator,” Science, University of Macau, Macau, China. He
Phys. Rev. E, vol. 72, no. 1, 2005, Art. ID 016220. has authored/co-authored over 90 papers, including
[41] K. W. Tang and W. K. S. Tang, “A chaos-based secure voice commu- 14 IEEE T RANSACTION papers, six most down-
nication system,” in Proc. IEEE Int. Conf. Ind. Technol., Hong Kong, loaded/popular papers in corresponded journals, and
2005, pp. 571–576. one highly cited paper within the top 1% of published papers in the Institute
[42] J. Nance, “Periods of the discretized Arnold Cat Map for Scientific Information (ISI) database up to 2015. His current research
and its extension to n dimensions,” [Online]. Available: interests include chaotic systems, multimedia security, image processing and
http://arxiv.org/pdf/1111.2984v1.pdf, 2013. understanding, and machine learning.
[43] G. Alvarez and S. Li, “Some basic cryptographic requirements for Dr. Zhou was a recipient of the third price of the Macau Natural Science
chaos-based cryptosystems,” Int. J. Bifurcat. Chaos, vol. 16, no. 8, Award in 2014. He is a member of the International Society for Optical
pp. 2129–2151, 2006. Engineers and the Association for Computing Machinery.