PRNG Implementation Based on Chaotic Neural Network (CNN)


  • Mohammed J. Mohammed Department of Computer & Communication Engineering, Nawroz University, Duhok, Kurdistan Region – Iraq



In this work, a neural network with chaos activation function has been applied as a pseudo-random number generator (PRNG). Chaotic neural network (CNN) is used because of its noise like behaviour which is important for cryptanalyst to know about the hidden information as it is hard to predict. A suitable adaptive architecture was adopted to generate a binary number and the result was tested for randomness using National Institute of Standard Technology (NIST) randomness tests.

Although the applications of CNN in cryptography have less effective than traditional implementations, this is because these systems need large numbers of digital logic or even a computer system. This work will focus on applications that can use the proposed system in an efficient way that minimize the system complexity.


Download data is not yet available.


1. W. Stallings, Cryptography and Network Security: Principles and Practice, 5th Edition, Pearson Education Inc., 2011.
2. Ü. Güler and S. Ergün, “A high speed, fully digital IC random number generator,” International Symposium on Circuits and Systems (ISCAS 2010), Paris, France. May 30-June 2, 2010.
3. A. Rukhin, et al. "A Statistical Test Suite for Random and Pseudo-random Number Generators for Cryptographic Applications”, NIST Special Publication 800-22, 2001.
4. S. Chatzidakis, P. Forsberg, and L. H. Tsoukalas, “Chaotic neural networks for intelligent signal encryption,” IEEE 5th International Conference on Information, Intelligence, Systems and Applications, IISA 2014.
5. P. Singla, P. Sachdeva, and M. Ahmad, “A chaotic neural network based Cryptographic pseudo-random sequence design,” 4th International Conference on Advanced Computing & Communication Technologies, ACCT '14, 2014.
6. F. Hsiao, Y. Tsai, K. Hsieh and Z. Lin, “Fuzzy Control for Exponential H∞ Synchronization of Chaotic Cryptosystems Using an Improved Genetic Algorithm,” 11th IEEE.
International Conference on Control & Automation (ICCA), Taichung, Taiwan. June 18-20, 2014.
7. S. Behnia, A. Akhavan, A. Akhshani, and A. Samsudin ,“ A novel dynamic model of pseudo random number generator,” Journal of Computational and Applied Mathematics 235 (2011) 3455–3463.
8. A. Akhshani, A. Akhavan, A. Mobaraki, S.-C. Lim, and Z. Hassan, “Pseudo random number generator based on quantum chaotic map,” Commun Nonlinear Sci Numer Simulat 19 (2014) 101–111.
9. A. S. Mansingka, A. G. Radwan, and K. N. Salama, “ Fully digital 1-D, 2-D and 3-D multiscroll chaos as hardware pseudo random number generators,” 55th IEEE International Midwest Symposium on Circuits and Systems (MWSCAS) Circuits and Systems (MWSCAS), pp 1180-1183. August 2012.
10. Shiguo Lian, “A block cipher based on chaotic neural networks,” Neurocomputing 72, pp. 1296–1301, 2009.
11. Ö. F. Ertuğrul, “A Novel Approach to Synchronization Problem of Artificial Neural Network in Cryptography,” American Association for Science and Technology, AASCIT Communications, Volume 1, Issue 2, pp. 27-32, July 2014.
12. A. Yay and Y. Kutlu, “Neural network based cryptography,” Neural Network World 24 (2), 177-192, 2014.
13. S. D. Joshi, V. R. Udupi, and D. R. Joshi, “A novel neural network approach for digital image data encryption/decryption,” IEEE International Conference on Power, Signals, Controls and Computation (EPSCICON), June 2012.
14. S. Jhajharia, S. Mishra, and S. Bali, “Public key cryptography using neural networks and genetic algorithms,” IEEE 6th International Conference on Contemporary Computing (IC3), pp. 137-142. Aug. 2013.
15. P. Kotlarz and Z. Kotulski, “Neural network as a programmable block cipher,” Advances in Information Processing and Protection, pp 241-250, 2007.
16. A. A. El-Zoghabi, A. H. Yassin, and H. H. Hussien, “Survey report on cryptography based on neural network,” International Journal of Emerging Technology and Advanced Engineering, vol. 3, Issue 12, Dec 2013.
17. A. G. Bafghi, R. Safabakhsh, and B. Sadeghiyan, “Finding the differential characteristics of block ciphers with neural networks,” Information Sciences 178, pp. 3118–3132, 2008.
18. L. P. Yee and L. C. De Silva, “Application of multilayer perceptron networks in symmetric block ciphers,” International Symposium on Neural Networks - ISNN , vol. 2, pp. 1455-1458, 2002.
19. M. Arvandi, S. Wu and A. Sadeghian, “On the use of recurrent neural networks to design symmetric ciphers,” IEEE Computational Intelligence Magazine, vol. 3, no. 2, pp. 42-53, May 2008.
20. J. M. Zurada, Introduction to Artificial Neural Systems, West Publishing Company, 1992.
21. (2014, Dec 15). Chaotic System, Available:
22. P. Y. Kostenko, A. N. Barsukov, A. V. Antonov, and S. I. Sivachinko, “Recovery of binary message, masked with derivative of mackey–glass chaotic process,” Radioelectronics and Communications Systems, vol. 52, no. 2, pp. 89–9, 2009.
23. D. Viswanath, “The fractal property of the Lorenz attractor,” Physica D 190, pp.115–128, 2004.
24. E. McEvoy, “Using Matlab to integrate ordinary differential equations (ODEs),” June 17, 2009.
25. (2014, Dec 15). Lorenz system, available:
26. [Y. Li, D. Xiao, S. Deng, Q. Han, and G. Zhou, “Parallel Hash function construction based on chaotic maps with changeable parameters,” Neural Computing and Applications, 20, pp.1305–1312, 2011.



How to Cite

Mohammed, M. J. (2019). PRNG Implementation Based on Chaotic Neural Network (CNN). Academic Journal of Nawroz University, 8(4), 158–163.