1 Introduction

Since the couple map lattice (CML) has been proposed [1], it has been considered to be a powerful tool in many theoretical and practical fields, such as chemical, population, convection, fluid flow, biology, and computer networks [24]. Meanwhile, the conception of chaotic iteration has been discussed for a long time by different scientists such as Robert [5] and Chazan [6] in different methods. However, their focuses were both on the conditions of convergence; more wide range of chaotic iteration has not been discussed. The breakthrough happened in the literature of [7]; the author proved a very useful theorem that as long as the function f is under the transitivity condition, the chaotic iteration can be written in a chaotic map under the sense of Devaney chaos. We use this theorem to help us design a new pseudorandom number generator (PRNG). So that in this term, this new PRNG is chaotic in a sense of Devaney.

On the other hand, PRNG is widely utilized in the industry, as simulation, sampling, numerical analysis, computer programming, decision making, recreation, cryptographic protocols, and cryptosystems, etc. [814]. It is hard to obtain the truly random numbers, alternatively, people use PRNG in practical work. So generally, people use seeds and determinant processes to generate sequences which has good randomness and that is PRNG.

In this paper, we are trying to combine those two technologies of CML and chaotic iteration to get a new PRNG. And we can prove that this new algorithm can be reformed into a form of chaotic map under sense of Devaney chaos. And we do several experiments as NIST 800-22 statistical test suit [15], draw the autocorrelation and histogram figures, and we use the new algorithm in the image encryption. The results we obtained are pretty good and demonstrate that this new PRNG is suitable for practice.

2 Basic definition

We know that chaotic iteration is such a map [7]:

(1)

B donates {0,1}. {1;N} donates {1,2,…,N}. S n donatse the nth element of a sequence S, which elements all belong to {1;N}. And f is a chosen function. In the literature [7], as long as f satisfies the transitivity condition, this chaotic iteration is chaotic under Devaney’s chaotic definition.

And as we know, one of the simplest CML is in the form

$$ \begin{array}{l} x_{j}^{n + 1} = (\alpha)\bigl[f_{j}\bigl(x_{j}^{n}\bigr)\bigr] + (1 - \alpha) \bigl[f_{j - 1}\bigl(x_{j - 1}^{n}\bigr)\bigr], \\[6pt] \quad j\in \{1;M\} \end{array} $$
(2)

Here, we choose α=0.5. M is the number of raw.

If f:χχ, then (χ,d) is a metric space.

Definition 1

f is said to be topologically transitive if, for any pair of open sets U,Vχ, there exists k>0 such that f k(U)∩Vϕ.

Definition 2

(χ,f) is said to be regular if the set periodic points is dense in χ.

Definition 3

f has sensitive dependence on initial conditions if there exist δ>0 such that, for any xχ and any neighborhood V of x, there exist yV and n≥0 such that |f n(x)−f n(y)|>0.

Now the definition of Devaney chaotic topological system is [16]:

Definition 4

f:χχ is said to be chaotic on χ if (χ,f) is regular, topologically transitive, and has sensitive dependence on initial conditions.

3 New PRNG

The new PRNG we proposed is similar to CML where its definition is below:

$$ \bigl(S_{j}^{n + 1},E_{j}^{n + 1}\bigr) = G_{j}\bigl(S_{j}^{n},E_{j}^{n},E_{j - 1}^{n}\bigr), $$
(3)
$$ \begin{array}{l} G:[1;N]\times \mathbf{B}^{N} \times \mathbf{B}^{N} \mapsto [1;N]\times \mathbf{B}^{N} \\[6pt] \quad j\in \{ 1;M \}, \\[6pt] G_{j}\bigl(S_{j}^{n},E_{j}^{n},E_{j - 1}^{n}\bigr) \\[6pt] \quad = \bigl(\sigma\bigl(S_{j}^{n}\bigr),F_{j}\bigl(\sigma\bigl(S_{j}^{n}\bigr),E_{^{j}}^{n}, E_{^{j -1}}^{n}\bigr)\bigr), \\[6pt] F:[1;N]\times \mathbf{B}^{N} \times\mathbf{B}^{N} \mapsto\mathbf{B}^{N}\quad \forall i \in\{ 1;N \}, \end{array} $$
(4)
(5)
$$ \sigma :[1;N] \mapsto [1;N],\quad \sigma\bigl(S^{n}\bigr) = S^{n + 1}, $$
(6)
(7)
$$ \begin{array}{l} f:\mathbf{(B}^{N},\mathbf{B}^{N}) \mapsto\mathbf{B}^{N} \\[6pt] f_{j}\bigl(E_{j}^{n},E_{j - 1}^{n}\bigr) = \neg\bigl(E_{j}^{n} \oplus E_{j - 1}^{n}\bigr), \end{array} $$
(8)
$$ S_{j}^{n} = g_{j}\bigl(x_{j}^{0},r_{j}\bigr) $$
(9)

Define the new distance as

and

\((S_{j}^{n},E_{j}^{n})\) donate the jth row nth time note, which \(S_{j}^{n} \in [1;N], E_{j}^{n} \in\mathrm{B}^{N}, \mathrm{B} = \{ \mathrm{0,1} \}\). S n donates the nth term of a sequence S, which elements belong to [1;N]. S is called a strategy. \((E_{j}^{n})^{i}\) donates the ith element of the jth row nth time number sequence, which elements belong to B N. g k donate \(\underbrace{g \circ g\cdots g}_{k\ \mathrm{time}}\).

Here, by the proof of literature [7], it is easy to find that the function f is under the condition of transitivity.

Theorem 1

\(f_{j}(E_{j}^{n},E_{j - 1}^{n}) = \overline{E_{j}^{n} \oplus E_{j - 1}^{n}}\) is under the transitivity condition.

We call our new method a couple map lattice based on discrete chaotic iteration (CMLDCI). And to more details of CMLDCI, we use the simple boundary rule:

$$\bigl(S_{1}^{n + 1},E_{1}^{n + 1}\bigr) = G_{1}\bigl(S_{1}^{n},E_{1}^{n},E_{M}^{n}\bigr) $$

4 Experiment

To specify, we choose

We test it in the NIST 800-22 statistical test suits and we get the result in Table 1. In the NIST 800-22 tests, if p-value ≥0.01, then the PRNG passes this test, and the larger p-value is the larger randomness PRNG has. And we use the generated pseudorandom number (PRN) to encrypt the Lena image. Here, we use each 8-bit state of each note in our algorithm to form the 8-bit integer of the image. We obtained the original and encrypted image in Fig. 1(a) and Fig. 1(b), respectively. And we get the histogram figure of the original and encrypted image in Fig. 2(a) and Fig. 2(b), respectively.

Fig. 1
figure 1

Result of the encrypted Lena image

Fig. 2
figure 2

The histogram figure of the original and encrypted image

Table 1 Result of NIST 800-22 test suits

5 Conclusion and future work

In this paper, we propose a new PRNG combining the technology of CML and chaotic iteration and we prove it can be transformed into a chaotic map under the sense of Devaney. We do NIST 800-22 test suits on it. We use it in an image encryption. And we draw the histogram of the original and encrypted Lena map. In the future, we hope to prove the algorithm that can also be in a form of the Li–York chaotic map and use it in a parallel condition.