Neuromorphic Chaotic Dynamics as a Software-Defined Source of Cryptographic Randomness
Authors/Creators
Description
Abstract
Cryptographic systems fail when their randomness fails. Most software generators are deterministic by construction, while high assurance entropy sources are usually tied to dedicated hardware. This preprint examines a third direction: a neuromorphic,
chaotic, time-axis-driven entropy source implemented as a software-defined dynamical system.
The claim is intentionally behavioral rather than architectural. Internal design details are withheld. What is reported instead is
the observable statistical behavior of the raw stream under familiar validation frames. In the latest recorded evaluation set, the
source passed 186/188 NIST STS subtests, produced a broad dieharder pass profile with a single explicit failure and two weak flags, and reached a latest direct SP 800-90B result of 7.883983 bits/byte under the IID path and 7.322342 bits/byte under the final conservative non-IID path.
These numbers do not establish a finished certification-ready entropy subsystem. They do establish something more important
for a preprint: a neuromorphic temporal process can produce statistically credible cryptographic randomness in software, and it
can do so while operating as a dynamic process rather than as a conventional static pseudorandom routine.
Files
NMCRYPT_Neuromorphic_Entropy_Preprint.pdf
Files
(97.2 kB)
| Name | Size | Download all |
|---|---|---|
|
md5:ecc82e5264f7744ce6149ca89e73f6bd
|
11.9 kB | Preview Download |
|
md5:df90d2eecb6764f49f775f6d62902899
|
85.2 kB | Preview Download |
Additional details
Software
- Programming language
- Rust