A Novel Hypogenetic Chaotic Jerk System: Modeling, Circuit Implementation, and Its Application

When revising the polarity and amplitude information in the feedback, a unique hypogenetic jerk system was obtained which has two controllers to switch the equilibria between stable and unstable. After providing some basic dynamical analysis, an electronic circuit was implemented, and the phase trajectory in the oscilloscope agrees with the numerical simulation. Further exploration shows that this unique chaotic system has superior performance as a random number generator or in voice encryption application.


Introduction
In the literature, chaos has a wide range of application field. In the recent years, chaos or chaotic systems have been frequently employed in the encryption and random number generation (RNG) studies due to noise-like, aperiodic characteristics of the chaotic systems [1]. In the literature, the encryption studies are not only about image encryption [2][3][4][5] but also there are encryption studies about text and other multimedia types like audio and video encryption [6]. It shows that chaos has great performance in the encryption system. In fact, RNG studies in the literature can be categorized into true random number generation (TRNG) and pseudo-random number generation (PRNG) regardless of whether they are chaos-based or not [7,8]. RNG is usually employed in cryptographic studies for key generation process and performance of the encryption which heavily depends on key randomness.
is can be achieved with appropriate chaos-based random number generation process. All these constitute our motivation to develop a new chaotic system. Jerk dynamical systems are realized with a compact electrical circuit structure. Generally, jerk circuits have four connections at the node x, where the derivative of x is determined by the amplitude and polarity of y, and the amplitude and polarity of x influence the derivative of z. We study those chaotic flows with incomplete information transmission from the node x based on the jerk structure and are therefore named hypogenetic chaotic. Jerk system has the simple structure but can also provide applicable chaotic signal [9][10][11][12][13]. When the feedback information from the other variables is not complete, many of the systems can remain chaos [14][15][16] even in the jerk structure as hypogenetic flows [14]. Hot research on chaotic systems mainly focuses on chaos control [17][18][19][20], Lyapunov exponent calculation and analysis [21,22], and doubling and growth of attractors [23,24], and chaotic systems with hidden attractors are also hot research topics because such systems are extremely prone to multistable phenomena, which are a common phenomenon in nature. Considering from equilibrium point, hidden attractors can be mainly of several types, one stable equilibrium [25], a line or plane equilibrium [26,27], or no equilibrium [28]. Even there are hidden attractors found in some special chaotic systems [29], which have both unstable equilibrium and stable equilibria.
Starting from the classic system, hidden attractor is a very important topic. At the same time, linearization has always been a fundamental state. Is there a class of system whose linear linearization satisfies the characteristics of the chaotic hidden attractor (stable equilibrium system)? e circuit of this kind of system is less disturbed because linearization (sign circuit) is stable and similar to the digital circuit. erefore, we propose a class of hypogenetic chaotic system which has the following unique properties: nonlinearity involved includes amplitude information and polarity information, which are of incomplete feedback; there are two knobs which control the stability of equilibria, by which one can turn off the stable states freely.
is paper is organized as follows. In Section 2, we give a model description including basic dynamical analysis, and in Section 3, we show the electronic circuit implementation of the system. Further application discussions including random number generator design and voice encryption application are given in Section 4. In the last section, we give a simple conclusion.

Model Description
In this letter, we announce a new jerk system derived by modifying the jerk system proposed in [14] by replacing the nonlinear terms z 2 by |z| and xz by z sgn(x). e proposed system shows a unique property of disorder which has both stable and unstable equilibrium points for different values of parameters.
where a i for i ∈ [1,7] are the parameters of the system. Jerk systems have the form [30]. When a 1 � 1 and a 2 � 1, system (1) is Jerk system.
According to the Routh-Hurwitz criterion for the real part of the eigenvalues to be positive, the condition is δ 1 , δ 0 > 0, δ 1 δ 2 > δ 0 , where δ 0 � 1, δ 1 � a 6 sgn(a 7 /a 3 ), δ 2 � (a 2 a 5 a 7 /a 3 ), andδ 3 � − a 1 a 2 a 3 . For the values of parameters a 1 � 1, a 2 � 1, a 3 � − 1, a 4 � − 4, anda 6 � 1 and to discuss the effect of parameters on the type of equilibrium points, we vary the parameters a 5 ,a 7 and investigate the type of equilibrium point with the real part of eigenvalues and the Routh-Hurwitz condition δ 1 δ 2 >δ 0 . Figure 1(a) shows the change in the real part of eigenvalues of system (1) with parameter a 5 , and for a 5 <1, the real part of eigenvalues become negative making the equilibrium stable. Similarly, Figure 1(b) is change in the real part of eigenvalues with a 7 , and for a 7 > − 0.6, the equilibrium is stable.
To show the 2D phase portraits of the stable and unstable system, we fix a 7 � − 1 and plot for a 5 � 0.95 (stable equilibrium) and a 5 � 1.6 (unstable equilibrium) as shown in Figures 3(a) and 3(b), respectively. e finite-time Lyapunov exponents of system (1) are derived using Wolf's algorithm [1] for both stable and unstable cases and are given in Table 1 with the Kaplan-Yorke dimension (D KY ) calculated for a run time of 20,000 s with initial conditions − 3 4 − 4 with other parameters except a 5 , a 7 fixed to their respective chaotic values.
To further understand the complete dynamical behavior of the system, we derived the bifurcation plots with parameter a 5 as it governs the equilibrium points of the proposed system. e parameter a 5 is varied between [0. 8,2], and the local maximum of the state variable z is plotted as shown in Figures 4(a) and 4(b) which show the corresponding LEs of the system. It can be seen from Figure 4(a) that, under the change of parameter a 5 , the chaos state and periodic state of the system appear alternately, and the way the system changes from the periodic state to chaos is period-doubling bifurcation. By comparing Figures 4(a) and 4(b), the maximum Lyapunov exponent of the system is zero; When the system is chaotic, the largest Lyapunov exponent of the system is positive. When the system is convergent, the largest Lyapunov exponent of the system is negative.

Electronic Circuit Implementation of the System
In this section, system (1) is implemented with an electronic circuit. e circuit designed in PSpice medium and its simulation are carried out. e schematic of the designed circuit is given in Figure 5. Here, we applied the traditional method by the multiplier AD633/AD to carry out the function z sgn(x), and the new switch published in [25] was also tried by simulation which shows the same results. e electronic circuit consists of OpAmps, multiplier ICs, diodes, resistors, and capacitors. e supply voltages of the active elements are +15 V for positive supply inputs and − 15 V for negative supply inputs. e value of the resistors used in the circuit is as follows: , and R 7 � 6 MΩ. e values of the capacitor in the circuit are as follows: e given resistor and capacitor values are for the stable equilibrium case when a 5 � 0.95 and a 7 � − 1. For the unstable equilibrium case (when a 5 � 1.6 anda 7 � − 1), only the value of R 5 resistor will be changed. e value of R 5 resistor is 25 kΩ. e real-time electronic circuit application is also realized. e results of the real-time electronic circuit are examined on the oscilloscope. 2D phase portraits of system (1) obtained from the oscilloscope are given in Figures 6(a) and 6(b). e phase portrait of the stable equilibrium case (a 5 � 0.95 and a 7 � − 1) is given in Figure 6(a) while that of the unstable equilibrium case (a 5 � 1.6 and a 7 � − 1) is given in Figure 6(b). Both of them confirm the theoretical prediction in Figure (

Random Number Generator Design and NIST Tests.
Random number generator (RNG) is one of the most important applications in which chaotic systems are used. RNGs are used in many different engineering fields, especially communication and cryptography. In this section, Mathematical Problems in Engineering a new RNG design has been realized by using the new chaotic jerk system proposed in this study. e flow diagram of the method used in the design of RNG is given in Figure 7.
As shown in the flow diagram, the appropriate initial values, the number of bits taken from the state variables, and the step value for the RK4 algorithm are determined with the help of the new chaotic system. en, the RK4 algorithm is executed to obtain discrete arrays of state variables and convert them into 32 bit binary arrays. Steps to generate the pseudo-random sequences are as follows.
e system uses the RK4 algorithm and Matlab software to iterate 2,000 times for simulation. S1: the sequence obtained by the first iteration of the system data � [x (1), y (1), z (1)]; the numerical value is kept to the second decimal place. S2: data � data * 100; data are expressed as a 32 bit binary number: data � b 31 b 30 , . . . , b 2 b 1 32 . S3: Let data1 � b 7 b 6 , ..., b 2 b 1 8 , data1 for further test use. S4: n � n+1. en, it is still stated that the sequence to be generated passes through S2-S4 until n � 2001.
Random bit arrays are generated for NIST tests by taking the appropriate number of bits from these arrays. If the generated bit array passes these tests successfully, the RNG design is completed and ready for use in practical applications.  Figure 3(a) shows system (1) with a stable equilibrium for a 5 � 0.95 and a 7 � − 1, and Figure 3(b) shows system (1) with a unstable equilibrium for a 5 � 1.6 and a 7 � − 1.

Mathematical Problems in Engineering
Otherwise, the procedure is repeated by starting over and setting the initial values, the number of bits taken from the state variables, and the step value for RK4. ese operations are carried out until the bit array obtained has passed all of the NIST tests. When the process is complete, an RNG is obtained which successfully passed through the NIST tests, which are the most accepted randomness tests in the literature. e most important randomness test which is accepted internationally is the NIST-800-22 statistical tests. In this test, there are 15 different subtests. An array consisting of at least 1000000 bits must pass all of these tests successfully.
at is, the p values obtained at the end of the tests should be equal or greater than 0.001. Table 2 shows the results of the NIST tests of the arrays which are generated by taking 8 bits

Voice Encryption Application.
In this part of the study, a different application based on the new chaotic system has been realized. In this application, voice encoding and decoding are performed using the RNG designed in the previous section. e block diagram of the application is shown in Figure 8.
As can be seen from Figure 9, these voice data are recorded with noise, and noise is added in the simulation;  Mathematical Problems in Engineering the voice data are converted into a binary form and then subjected to XOR operation with a random bit array from the RNG. e encrypted bit array is converted back to the float to get the encrypted voice. In the decoding process, the encrypted voice values are converted into binary form and subjected to XOR operation with bit arrays received from the RNG.
e bit array obtained after the XOR operation is converted to a float, and the decoding process is completed. Figure 9 shows the original, encrypted, and decrypted voice plots, respectively. It is seen that there is no similarity between the encrypted voice and the original voice, and that the original voice can be reacquired at the end of the decoding process. e frequency spectrums of the voice signals are shown in Figure 10. When the spectrums are examined, it is seen that the original and decrypted voice spectrums are the same, and the coded spectrum is completely different from the others and has a homogeneous distribution.
is indicates that the encryption and decryption processes are quite good.

Conclusion and Discussion
Signum function and absolute value function can remove the amplitude or polarity information in the feedback variable, which sometimes still preserves the basic property in a dynamical system. As a new case, such a hypogenetic jerk system is obtained, which has stable or unstable equilibrium points under different parameters. Moreover, physical experiments prove the chaotic oscillation. Further discussion focuses on random number generator, and voice encryption shows that the new derived chaotic system still exhibits great noise-like randomness.
Data Availability e data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest
e authors declare that they have no conflicts of interest.