Skip to main page content
U.S. flag

An official website of the United States government

Dot gov

The .gov means it’s official.
Federal government websites often end in .gov or .mil. Before sharing sensitive information, make sure you’re on a federal government site.

Https

The site is secure.
The https:// ensures that you are connecting to the official website and that any information you provide is encrypted and transmitted securely.

Access keys NCBI Homepage MyNCBI Homepage Main Content Main Navigation
. 2022 Dec 11;22(24):9700.
doi: 10.3390/s22249700.

Combined Pseudo-Random Sequence Generator for Cybersecurity

Affiliations

Combined Pseudo-Random Sequence Generator for Cybersecurity

Volodymyr Maksymovych et al. Sensors (Basel). .

Abstract

Random and pseudo-random number and bit sequence generators with a uniform distribution law are the most widespread and in demand in the market of pseudo-random generators. Depending on the specific field of application, the requirements for their implementation and the quality of the generator's output sequence change. In this article, we have optimized the structures of the classical additive Fibonacci generator and the modified additive Fibonacci generator when they work together. The ranges of initial settings of structural elements (seed) of these generators have been determined, which guarantee acceptable statistical characteristics of the output pseudo-random sequence, significantly expanding the scope of their possible application, including cybersecurity. When studying the statistical characteristics of the modified additive Fibonacci generator, it was found that they significantly depend on the signal from the output of the logic circuit entering the structure. It is proved that acceptable statistical characteristics of the modified additive Fibonacci generator, and the combined generator realized on its basis, are provided at odd values of the module of the recurrent equation describing the work of such generator. The output signal of the combined generator has acceptable characteristics for a wide range of values of the initial settings for the modified additive Fibonacci generator and the classic additive Fibonacci generator. Regarding the use of information security, it is worth noting the fact that for modern encryption and security programs, generators of random numbers and bit sequences and approaches to their construction are crucial and critical.

Keywords: authentication; encryption of information; pseudo-random number; pseudo-random sequence generators.

PubMed Disclaimer

Conflict of interest statement

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses or interpretation of data; in the writing of the manuscript; or in the decision to publish the results.

Figures

Figure 1
Figure 1
Generalized scheme of the joint work of AFG and MAFG.
Figure 2
Figure 2
Structure scheme of the joint work of AFG and MAFG.
Figure 3
Figure 3
Statistical portrait of the AFG output sequence.
Figure 4
Figure 4
Dependencies of repetition periods for X_0, h=2 and a=0.
Figure 5
Figure 5
Dependencies of repetition periods for X_0, h=3 and a=0.
Figure 6
Figure 6
Statistical portrait of the MAFG output sequence: (a) with an odd value h=9, (b) at an even value h=10.
Figure 7
Figure 7
Statistical portrait of the MAFG output sequence for h=8, a=a0a1 with initial values: (a) Y_0=7, (b) Y_0=32, (c) Y_0=100.
Figure 8
Figure 8
Statistical portrait of the MAFG output sequence for h=8, a=a0a2 with initial values: (a) Y_0=7, (b) Y_0=32, (c) Y_0=100.
Figure 8
Figure 8
Statistical portrait of the MAFG output sequence for h=8, a=a0a2 with initial values: (a) Y_0=7, (b) Y_0=32, (c) Y_0=100.
Figure 9
Figure 9
Statistical portrait of the combined generator output sequence for h = 10, a=a0a3 with initial values: (a) Y_0=7, (b) Y_0=32, (c) Y_0=100.
Figure 10
Figure 10
Results of passing the NIST tests with the combined generator.
Figure 11
Figure 11
Statistical portrait of the combined generator for h = 9, a=a0a3 with initial values: (a) X_0=7,Y_0=36; (b) X_0=32,Y_0=36; (c) X_0=7,Y_0=64; (d) X_0=32,Y_0=64; (e) X_0=7,Y_0=71; (f) X_0=32,Y_0=71; (g) X_0=7,Y_0=100; (h) X_0=32,Y_0=100; (i) X_0=7,Y_0=1004; (j) X_0=32,Y_0=1004.
Figure 11
Figure 11
Statistical portrait of the combined generator for h = 9, a=a0a3 with initial values: (a) X_0=7,Y_0=36; (b) X_0=32,Y_0=36; (c) X_0=7,Y_0=64; (d) X_0=32,Y_0=64; (e) X_0=7,Y_0=71; (f) X_0=32,Y_0=71; (g) X_0=7,Y_0=100; (h) X_0=32,Y_0=100; (i) X_0=7,Y_0=1004; (j) X_0=32,Y_0=1004.

References

    1. Baldanzi L., Crocetti L., Falaschi F., Bertolucci M., Belli J., Fanucci L., Saponara S. Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm. Sensors. 2020;20:1869. doi: 10.3390/s20071869. - DOI - PMC - PubMed
    1. Dichtl M., Golić J.D. Cryptographic Hardware and Embedded Systems—CHES 2007. Springer; Berlin/Heidelberg, Germany: 2007. High-Speed True Random Number Generation with Logic Gates Only; pp. 45–62. (Lecture Notes in Computer Science Book Series).
    1. Mandrona M.N., Maksymovych V.N. Comparative Analysis of Pseudorandom Bit Sequence Generators. J. Autom. Inf. Sci. 2017;49:78–86. doi: 10.1615/JAutomatInfScien.v49.i3.90. - DOI
    1. Fishman G.S. Discrete-Event Simulation. Springer; New York, NY, USA: 2001. Pseudorandom Number Generation; pp. 416–451. (Springer Series in Operations Research). - DOI
    1. François M., Defour D., Berthomé P. Theory and Applications of Models of Computation—TAMC 2014. Volume 8402. Springer; Cham, Switzerland: 2014. A Pseudo-Random Bit Generator Based on Three Chaotic Logistic Maps and IEEE 754-2008 Floating-Point Arithmetic. (Lecture Notes in Computer Science Book Series). - DOI

MeSH terms

LinkOut - more resources