Cargando…

A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments

Symmetric cryptography methods have an important role in security solutions design in data protection. In that context, symmetric cryptography algorithms and pseudo-random generators connected with them have strong influence on designed security solutions. In the computationally constrained environm...

Descripción completa

Detalles Bibliográficos
Autores principales: Unkašević, Tomislav, Banjac, Zoran, Milosavljević, Milan
Formato: Online Artículo Texto
Lenguaje:English
Publicado: MDPI 2019
Materias:
Acceso en línea:https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6929088/
https://www.ncbi.nlm.nih.gov/pubmed/31816914
http://dx.doi.org/10.3390/s19235322
_version_ 1783482623604031488
author Unkašević, Tomislav
Banjac, Zoran
Milosavljević, Milan
author_facet Unkašević, Tomislav
Banjac, Zoran
Milosavljević, Milan
author_sort Unkašević, Tomislav
collection PubMed
description Symmetric cryptography methods have an important role in security solutions design in data protection. In that context, symmetric cryptography algorithms and pseudo-random generators connected with them have strong influence on designed security solutions. In the computationally constrained environment, security efficiency is also important. In this paper we proposed the design of a new efficient pseudo-random generator parameterized by two pseudo-random sequences. By the probabilistic, information-theoretic and number theory methods we analyze characteristics of the generator. Analysis produced several results. We derived sufficient conditions, regarding parameterizing sequences, so that the output sequence has uniform distribution. Sufficient conditions under which there is no correlation between parameterizing sequences and output sequence are also derived. Moreover, it is shown that mutual information between the output sequence and parameterizing sequences tends to zero when the generated output sequence length tends to infinity. Regarding periodicity, it is shown that, with appropriately selected parameterizing sequences, the period of the generated sequence is significantly longer than the periods of the parameterizing sequences. All this characteristics are desirable regarding security applications. The efficiency of the proposed construction can be achieved by selection parameterizing sequences from the set of efficient pseudo-random number generators, for example, multiple linear feedback shift registers.
format Online
Article
Text
id pubmed-6929088
institution National Center for Biotechnology Information
language English
publishDate 2019
publisher MDPI
record_format MEDLINE/PubMed
spelling pubmed-69290882019-12-26 A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments Unkašević, Tomislav Banjac, Zoran Milosavljević, Milan Sensors (Basel) Article Symmetric cryptography methods have an important role in security solutions design in data protection. In that context, symmetric cryptography algorithms and pseudo-random generators connected with them have strong influence on designed security solutions. In the computationally constrained environment, security efficiency is also important. In this paper we proposed the design of a new efficient pseudo-random generator parameterized by two pseudo-random sequences. By the probabilistic, information-theoretic and number theory methods we analyze characteristics of the generator. Analysis produced several results. We derived sufficient conditions, regarding parameterizing sequences, so that the output sequence has uniform distribution. Sufficient conditions under which there is no correlation between parameterizing sequences and output sequence are also derived. Moreover, it is shown that mutual information between the output sequence and parameterizing sequences tends to zero when the generated output sequence length tends to infinity. Regarding periodicity, it is shown that, with appropriately selected parameterizing sequences, the period of the generated sequence is significantly longer than the periods of the parameterizing sequences. All this characteristics are desirable regarding security applications. The efficiency of the proposed construction can be achieved by selection parameterizing sequences from the set of efficient pseudo-random number generators, for example, multiple linear feedback shift registers. MDPI 2019-12-03 /pmc/articles/PMC6929088/ /pubmed/31816914 http://dx.doi.org/10.3390/s19235322 Text en © 2019 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).
spellingShingle Article
Unkašević, Tomislav
Banjac, Zoran
Milosavljević, Milan
A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
title A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
title_full A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
title_fullStr A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
title_full_unstemmed A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
title_short A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments
title_sort generic model of the pseudo-random generator based on permutations suitable for security solutions in computationally-constrained environments
topic Article
url https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6929088/
https://www.ncbi.nlm.nih.gov/pubmed/31816914
http://dx.doi.org/10.3390/s19235322
work_keys_str_mv AT unkasevictomislav agenericmodelofthepseudorandomgeneratorbasedonpermutationssuitableforsecuritysolutionsincomputationallyconstrainedenvironments
AT banjaczoran agenericmodelofthepseudorandomgeneratorbasedonpermutationssuitableforsecuritysolutionsincomputationallyconstrainedenvironments
AT milosavljevicmilan agenericmodelofthepseudorandomgeneratorbasedonpermutationssuitableforsecuritysolutionsincomputationallyconstrainedenvironments
AT unkasevictomislav genericmodelofthepseudorandomgeneratorbasedonpermutationssuitableforsecuritysolutionsincomputationallyconstrainedenvironments
AT banjaczoran genericmodelofthepseudorandomgeneratorbasedonpermutationssuitableforsecuritysolutionsincomputationallyconstrainedenvironments
AT milosavljevicmilan genericmodelofthepseudorandomgeneratorbasedonpermutationssuitableforsecuritysolutionsincomputationallyconstrainedenvironments