[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

NMRMG: Nonlinear Multiple-Recursive Matrix Generator Design Approaches and Its Randomness Analysis

Published: 01 July 2022 Publication History

Abstract

Highly random binary sequences generated by any keystream generator provides adequate service for the rapidly growing demands of cryptographic applications. Using several statistical randomness test analysis, we found that the randomness properties of binary sequences generated by multiple-recursive matrix generators are not statistically secure for cryptographic solutions. To overcome the randomness loopholes, we propose nonlinearly filtered multiple-recursive matrix generator and experimentally establish that the mentioned generator provides high-quality randomness results. We evaluate the statistical security of the proposed scheme with the help of NIST randomness test, autocorrelation test, linear complexity test, and avalanche test. Moreover, we compare our randomness test results with some of the high-quality software oriented stream ciphers like Snow, HC-128, and ZUC.

References

[1]
Muthalagu R and Jain S Modifying lfsr of zuc to reduce time for key-stream generation Journal of Cyber Security and Mobility 2016 5 4 257-268
[2]
Deb S and Bhuyan B Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices ICT Express 2018 4 1 19-23
[3]
Deb S, Upadhya R, and Bhuyan B Khan Pathan A-S Applicability of lightweight stream cipher in crowd computing: A detailed survey and analysis Crowd Assisted Networking and Computing 2018 CRC Press 245-272
[4]
Manifavas C, Hatzivasilis G, Fysarakis K, and Papaefstathiou Y A survey of lightweight stream ciphers for embedded systems Security and Communication Networks 2016 9 10 1226-1246
[5]
Dubrova E and Hell M Espresso: A stream cipher for 5g wireless communication systems Cryptography and Communications 2017 9 2 273-289
[6]
Deb S, Biswas B, and Bhuyan B Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field Multimedia Tools and Applications 2019 78 24 34901-34925
[7]
Deb S and Bhuyan B Chaos-based medical image encryption scheme using special nonlinear filtering function based lfsr Multimedia Tools and Applications 2021 80 13 19803-19826
[8]
Bishoi S, Senapati K, and Shankar BR Shrinking generators based on -lfsrs Discrete Applied Mathematics 2020 285 493-500
[9]
Preneel B Introduction to the Proceedings of the Second Workshop on Fast Software Encryption. Lecture Notes in Computer Science 1995 Springer 1-5
[10]
Niederreiter H Factorization of polynomials and some linear-algebra problems over finite fields Linear Algebra and its Applications 1993 192 301-328
[11]
Zeng, G., Han, W., & He, K. (2007). High efficiency feedback shift register: -lfsr. IACR Cryptology ePrint Archive, Report 2007/114, 2007.
[12]
Tsaban B and Vishne U Efficient linear feedback shift registers with maximal period Finite Fields and Their Applications 2002 8 2 256-267
[13]
Ul Hasan S, Panario D, and Wang Q Nonlinear vectorial primitive recursive sequences Cryptography and Communications 2018 10 6 1075-1090
[14]
Roy S and Krishnaswamy S On the frequency of symbols in sequences generated by nonlinear feedforward generators Cryptography and Communications 2020 12 1 115-126
[15]
Qasaimeh M, Al-Qassas RS, and Tedmori S Software randomness analysis and evaluation of lightweight ciphers: The prospective for iot security Multimedia Tools and Applications 2018 77 14 18415-18449
[16]
Sýs M and Matyáš V Randomness Testing: Result Interpretation and Speed 2016 Springer
[17]
Saravanan P and Kalpana P Novel reversible design of advanced encryption standard cryptographic algorithm for wireless sensor networks Wireless Personal Communications 2018 100 4 1427-1458
[18]
Burnett L, Millan W, Dawson E, and Clark A Simpler methods for generating better boolean functions with good cryptographic properties Australasian Journal of Combinatorics 2004 29 231-248
[19]
Sathya Priya S, Karthigaikumar P, Siva Mangai NM, and Gaurav Das PK An efficient hardware architecture for high throughput aes encryptor using mux based sub pipelined s-box Wireless Personal Communications 2017 94 4 2259-2273
[20]
Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Seurin, Y., & Vikkelsoe, C. (2007). Present: An ultra-lightweight block cipher. In Proceedings of the 9th international workshop on cryptographic hardware and embedded systems, CHES ’07, pp 450–466. Springer.
[21]
Bassham, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Leigh, S. D., Levenson, M., Vangel, M., Heckert, N. A., & Banks, D. L. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications| nist. Technical report, National Institute of Standards & Technology.
[22]
Brown, R. G. (2013). Dieharder: A random number test suite (version 3.31).
[23]
Massey J Shift-register synthesis and bch decoding IEEE transactions on Information Theory 1969 15 1 122-127
[24]
Ul Hasan S, Panario D, and Wang Q Helleseth T and Jedwab J Word-oriented transformation shift registers and their linear complexity Sequences and Their Applications—SETA 2012 2012 Springer 190-201
[25]
Tarannikov Y, Korolev P, and Botev A Boyd C Autocorrelation coefficients and correlation immunity of boolean functions Advances in Cryptology–ASIACRYPT 2001 2001 Springer 460-479
[26]
Deb S and Bhuyan B Performance analysis of current lightweight stream ciphers for constrained environments Sādhanā 2020 45 1 1-12
[27]
Ekdahl, P., & Johansson, T. (2002). A new version of the stream cipher snow. In International workshop on selected areas in cryptography, pp. 47–61. Springer.
[28]
Wu, H. (2008). The stream cipher hc-128. In New stream cipher designs, pp. 39–47. Springer.
[29]
ETSI/SAGE. (2011). Specification of the 3gpp confidentiality and integrity algorithms 128-eea3 & 128-eia3: Zuc specification.
[30]
Mandal B, Stănică P, and Gangopadhyay S New classes of p-ary bent functions Cryptography and Communications 2019 11 1 77-92

Index Terms

  1. NMRMG: Nonlinear Multiple-Recursive Matrix Generator Design Approaches and Its Randomness Analysis
          Index terms have been assigned to the content through auto-classification.

          Recommendations

          Comments

          Please enable JavaScript to view thecomments powered by Disqus.

          Information & Contributors

          Information

          Published In

          cover image Wireless Personal Communications: An International Journal
          Wireless Personal Communications: An International Journal  Volume 125, Issue 1
          Jul 2022
          958 pages

          Publisher

          Kluwer Academic Publishers

          United States

          Publication History

          Published: 01 July 2022
          Accepted: 29 January 2022

          Author Tags

          1. Linear feedback shift register
          2. Multiple-recursive matrix generator
          3. Stream cipher
          4. Randomness
          5. NIST test suite
          6. DieHarder

          Qualifiers

          • Research-article

          Contributors

          Other Metrics

          Bibliometrics & Citations

          Bibliometrics

          Article Metrics

          • 0
            Total Citations
          • 0
            Total Downloads
          • Downloads (Last 12 months)0
          • Downloads (Last 6 weeks)0
          Reflects downloads up to 29 Jan 2025

          Other Metrics

          Citations

          View Options

          View options

          Figures

          Tables

          Media

          Share

          Share

          Share this Publication link

          Share on social media