Abstract
Cybersecurity requires cryptology for the basic protection. Among different ECRYPT technologies, stream cipher plays a central role in advanced network security applications; in addition, pseudorandom number generators are placed in the core position of the mechanism. In this chapter, a novel method of pseudorandom number generation is proposed to take advantage of the large functional space described using variant logic, a new framework for binary logic. Using permutation and complementary operations on classical truth table to form relevant variant table, numbers can be selected from table entries having pseudorandom properties. A simple generation mechanism is described and shown, and pseudorandom sequences are analyzed for their cycle property and complexity. Applying this novel method, it can play a useful role in future applications for higher performance of cybersecurity environments.
This work was supported by the Key Project on Electric Information and Next Generation IT Technology of Yunnan (2018ZI002), NSF of China (61362014), Yunnan Advanced Overseas Scholar Project.
You have full access to this open access chapter, Download chapter PDF
Similar content being viewed by others
Keywords
1 Introduction
In advanced cyber environment, cybersecurity mechanism plays a guider role to protect the secure information communicated and stored in network facilities [1, 2]. To achieve adequate network security effects, cryptology has to be placed in the essential position [1]. Different from block ciphers that operate with a fixed transformation on a large block of plaintext, stream ciphers operate with a time-varying transformation on individual plaintext digits. Under the stream cipher methodology, Pseudorandom Number Generator (PRNG) is placed in the central part of the mechanism.
From 2000 to 2003, New European Schemes for Signatures, Integrity, and Encryption (NESSIE) were started [3]. During 2004–2008, another European stream cipher project: eSTREAM selected four software and three hardware schemes for ECRYPT stream ciphers [4]. Such extensive international activities on ECRYPT methodologies are showing the ultra-importance of stream cipher technologies in cyber environments for wider security applications.
From a cyber resilience viewpoint [5,6,7], a set of researchers focus attention on leakage-resilient pseudorandom generator. This direction has shown interesting results to protect valuable information from side-channel attack aspects.
Since PRNG plays a key role in stream cipher applications and is the heart of cryptology [1, 8,9,10]. Many mathematical methodologies are applied to this field such as linear automata, cellular automata, Galois fields, and other algebraic constructions [1, 9, 11,12,13,14]. In cryptology, Boolean logic operations are essential to create highly effective cryptology systems [1, 9, 15, 16] as binary logic generates the greatest efficiency through manipulation of only 1’s and 0’s. Therefore, it is advantageous to investigate potential mechanisms in binary logic due to the follow-on effect it has in cryptology.
2 Classical Logic Function Table
A classic logic function in n variables can be represented as a truth table [8, 9]. For a classic sequence in an ordinary number sequence, each table contains \( 2^{n} \) columns and \( 2^{{2^{n} }} \) rows with a total of \( 2^{n} \cdot 2^{{2^{n} }} \) bits, respectively. An example of the standard truth table can be seen in Fig. 1a.
3 Variant Logic Function Table
Variant logic construction is a new proposed theoretical structure [17, 18] to extend classical logic from the three basic operators: \( \left\{ { \cap , \cup ,\neg } \right\} \). Two additional vector operators: permutation P and complementary ∆ are included with the original three to form the five basic operators within the novel framework. Let \( S(N) \) denote a permutation group with N elements, then \( S(N) \) contains a total of \( N! \) permutation operators. Let \( B_{2}^{N} = \left\{ {0,1} \right\}^{N} \) denote a binary group with N elements, then \( B_{2}^{N} \) contains a total of \( 2^{N} \) complementary operators.
The permutation (P) and complementary (∆) operators are two vector operators performed on each column vector of \( 2^{{2^{n} }} \) bits. For a given P and ∆, two operators transform the truth table into a variant table. Permutation operators change positions of relevant columns but do not change their values. Complementary operators (∆) do not change the position for each column, but may change entire values of the column. Two given operators can be performed together to generate a variant table for further usages. There are \( 2^{n} \) columns in the table as permutation elements, so this permutation group \( S(2^{n} ) \) contains a total of \( 2^{n} ! \) permutation operators, and its complementary group \( B_{2}^{{2^{n} }} \) includes a total of \( 2^{{2^{n} }} \) complementary operators. An example of the variant table can be seen in Fig. 1b.
4 Variant Method of Pseudorandom Number Generation
-
Input: \( n,P,\Delta ,m,L \) variables, \( n \in N,P \in S(2^{n} ),\Delta ,L,m \in B_{2}^{{2^{n} }} \)
-
Output: \( \left\{ {K_{m} ,K_{m + 1} , \ldots .,K_{m + L - 1} } \right\}L \cdot 2^{n} \) bit sequences
-
Method: The process for pseudorandom number generation can be seen in Fig. 2.
n is the input variable number. Using n variables, a standard truth table can be constructed in \( 2^{n} \) columns and \( 2^{{2^{n} }} \) rows. P is a given permutation operator \( P = (P_{{2^{n} - 1}} \ldots P_{I} \ldots P_{0} ),\quad P \in S(2^{n} ) \), where \( P_{I} \) corresponds to the I-th column. A given complementary operator \( \Delta \in B_{2}^{{2^{n} }} \), \( \Delta = (\Delta_{{2^{n} - 1}} \ldots \Delta_{I} \ldots \Delta_{0} ) \), \( \Delta_{I} \in B_{2} \) shows that the operator is performed on the I-th column, if \( \Delta_{I} = 0 \), all values of the column are reversed and if \( \Delta_{I} = 1 \), all values are invariant. \( 0 \le m < 2^{{2^{n} }} \) is an initial position for output sequences; from \( K_{m} \), L conditions, \( \left\{ {K_{m + i} } \right\}_{i = 0}^{L - 1} \) are output generated 0–1 bit sequences.
5 Sequence Generation Example
For convenient understanding procedure, an example is selected to show in the n = 2 case shown in Fig. 3. Parameters are initialized to arbitrary values: n = 2, P = (1203), and ∆ = (0110).
After the table is generated, the pseudorandom sequence can read off the table. For m = 4 and L = 6 conditions, a random number starting at position 4 of the variant table containing six elements can be found.
6 Complexity Analysis
From an application viewpoint, it is important to have the exact complexity evaluation for the method. In the initial stage, it is necessary to manipulate \( 2^{n} \) columns and each column with \( 2^{{2^{n} }} \) rows; the total numbers of \( 2^{n} \cdot 2^{{2^{n} }} \) bits are required. The total complexity is of order \( O(2^{n} \cdot 2^{{2^{n} }} ) \).
To generate variant table values, P operations need at least to manipulate bits once and ∆ operations to manipulate the same number of bits, i.e., \( O(2^{n} \cdot 2^{{2^{n} }} ) \).
Selecting \( L \cdot 2^{n} \) bits from the variant table, it is necessary to perform \( O(L \cdot 2^{n} ) \) operations.
If a full table needs to be generated as a random resource, \( O(2^{n}\,\cdot\,2^{{2^{n} }} ) \) computational complexity is required. In general, their computational complexity is \( O(L \cdot 2^{n} ) \) − \( O(2^{n} \cdot 2^{{2^{n} }} )0 < L < 2^{{2^{n} }} \).
Maximal cycle length: under this construction, the maximal length of the pseudorandom number sequence is \( 2^{n}\,\cdot\,2^{{2^{n} }} \) bits. For any short sequences, the output sequence has a length less than this number. No clear cycle effects can be directly observed.
7 Conclusion
It is important to design this new PRNG method to use variant logic construction. Since P and ∆ potentially have a huge configuration space \( 2^{n} ! \times 2^{{2^{n} }} \) times larger than classical logic function spaces. Exploring how difficulties for this mechanism to be decoded will be the main issue for coming cryptologist’s theoretical targets. In addition, it is important to understand what type of distribution will be relevant to this generation mechanism. Owing to intrinsic complexity of variant logic construction, this provides potential barriers to protect this type of sequences decoded directly.
Considering PRNG placed in the central part of stream cipher mechanism, and stream cipher technologies are more and more important in advanced network security environment, higher performance methodology and relevant implementation will be useful in this field. Ongoing approaches will focus on whether this mechanism provides better PRNG methods to help different protections on side-channel attacks [1,2,3,4,5,6,7, 19, 20] in wider network applications to resolve practical leakage-resilient issues in the future.
References
M. Robshaw, Stream ciphers. RSA Laboratories Technical Report TR-701 (1995)
Y. Xiao, H. Li, S. Choi, Protection and guarantee for voice and video traffic in IEEE 802.11e Wireless LANs, in IEEE INFOCOM (2004), p. 11
NESSIE New European Schemes for Signatures, Integrity and Encryption, https://www.cosic.esat.kuleuven.be/nessie/
The eSTREAM Project, http://www.ecrypt.eu.org/stream/index.html
F.X. Standaert, T. Malkin, M. Yung, A unified framework for the analysis of side-channel key recovery attacks, in EUROCRYPT, (2009), pp. 443–461
A. Dwivedi, D. Tebben, P. Harshavardhanna, Characterizing cyber-resiliency, in The 2010 Military Communication Conference-Unclassified Program—Cyber Security and Network Management (IEEE press, 2010), pp. 1847–1852
Y. Yu, F. X. Standaert, O. Pereira, M. Yung. Practical leakage-resilient pseudorandom generator, in CCS’2010 (ACM, 2010), pp. 141–151
G.B. Agnew, Random source for cryptographic systems, in Advances in Cryptology | EUROCRYPT ‘87 Proceedings (Springer-Verlag, 1988), pp. 77–81
C. Atkinson, A family of switching algorithms for the computer generation of beta random variables. Biometrika 66(1), 141–145 (1979)
A statistical test suite for random and pseudorandom number generators for cryptographic applications (NIST Special Publication, 800-22 2010)
R. Davies. Hardware random number generators, in International 15th Australian Statistical Conference (2000)
D. Eastlake, S.D. Crocker, J.I. Schiller, Randomness requirements for security, RFC 1750, Internet Engineering Task Force (1994)
V. Kachitvichyanukul, B.W. Schmeiser, Binomial random variate generation. Commun. ACM 31(2), 216–223 (1988)
M. Matsumoto, T. Nishimura, Dynamic creation of pseudorandom number generators, in Proceedings of the Third International Conference on Monte Carlo and Quasi-Monte Carlo Methods in Scientific Computing: Monte Carlo and Quasi-Monte Carlo Methods 1998 (2000), pp. 56–69
S.K. Park, K.W. Miller, Random number generators: good ones are hard to find. Commun. ACM 31(10), 1192–1201 (1988)
M. Santha, U.V. Vazirani, Generating quasi-random sequences from slightly random sources. J. Comput. Syst. Sci. 33, 75–87 (1986)
J. Zheng, C. Zheng, T.L. Kunii, A framework of variant logic construction for cellular automata (InTech—Open Access Publisher, 2011). http://www.intechopen.com/articles/show/title/a-framework-of-variant-logic-construction-for-cellular-automata. ISBN 978-953-307-172-5
J. Zheng, C. Zheng, A framework to express variant and invariant functional spaces for binary logic. Front. Electr. Electron. Eng. China. 5(2), 163–173 (2010). http://www.springerlink.com/content/91474403127n446u/ (Higher Education Press & Springer)
G. Gong, Cryptographic properties of the welch-gong transformation sequence generators. IEEE Trans. Inf. Theor. 48(11), 2837–2846 (2002)
B. Aissa, D. Nouredine, Designing resilient functions and bent function for stream ciphers. Georgian Electron. Sci. J Comput. Sci. Telecommun. 1(18), 27–33 (2009)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Open Access This chapter is licensed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license and indicate if changes were made.
The images or other third party material in this chapter are included in the chapter's Creative Commons license, unless indicated otherwise in a credit line to the material. If material is not included in the chapter's Creative Commons license and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder.
Copyright information
© 2019 The Author(s)
About this chapter
Cite this chapter
Zheng, J. (2019). Novel Pseudorandom Number Generation Using Variant Logic Framework. In: Zheng, J. (eds) Variant Construction from Theoretical Foundation to Applications. Springer, Singapore. https://doi.org/10.1007/978-981-13-2282-2_18
Download citation
DOI: https://doi.org/10.1007/978-981-13-2282-2_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-2281-5
Online ISBN: 978-981-13-2282-2
eBook Packages: EngineeringEngineering (R0)