SlideShare a Scribd company logo
Generator of Pseudorandom Sequences
Based on a Cascade of FCSR Registers
Roman Valentyn Tkachuk, Sindhu Vasireddy, Routhu
Venkata Sai Kalyan
School of computing,
Blekinge Institute of Technology
Karlskrona, Sweden
{rotk16, siva16, vero16}@student.bth.se
Wlodek J. Kulesza
School of Engineering
Blekinge Institute of Technology
Karlskrona, Sweden
wka@bth.se
Abstract — The main aim of this research paper is to design a
new pseudorandom number generator based on FCSR registers,
with not affecting the speed of generation. This paper explains
about the generators of pseudorandom sequences, in general and
their use in cryptographic systems. There are methods to design
and analyze the stream ciphers using pseudorandom number
generators. In the main part, a deep description of the cascades
used in the design and describe the work principle of GPRN. The
analyzed statistical characteristics are obtained from various
generated sequences using test package NIST 800-22 and then
confirmed by experiment, that a modeled GPRN has a higher
period of repetition and works faster.
Keywords — feedback with carry shift register(FCSR);
generators of pseudorandom sequences(GPRS); period of repeating
of sequence; “truly” random sequence
I. INTRODUCTION
seudorandom numbers are a critical component used
today for various modelling processes, starting from
the study of behavior of the human brain to solve
various calculations in communications. In this field of
informational security, pseudorandom numbers play a critical
role because the stability of an algorithm depends on the
‘randomness’. Pseudorandom numbers are used to generate
stable keys necessary for secure transmission of secret
information over unprotected communication channel. They
are also used for various applications like creating different
kinds of ‘noise’ in cryptosystems.
Security system of any organization depends on all its parts.
Starting from a simple user password generation to a
fingerprint or a handprint scanner to a retina scanner, each
component creates a single system. If one component is not
stable, then the entire system may be rendered ineffective.
And referring to one of the most important components,
namely generators of pseudorandom numbers (GPRN), it is a
systematic approach of the issue without affecting the speed of
generation.
The reason for selecting the feedback with carry shift
register (FCSR) is because of its modern structure. It has been
under development stages since 2011 and even now there are
improvements being made on this register.
II. SURVEY OF RELATED WORKS
A lot of papers have been written in field of GPRS but
none on cascading of FCSRs. General descriptions of
pseudorandom sequences and generators of pseudorandom
sequences are in [1].
The new approach of building register cascades is
described in [3].
Also the problems of modern GPRS and ways of solving
them are described in IEEE paper [4].
III. PROBLEM STATEMENT AND MAIN CONTRIBUTION
Nowadays, it is a big problem for a cypher designer to find
a generator of truly random sequences, without affecting the
speed of generation. GPRN is used to generate a strong key
that provides decryption for the encrypted data without a key.
The objective of this research is to find out what is the
sufficient number of registers in a cascade of FCSRs, to make
a generator more random without affecting the speed of
generation.
The idea is that a cascade of 5 FCSRs will not affect the
speed of generation because there are only 5 additional XOR
operations happening.
This sequence is then tested by a package of statistical
tests, NIST 800-22. A file is obtained which contains
information of tests that have passed and those that have not.
Then based on that file, a diagram is obtained on Microsoft
Excel which is more comprehensive to analyze and see which
sequence is considered as ‘truly’ random.
IV. PROBLEM SOLUTION
The program is run on the Windows 10 environment which
allows these results to be used for a big variety of cyphers
where modeled GPRS can be implemented. To give a
conclusion whether the sequence is ‘truly’ random or not we
need to generate at least 1 billion bits. Moreover, generating
these number of bits give us an opportunity to more precisely
measure the speed of generation, which is the main goal.
P
TABLE I. RESULTS OF RESEARCH
Type of
cascade
NIST tests
passed
Period of
sequence
Speed of
generation
3 FCSR YES 1012 25.5 Mbps
5 FCSR YES 1018 25.5 Mbps
A. Modeling
Basically an FCSR is a register which has a significant
advantage – a carry register.
Fig. 1 Scheme of FCSR
Instead of performing XOR operations on all bits of
sequence, these bits XOR up with each other and with the
contents of the carry register. The result is mod 2 and becomes
the new bit. The result divided by 2 becomes the new content
of the carry register.
The maximum period of FCSR is b-1, where b is an
integer of communication. This number sets the branch and is
defined as:
b = 2bl + 22
b2 + 23
b3 + . . . + 2n
bn-1 (1)
The Carry register gives an advantage over the custom
LFSR, i.e. the sequence is not bound to the XOR operation
between bits. This is very important because it makes the
register better and makes the sequence more random.
In order to make the cascade of FCSRs work properly we
need to combine them with an XOR operation [1]. This is
connected to the NIST 800-22 test package, because in order
to pass the first test - Linear Complexity, the sequence needs
to be reversible. This implies that the number of ‘1s’ and ‘0s’
in the sequence should be almost equal.
B. Application
To apply the work of designed cascade of FCSRs, the
program is written in Microsoft Visual Studio’s WPF
environment using C# and XAML programming languages.
Program has a comprehensive user interface which allows the
common user to work with it.
After starting the program, a window is seen where a path
to the text file, in which the random sequence to be generated
can be selected. After that a cascade of registers which will be
used for generation will be chosen. Further, there are options
to choose from whether the period and speed of generation
needs to be measured or not. This is necessary because the
operations can significantly decrease the performance of the
program. After all the steps are done, click on the «Generate»
button and wait for the line under the button to fill up with
green color indicates the progress of generation.
C. Verification
Cascades of 3 FCSRs and 5 FCSRs with 32 bits in each
were used to generate sequences. Then using the NIST 800-22
tests package the results about whether the tests have passed
or not is obtained. Test is considered passed only in case when
statistical value lies in interval from 0.98 to 0.999, other way
the test is not passed.
Fig. 2 Diagram of results of 3 FCSRs cascade
The results of 3 FCSRs cascade testing show that all the
tests were passed but the values are spread all over the
interval.
Fig. 3 Diagram of results of 5 FCSRs cascade
The results of 5 FCSRs cascade show much better results,
statistical values lay in interval from 0.985 to 0.995.
V. CONCLUSION
Summarizing, all the obtained results show that a cascade
of 5 FCSRs pass the package of statistical tests NIST 800-22
without affecting the speed of generation. This generator has a
good characteristics and can be implemented in a big variety
of already existing cryptographic algorithms [2].
Future work: Designing of new cypher which has this
GPRS embedded. This cascade of FCSRs can be extended to
be implemented on other operating system platforms as well.
REFERENCES
[1] B. Stoyanov and K. Kordov, “Pseudorandom Bit Generator with Parallel
Implementation,” in Large-Scale Scientific Computing, I. Lirkov, S.
Margenov, and J. Waśniewski, Eds. Springer Berlin Heidelberg, 2013, pp.
557–564.
[2] Karthikeyan, S., Sairam, N., Manikandan, G., Sivaguru, J.: A parallel
approach for improving data security. J. Theor. Appl. Inf. Technol. 39(2),
119–125 (2012)
[3] M. Francois, T. Grosges, D. Barchiesi, and R. Erra, “A New Pseudo-
Random Number Generator Based on Two Chaotic Maps,” Informatica,
vol. 24, no. 2, pp. 181–197, Jan. 2013.
[4] M. Jessa and M. Jaworski, “Producing secure pseudorandom sequences
with combined multiplicative congruential generators,” in 2012 19th
International Conference on Systems, Signals and Image Processing
(IWSSIP), 2012, pp. 160–163.
Biographies
Routhu Venkata Sai Kalyan was born in
Hyderabad City, India, in
1995. He received his B.Tech Degree in
Electronics and Communication Engineering
from Jawaharlal Nehru Technological
University, Hyderabad, in 2015. He is
currently pursuing his M.Sc. Degree in
Electrical Engineering with emphasis on
Telecommunication Systems at Blekinge
Institute of Technology(BTH), Karlskrona,
Sweden.
From 2013 to 2015, he worked as a
coordinator of Swetcha Organization, Hyderabad, India. He has attended
for Internship programme at Corporate Research & Development, Bharat
Heavy Electrical Limited, India, in 2015. He worked as a member of
NULL, India’s active open security community, Hyderabad chapter.
Mr. Kalyan was the winner of poster presentation, National Level
Techno Cultural Fest, Quest, in 2015 and the Hyderabad Quizzotic
Winner, 2014.
Vasireddy Sindhu was born in Hyderabad,
India, in 1994. She had finished her
schooling from the Narayana Olympiad
school, Ashok Nagar, Hyderabad in 2009.
She then completed her intermediate
schooling from Vijaya Ratna junior college,
Nallakunta, Hyderabad in 2011. She joined
into the Integrated Double Degree Master’s
Program(IDDMP) in Jawaharlal Nehru
Technological University
Hyderabad(JNTUH). She completed her
Bachelor of Technology(B.TECH) there
and is currently pursuing Master’s in
Telecommunications specialisation in Blekinge Tekniska
Hogskola(BTH).
She has done her Industrial Internship at Ananth Technologies Ltd
(ATL), Hyderabad, a supplier of missile and rocket parts to Indian Space
Research Organisation(ISRO) in Sriharikota for two months. She
involved in various stages of products manufactured under their guidance.
Ms. Vasireddy has been awarded the proficiency in academics
award for three consecutive years from 2003-2006 in high school. She
has participated in several workshops and conducted two workshops, one
is the Internet of things(IOT) and one other is the Embedded systems and
has also actively participated in many science Olympiads.
Tkachuk Roman-Valentyn was born in
Pidbirtsy Village, Pustomuty district, L’viv
region, Ukraine in 1995. He received the
B.Sc. degree in informational security from
the L’viv Polytechnic Nationa University,
Lviv, Ukraine, in 2016.
From 2014 to 2016 he was in team of
researchers who were developing new
algorithm of generation of pseudorandom
numbers. He is an author of 2 research
papers and co-author of 3 articles. His
research interests include pseudorandom number generators, stream
cyphers, symmetric and asymmetric cryptography, cryptology, malware
analysis, digital forensics, web security, software security and ethical
hacking.
Mr. Tkachuk was a recipient of President scholarship for excellent
studies and big contribution to university research project in 2015, Higher
scholarship for excellent studies from 2013-2016.
Wlodek J. Kulesza received the M.Sc. and
the Ph.D. degrees from Lodz University of
Technology, Poland, and a docent degree
from Linköping University, Sweden. In
2001 he became Professor in Measurement
Science at the University of Kalmar,
Sweden. Since 2005 he has held a
Professor position at the Blekinge Institute
of Technology, Sweden.
His current research interests are
multi-sensor systems and wireless sensor
networks.
Prof. Kulesza has been IEEE member
since 1995.

More Related Content

What's hot

New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
ijtsrd
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanism
ijcsa
 
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
ijwmn
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
APNIC
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
eSAT Journals
 
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Eswar Publications
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
eSAT Journals
 
Network embedding
Network embeddingNetwork embedding
Network embedding
SOYEON KIM
 
Deploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesDeploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesFredrick Ishengoma
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
IJECEIAES
 
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
CSCJournals
 
Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Sy...
Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Sy...Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Sy...
Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Sy...
CSCJournals
 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
IJCNCJournal
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
journalBEEI
 
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
TELKOMNIKA JOURNAL
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET Journal
 
H04845157
H04845157H04845157
H04845157
IOSR-JEN
 
Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learning
Harshal Solao
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
Editor IJCATR
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
IJCNCJournal
 

What's hot (20)

New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...New Design Architecture of Chaotic Secure Communication System Combined with ...
New Design Architecture of Chaotic Secure Communication System Combined with ...
 
An efficient recovery mechanism
An efficient recovery mechanismAn efficient recovery mechanism
An efficient recovery mechanism
 
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
A HYBRID FUZZY SYSTEM BASED COOPERATIVE SCALABLE AND SECURED LOCALIZATION SCH...
 
Clustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow DetectionClustering-based Analysis for Heavy-Hitter Flow Detection
Clustering-based Analysis for Heavy-Hitter Flow Detection
 
Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...Implementation of digital image watermarking techniques using dwt and dwt svd...
Implementation of digital image watermarking techniques using dwt and dwt svd...
 
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
Markle Tree Based Authentication Protocol for Lifetime Enhancement in Wireles...
 
High performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayesHigh performance intrusion detection using modified k mean & naïve bayes
High performance intrusion detection using modified k mean & naïve bayes
 
Network embedding
Network embeddingNetwork embedding
Network embedding
 
Deploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalitiesDeploying the producer consumer problem using homogeneous modalities
Deploying the producer consumer problem using homogeneous modalities
 
Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...Design and implementation of secured agent based NoC using shortest path rout...
Design and implementation of secured agent based NoC using shortest path rout...
 
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
On the Tree Construction of Multi hop Wireless Mesh Networks with Evolutionar...
 
Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Sy...
Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Sy...Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Sy...
Parallelization of the LBG Vector Quantization Algorithm for Shared Memory Sy...
 
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETSSECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
SECURING BGP BY HANDLING DYNAMIC NETWORK BEHAVIOR AND UNBALANCED DATASETS
 
Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...Hyper-parameter optimization of convolutional neural network based on particl...
Hyper-parameter optimization of convolutional neural network based on particl...
 
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
Detection of Malicious Circuitry Using Transition Probability Based Node Redu...
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
 
H04845157
H04845157H04845157
H04845157
 
Online opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learningOnline opportunistic routing using Reinforcement learning
Online opportunistic routing using Reinforcement learning
 
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKSLOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
LOCATION BASED DETECTION OF REPLICATION ATTACKS AND COLLUDING ATTACKS
 
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
A COMBINATION OF THE INTRUSION DETECTION SYSTEM AND THE OPEN-SOURCE FIREWALL ...
 

Similar to Generator of pseudorandom sequences

Fpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy codeFpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy code
eSAT Journals
 
VHDL Implementation of DSDV Ad-Hoc Routing Protocol
VHDL Implementation of DSDV Ad-Hoc Routing ProtocolVHDL Implementation of DSDV Ad-Hoc Routing Protocol
VHDL Implementation of DSDV Ad-Hoc Routing Protocol
IOSR Journals
 
FPGA based Data Scrambler for Ultra-Wideband Communication Systems
FPGA based Data Scrambler for Ultra-Wideband Communication SystemsFPGA based Data Scrambler for Ultra-Wideband Communication Systems
FPGA based Data Scrambler for Ultra-Wideband Communication Systems
idescitation
 
Co emulation of scan-chain based designs
Co emulation of scan-chain based designsCo emulation of scan-chain based designs
Co emulation of scan-chain based designs
ijcsit
 
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
IRJET Journal
 
Accelerating system verilog uvm based vip to improve methodology for verifica...
Accelerating system verilog uvm based vip to improve methodology for verifica...Accelerating system verilog uvm based vip to improve methodology for verifica...
Accelerating system verilog uvm based vip to improve methodology for verifica...
VLSICS Design
 
A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip
IJECEIAES
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
IJERA Editor
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
IJERA Editor
 
An octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passingAn octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passing
eSAT Journals
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
eSAT Journals
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET Journal
 
An optimized 128-bit cellular automata-based hash function for authentication...
An optimized 128-bit cellular automata-based hash function for authentication...An optimized 128-bit cellular automata-based hash function for authentication...
An optimized 128-bit cellular automata-based hash function for authentication...
IJECEIAES
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
ijcisjournal
 
Parallel Vector Tile-Optimized Library (PVTOL) Architecture-v3.pdf
Parallel Vector Tile-Optimized Library (PVTOL) Architecture-v3.pdfParallel Vector Tile-Optimized Library (PVTOL) Architecture-v3.pdf
Parallel Vector Tile-Optimized Library (PVTOL) Architecture-v3.pdf
Slide_N
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationHigh Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
IRJET Journal
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
RSIS International
 

Similar to Generator of pseudorandom sequences (20)

Fpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy codeFpga implementation of 4 bit parallel cyclic redundancy code
Fpga implementation of 4 bit parallel cyclic redundancy code
 
VHDL Implementation of DSDV Ad-Hoc Routing Protocol
VHDL Implementation of DSDV Ad-Hoc Routing ProtocolVHDL Implementation of DSDV Ad-Hoc Routing Protocol
VHDL Implementation of DSDV Ad-Hoc Routing Protocol
 
FPGA based Data Scrambler for Ultra-Wideband Communication Systems
FPGA based Data Scrambler for Ultra-Wideband Communication SystemsFPGA based Data Scrambler for Ultra-Wideband Communication Systems
FPGA based Data Scrambler for Ultra-Wideband Communication Systems
 
Co emulation of scan-chain based designs
Co emulation of scan-chain based designsCo emulation of scan-chain based designs
Co emulation of scan-chain based designs
 
50120130406033
5012013040603350120130406033
50120130406033
 
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
Prediction of Wireless Sensor Network and Attack using Machine Learning Techn...
 
Accelerating system verilog uvm based vip to improve methodology for verifica...
Accelerating system verilog uvm based vip to improve methodology for verifica...Accelerating system verilog uvm based vip to improve methodology for verifica...
Accelerating system verilog uvm based vip to improve methodology for verifica...
 
A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip A Unique Test Bench for Various System-on-a-Chip
A Unique Test Bench for Various System-on-a-Chip
 
cug2011-praveen
cug2011-praveencug2011-praveen
cug2011-praveen
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
Investigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing ApproachInvestigating the Performance of NoC Using Hierarchical Routing Approach
Investigating the Performance of NoC Using Hierarchical Routing Approach
 
20320140503011
2032014050301120320140503011
20320140503011
 
An octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passingAn octa core processor with shared memory and message-passing
An octa core processor with shared memory and message-passing
 
Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...Wireless communication without pre shared secrets using spread spectrum techn...
Wireless communication without pre shared secrets using spread spectrum techn...
 
IRJET - A Review on Crypto-Algorithm using Different Hardware
IRJET -  	  A Review on Crypto-Algorithm using Different HardwareIRJET -  	  A Review on Crypto-Algorithm using Different Hardware
IRJET - A Review on Crypto-Algorithm using Different Hardware
 
An optimized 128-bit cellular automata-based hash function for authentication...
An optimized 128-bit cellular automata-based hash function for authentication...An optimized 128-bit cellular automata-based hash function for authentication...
An optimized 128-bit cellular automata-based hash function for authentication...
 
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITYNEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
NEW ALGORITHM FOR WIRELESS NETWORK COMMUNICATION SECURITY
 
Parallel Vector Tile-Optimized Library (PVTOL) Architecture-v3.pdf
Parallel Vector Tile-Optimized Library (PVTOL) Architecture-v3.pdfParallel Vector Tile-Optimized Library (PVTOL) Architecture-v3.pdf
Parallel Vector Tile-Optimized Library (PVTOL) Architecture-v3.pdf
 
High Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing ImplementationHigh Speed Optimized AES using Parallel Processing Implementation
High Speed Optimized AES using Parallel Processing Implementation
 
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
Hardware Implementations of RS Decoding Algorithm for Multi-Gb/s Communicatio...
 

Recently uploaded

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 

Recently uploaded (20)

Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 

Generator of pseudorandom sequences

  • 1. Generator of Pseudorandom Sequences Based on a Cascade of FCSR Registers Roman Valentyn Tkachuk, Sindhu Vasireddy, Routhu Venkata Sai Kalyan School of computing, Blekinge Institute of Technology Karlskrona, Sweden {rotk16, siva16, vero16}@student.bth.se Wlodek J. Kulesza School of Engineering Blekinge Institute of Technology Karlskrona, Sweden wka@bth.se Abstract — The main aim of this research paper is to design a new pseudorandom number generator based on FCSR registers, with not affecting the speed of generation. This paper explains about the generators of pseudorandom sequences, in general and their use in cryptographic systems. There are methods to design and analyze the stream ciphers using pseudorandom number generators. In the main part, a deep description of the cascades used in the design and describe the work principle of GPRN. The analyzed statistical characteristics are obtained from various generated sequences using test package NIST 800-22 and then confirmed by experiment, that a modeled GPRN has a higher period of repetition and works faster. Keywords — feedback with carry shift register(FCSR); generators of pseudorandom sequences(GPRS); period of repeating of sequence; “truly” random sequence I. INTRODUCTION seudorandom numbers are a critical component used today for various modelling processes, starting from the study of behavior of the human brain to solve various calculations in communications. In this field of informational security, pseudorandom numbers play a critical role because the stability of an algorithm depends on the ‘randomness’. Pseudorandom numbers are used to generate stable keys necessary for secure transmission of secret information over unprotected communication channel. They are also used for various applications like creating different kinds of ‘noise’ in cryptosystems. Security system of any organization depends on all its parts. Starting from a simple user password generation to a fingerprint or a handprint scanner to a retina scanner, each component creates a single system. If one component is not stable, then the entire system may be rendered ineffective. And referring to one of the most important components, namely generators of pseudorandom numbers (GPRN), it is a systematic approach of the issue without affecting the speed of generation. The reason for selecting the feedback with carry shift register (FCSR) is because of its modern structure. It has been under development stages since 2011 and even now there are improvements being made on this register. II. SURVEY OF RELATED WORKS A lot of papers have been written in field of GPRS but none on cascading of FCSRs. General descriptions of pseudorandom sequences and generators of pseudorandom sequences are in [1]. The new approach of building register cascades is described in [3]. Also the problems of modern GPRS and ways of solving them are described in IEEE paper [4]. III. PROBLEM STATEMENT AND MAIN CONTRIBUTION Nowadays, it is a big problem for a cypher designer to find a generator of truly random sequences, without affecting the speed of generation. GPRN is used to generate a strong key that provides decryption for the encrypted data without a key. The objective of this research is to find out what is the sufficient number of registers in a cascade of FCSRs, to make a generator more random without affecting the speed of generation. The idea is that a cascade of 5 FCSRs will not affect the speed of generation because there are only 5 additional XOR operations happening. This sequence is then tested by a package of statistical tests, NIST 800-22. A file is obtained which contains information of tests that have passed and those that have not. Then based on that file, a diagram is obtained on Microsoft Excel which is more comprehensive to analyze and see which sequence is considered as ‘truly’ random. IV. PROBLEM SOLUTION The program is run on the Windows 10 environment which allows these results to be used for a big variety of cyphers where modeled GPRS can be implemented. To give a conclusion whether the sequence is ‘truly’ random or not we need to generate at least 1 billion bits. Moreover, generating these number of bits give us an opportunity to more precisely measure the speed of generation, which is the main goal. P
  • 2. TABLE I. RESULTS OF RESEARCH Type of cascade NIST tests passed Period of sequence Speed of generation 3 FCSR YES 1012 25.5 Mbps 5 FCSR YES 1018 25.5 Mbps A. Modeling Basically an FCSR is a register which has a significant advantage – a carry register. Fig. 1 Scheme of FCSR Instead of performing XOR operations on all bits of sequence, these bits XOR up with each other and with the contents of the carry register. The result is mod 2 and becomes the new bit. The result divided by 2 becomes the new content of the carry register. The maximum period of FCSR is b-1, where b is an integer of communication. This number sets the branch and is defined as: b = 2bl + 22 b2 + 23 b3 + . . . + 2n bn-1 (1) The Carry register gives an advantage over the custom LFSR, i.e. the sequence is not bound to the XOR operation between bits. This is very important because it makes the register better and makes the sequence more random. In order to make the cascade of FCSRs work properly we need to combine them with an XOR operation [1]. This is connected to the NIST 800-22 test package, because in order to pass the first test - Linear Complexity, the sequence needs to be reversible. This implies that the number of ‘1s’ and ‘0s’ in the sequence should be almost equal. B. Application To apply the work of designed cascade of FCSRs, the program is written in Microsoft Visual Studio’s WPF environment using C# and XAML programming languages. Program has a comprehensive user interface which allows the common user to work with it. After starting the program, a window is seen where a path to the text file, in which the random sequence to be generated can be selected. After that a cascade of registers which will be used for generation will be chosen. Further, there are options to choose from whether the period and speed of generation needs to be measured or not. This is necessary because the operations can significantly decrease the performance of the program. After all the steps are done, click on the «Generate» button and wait for the line under the button to fill up with green color indicates the progress of generation. C. Verification Cascades of 3 FCSRs and 5 FCSRs with 32 bits in each were used to generate sequences. Then using the NIST 800-22 tests package the results about whether the tests have passed or not is obtained. Test is considered passed only in case when statistical value lies in interval from 0.98 to 0.999, other way the test is not passed. Fig. 2 Diagram of results of 3 FCSRs cascade The results of 3 FCSRs cascade testing show that all the tests were passed but the values are spread all over the interval. Fig. 3 Diagram of results of 5 FCSRs cascade The results of 5 FCSRs cascade show much better results, statistical values lay in interval from 0.985 to 0.995. V. CONCLUSION Summarizing, all the obtained results show that a cascade of 5 FCSRs pass the package of statistical tests NIST 800-22 without affecting the speed of generation. This generator has a good characteristics and can be implemented in a big variety of already existing cryptographic algorithms [2]. Future work: Designing of new cypher which has this GPRS embedded. This cascade of FCSRs can be extended to be implemented on other operating system platforms as well. REFERENCES [1] B. Stoyanov and K. Kordov, “Pseudorandom Bit Generator with Parallel Implementation,” in Large-Scale Scientific Computing, I. Lirkov, S. Margenov, and J. Waśniewski, Eds. Springer Berlin Heidelberg, 2013, pp. 557–564. [2] Karthikeyan, S., Sairam, N., Manikandan, G., Sivaguru, J.: A parallel approach for improving data security. J. Theor. Appl. Inf. Technol. 39(2), 119–125 (2012) [3] M. Francois, T. Grosges, D. Barchiesi, and R. Erra, “A New Pseudo- Random Number Generator Based on Two Chaotic Maps,” Informatica, vol. 24, no. 2, pp. 181–197, Jan. 2013. [4] M. Jessa and M. Jaworski, “Producing secure pseudorandom sequences with combined multiplicative congruential generators,” in 2012 19th International Conference on Systems, Signals and Image Processing (IWSSIP), 2012, pp. 160–163.
  • 3. Biographies Routhu Venkata Sai Kalyan was born in Hyderabad City, India, in 1995. He received his B.Tech Degree in Electronics and Communication Engineering from Jawaharlal Nehru Technological University, Hyderabad, in 2015. He is currently pursuing his M.Sc. Degree in Electrical Engineering with emphasis on Telecommunication Systems at Blekinge Institute of Technology(BTH), Karlskrona, Sweden. From 2013 to 2015, he worked as a coordinator of Swetcha Organization, Hyderabad, India. He has attended for Internship programme at Corporate Research & Development, Bharat Heavy Electrical Limited, India, in 2015. He worked as a member of NULL, India’s active open security community, Hyderabad chapter. Mr. Kalyan was the winner of poster presentation, National Level Techno Cultural Fest, Quest, in 2015 and the Hyderabad Quizzotic Winner, 2014. Vasireddy Sindhu was born in Hyderabad, India, in 1994. She had finished her schooling from the Narayana Olympiad school, Ashok Nagar, Hyderabad in 2009. She then completed her intermediate schooling from Vijaya Ratna junior college, Nallakunta, Hyderabad in 2011. She joined into the Integrated Double Degree Master’s Program(IDDMP) in Jawaharlal Nehru Technological University Hyderabad(JNTUH). She completed her Bachelor of Technology(B.TECH) there and is currently pursuing Master’s in Telecommunications specialisation in Blekinge Tekniska Hogskola(BTH). She has done her Industrial Internship at Ananth Technologies Ltd (ATL), Hyderabad, a supplier of missile and rocket parts to Indian Space Research Organisation(ISRO) in Sriharikota for two months. She involved in various stages of products manufactured under their guidance. Ms. Vasireddy has been awarded the proficiency in academics award for three consecutive years from 2003-2006 in high school. She has participated in several workshops and conducted two workshops, one is the Internet of things(IOT) and one other is the Embedded systems and has also actively participated in many science Olympiads. Tkachuk Roman-Valentyn was born in Pidbirtsy Village, Pustomuty district, L’viv region, Ukraine in 1995. He received the B.Sc. degree in informational security from the L’viv Polytechnic Nationa University, Lviv, Ukraine, in 2016. From 2014 to 2016 he was in team of researchers who were developing new algorithm of generation of pseudorandom numbers. He is an author of 2 research papers and co-author of 3 articles. His research interests include pseudorandom number generators, stream cyphers, symmetric and asymmetric cryptography, cryptology, malware analysis, digital forensics, web security, software security and ethical hacking. Mr. Tkachuk was a recipient of President scholarship for excellent studies and big contribution to university research project in 2015, Higher scholarship for excellent studies from 2013-2016. Wlodek J. Kulesza received the M.Sc. and the Ph.D. degrees from Lodz University of Technology, Poland, and a docent degree from Linköping University, Sweden. In 2001 he became Professor in Measurement Science at the University of Kalmar, Sweden. Since 2005 he has held a Professor position at the Blekinge Institute of Technology, Sweden. His current research interests are multi-sensor systems and wireless sensor networks. Prof. Kulesza has been IEEE member since 1995.