Skip to main content
Log in

NMRMG: Nonlinear Multiple-Recursive Matrix Generator Design Approaches and Its Randomness Analysis

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Highly random binary sequences generated by any keystream generator provides adequate service for the rapidly growing demands of cryptographic applications. Using several statistical randomness test analysis, we found that the randomness properties of binary sequences generated by multiple-recursive matrix generators are not statistically secure for cryptographic solutions. To overcome the randomness loopholes, we propose nonlinearly filtered multiple-recursive matrix generator and experimentally establish that the mentioned generator provides high-quality randomness results. We evaluate the statistical security of the proposed scheme with the help of NIST randomness test, autocorrelation test, linear complexity test, and avalanche test. Moreover, we compare our randomness test results with some of the high-quality software oriented stream ciphers like Snow, HC-128, and ZUC.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3

Similar content being viewed by others

Data Availability

The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.

Code Availability

The code used (if any) in the manuscript is a generalized code for data analysis and is not specific to the findings of this work.

Notes

  1. \((\star )\) represents MRMG with special vector Boolean function, and \((\#)\) represents MRMG with PRESENT S-box conjecture

References

  1. Muthalagu, R., & Jain, S. (2016). Modifying lfsr of zuc to reduce time for key-stream generation. Journal of Cyber Security and Mobility, 5(4), 257–268.

    Article  Google Scholar 

  2. Deb, S., & Bhuyan, B. (2018). Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices. ICT Express, 4(1), 19–23.

    Article  Google Scholar 

  3. Deb, S., Upadhya, R., & Bhuyan, B. (2018). Applicability of lightweight stream cipher in crowd computing: A detailed survey and analysis. In A.-S. Khan Pathan (Ed.), Crowd Assisted Networking and Computing (pp. 245–272). CRC Press.

    Google Scholar 

  4. Manifavas, C., Hatzivasilis, G., Fysarakis, K., & Papaefstathiou, Y. (2016). A survey of lightweight stream ciphers for embedded systems. Security and Communication Networks, 9(10), 1226–1246.

    Article  Google Scholar 

  5. Dubrova, E., & Hell, M. (2017). Espresso: A stream cipher for 5g wireless communication systems. Cryptography and Communications, 9(2), 273–289.

    Article  MathSciNet  Google Scholar 

  6. Deb, S., Biswas, B., & Bhuyan, B. (2019). Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field. Multimedia Tools and Applications, 78(24), 34901–34925.

    Article  Google Scholar 

  7. Deb, S., & Bhuyan, B. (2021). Chaos-based medical image encryption scheme using special nonlinear filtering function based lfsr. Multimedia Tools and Applications, 80(13), 19803–19826.

    Article  Google Scholar 

  8. Bishoi, S., Senapati, K., & Shankar, B. R. (2020). Shrinking generators based on -lfsrs. Discrete Applied Mathematics, 285, 493–500.

    Article  MathSciNet  Google Scholar 

  9. Preneel, B. (1995). Introduction to the Proceedings of the Second Workshop on Fast Software Encryption. Lecture Notes in Computer Science (Vol. 1008, pp. 1–5). Springer.

    Google Scholar 

  10. Niederreiter, H. (1993). Factorization of polynomials and some linear-algebra problems over finite fields. Linear Algebra and its Applications, 192, 301–328.

    Article  MathSciNet  Google Scholar 

  11. Zeng, G., Han, W., & He, K. (2007). High efficiency feedback shift register: \(-\)lfsr. IACR Cryptology ePrint Archive, Report 2007/114, 2007.

  12. Tsaban, B., & Vishne, U. (2002). Efficient linear feedback shift registers with maximal period. Finite Fields and Their Applications, 8(2), 256–267.

    Article  MathSciNet  Google Scholar 

  13. Ul Hasan, S., Panario, D., & Wang, Q. (2018). Nonlinear vectorial primitive recursive sequences. Cryptography and Communications, 10(6), 1075–1090.

    Article  MathSciNet  Google Scholar 

  14. Roy, S., & Krishnaswamy, S. (2020). On the frequency of symbols in sequences generated by nonlinear feedforward generators. Cryptography and Communications, 12(1), 115–126.

    Article  MathSciNet  Google Scholar 

  15. Qasaimeh, M., Al-Qassas, R. S., & Tedmori, S. (2018). Software randomness analysis and evaluation of lightweight ciphers: The prospective for iot security. Multimedia Tools and Applications, 77(14), 18415–18449.

    Article  Google Scholar 

  16. Sýs, M., & Matyáš, V. (2016). Randomness Testing: Result Interpretation and Speed. Springer.

    MATH  Google Scholar 

  17. Saravanan, P., & Kalpana, P. (2018). Novel reversible design of advanced encryption standard cryptographic algorithm for wireless sensor networks. Wireless Personal Communications, 100(4), 1427–1458.

    Article  Google Scholar 

  18. Burnett, L., Millan, W., Dawson, E., & Clark, A. (2004). Simpler methods for generating better boolean functions with good cryptographic properties. Australasian Journal of Combinatorics, 29, 231–248.

    MathSciNet  MATH  Google Scholar 

  19. Sathya Priya, S., Karthigaikumar, P., Siva Mangai, N. M., & Gaurav Das, P. K. (2017). An efficient hardware architecture for high throughput aes encryptor using mux based sub pipelined s-box. Wireless Personal Communications, 94(4), 2259–2273.

    Article  Google Scholar 

  20. Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Seurin, Y., & Vikkelsoe, C. (2007). Present: An ultra-lightweight block cipher. In Proceedings of the 9th international workshop on cryptographic hardware and embedded systems, CHES ’07, pp 450–466. Springer.

  21. Bassham, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Leigh, S. D., Levenson, M., Vangel, M., Heckert, N. A., & Banks, D. L. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications| nist. Technical report, National Institute of Standards & Technology.

  22. Brown, R. G. (2013). Dieharder: A random number test suite (version 3.31).

  23. Massey, J. (1969). Shift-register synthesis and bch decoding. IEEE transactions on Information Theory, 15(1), 122–127.

    Article  MathSciNet  Google Scholar 

  24. Ul Hasan, S., Panario, D., & Wang, Q. (2012). Word-oriented transformation shift registers and their linear complexity. In T. Helleseth & J. Jedwab (Eds.), Sequences and Their Applications—SETA 2012 (pp. 190–201). Springer.

    Chapter  Google Scholar 

  25. Tarannikov, Y., Korolev, P., & Botev, A. (2001). Autocorrelation coefficients and correlation immunity of boolean functions. In C. Boyd (Ed.), Advances in Cryptology–ASIACRYPT 2001 (pp. 460–479). Springer.

    Chapter  Google Scholar 

  26. Deb, S., & Bhuyan, B. (2020). Performance analysis of current lightweight stream ciphers for constrained environments. Sādhanā, 45(1), 1–12.

    Article  Google Scholar 

  27. Ekdahl, P., & Johansson, T. (2002). A new version of the stream cipher snow. In International workshop on selected areas in cryptography, pp. 47–61. Springer.

  28. Wu, H. (2008). The stream cipher hc-128. In New stream cipher designs, pp. 39–47. Springer.

  29. ETSI/SAGE. (2011). Specification of the 3gpp confidentiality and integrity algorithms 128-eea3 & 128-eia3: Zuc specification.

  30. Mandal, B., Stănică, P., & Gangopadhyay, S. (2019). New classes of p-ary bent functions. Cryptography and Communications, 11(1), 77–92.

    Article  MathSciNet  Google Scholar 

Download references

Acknowledgements

The authors want to thank Prof. Subhamoy Maitra and Dr. Sartaj Ul Hasan, their comments and suggestions improved this paper’s editorial and technical quality.

Funding

This work was not funded by any agency.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Subhrajyoti Deb.

Ethics declarations

Conflicts of interest

There is no conflict of interest in publishing this manuscript.

Additional information

Publisher's Note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Appendix A: Description of the MRMG

Appendix A: Description of the MRMG

1.1 A.1: Test Vectors of MRMG (I, II, III)

In this paper, we have considered three types of MRMG. Particularly, all the polynomial equations are listed in [11, B, Page No. -13]. Polynomial equation of the MRMG(I, II, III) mentioned in bellow. \(x^{16} + \sigma x^3 + \wedge \texttt {0x5437af9e} x^2 + \sigma\) [MRMG I] \(x^{16} + \wedge \texttt {0x5e8491f8} x^3 + \mathbf{L} x^6 + \mathbf{R} x^5 + 1\) [MRMG II] \(x^{16} + \wedge \texttt {0x7ceabddf} x^9 + \sqcup _{1, 1}\) [MRMG III] Notation : \(\sigma\) - Circular Rotation operation, \(\wedge\) - AND operation, \(\mathbf{L}\) - Left Rotation, \(\mathbf{R}\) - Right Rotation, \(\sqcup\) - Left Right Shift combination operation, and \(\texttt {0x5437af9e}\) - 32-bit vector. In this work, MRMG coded in C language. Further, MRMG seed value loaded by 16 blocks of Hex bits (that is each block contains 32-bit) and shown in bellow.

figure d

1.2 A.2 Hardware Structure of Special Vector Boolean Function

For the special nonlinear filter function implementation, we used the Xilinx (Virtex) FPGA, family Automotive Spartan3, device xa3s50-4-vqg100 for synthesis and simulation. Special vectorial Boolean function is presented in Fig. 4, and its synthesis results are shown in Table 9.

Fig. 4
figure 4

Synthesized hardware structure (Schematic technology) of the special nonlinear vector Boolean function

Table 9 Synthesis results of the special nonlinear vector Boolean function using xa3s50-4-vqg100

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Deb, S., Pal, S. & Bhuyan, B. NMRMG: Nonlinear Multiple-Recursive Matrix Generator Design Approaches and Its Randomness Analysis. Wireless Pers Commun 125, 577–597 (2022). https://doi.org/10.1007/s11277-022-09566-5

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-022-09566-5

Keywords

Navigation