Abstract
Highly random binary sequences generated by any keystream generator provides adequate service for the rapidly growing demands of cryptographic applications. Using several statistical randomness test analysis, we found that the randomness properties of binary sequences generated by multiple-recursive matrix generators are not statistically secure for cryptographic solutions. To overcome the randomness loopholes, we propose nonlinearly filtered multiple-recursive matrix generator and experimentally establish that the mentioned generator provides high-quality randomness results. We evaluate the statistical security of the proposed scheme with the help of NIST randomness test, autocorrelation test, linear complexity test, and avalanche test. Moreover, we compare our randomness test results with some of the high-quality software oriented stream ciphers like Snow, HC-128, and ZUC.
Similar content being viewed by others
Data Availability
The datasets generated during and/or analysed during the current study are available from the corresponding author on reasonable request.
Code Availability
The code used (if any) in the manuscript is a generalized code for data analysis and is not specific to the findings of this work.
Notes
\((\star )\) represents MRMG with special vector Boolean function, and \((\#)\) represents MRMG with PRESENT S-box conjecture
References
Muthalagu, R., & Jain, S. (2016). Modifying lfsr of zuc to reduce time for key-stream generation. Journal of Cyber Security and Mobility, 5(4), 257–268.
Deb, S., & Bhuyan, B. (2018). Performance evaluation of grain family and espresso ciphers for applications on resource constrained devices. ICT Express, 4(1), 19–23.
Deb, S., Upadhya, R., & Bhuyan, B. (2018). Applicability of lightweight stream cipher in crowd computing: A detailed survey and analysis. In A.-S. Khan Pathan (Ed.), Crowd Assisted Networking and Computing (pp. 245–272). CRC Press.
Manifavas, C., Hatzivasilis, G., Fysarakis, K., & Papaefstathiou, Y. (2016). A survey of lightweight stream ciphers for embedded systems. Security and Communication Networks, 9(10), 1226–1246.
Dubrova, E., & Hell, M. (2017). Espresso: A stream cipher for 5g wireless communication systems. Cryptography and Communications, 9(2), 273–289.
Deb, S., Biswas, B., & Bhuyan, B. (2019). Secure image encryption scheme using high efficiency word-oriented feedback shift register over finite field. Multimedia Tools and Applications, 78(24), 34901–34925.
Deb, S., & Bhuyan, B. (2021). Chaos-based medical image encryption scheme using special nonlinear filtering function based lfsr. Multimedia Tools and Applications, 80(13), 19803–19826.
Bishoi, S., Senapati, K., & Shankar, B. R. (2020). Shrinking generators based on -lfsrs. Discrete Applied Mathematics, 285, 493–500.
Preneel, B. (1995). Introduction to the Proceedings of the Second Workshop on Fast Software Encryption. Lecture Notes in Computer Science (Vol. 1008, pp. 1–5). Springer.
Niederreiter, H. (1993). Factorization of polynomials and some linear-algebra problems over finite fields. Linear Algebra and its Applications, 192, 301–328.
Zeng, G., Han, W., & He, K. (2007). High efficiency feedback shift register: \(-\)lfsr. IACR Cryptology ePrint Archive, Report 2007/114, 2007.
Tsaban, B., & Vishne, U. (2002). Efficient linear feedback shift registers with maximal period. Finite Fields and Their Applications, 8(2), 256–267.
Ul Hasan, S., Panario, D., & Wang, Q. (2018). Nonlinear vectorial primitive recursive sequences. Cryptography and Communications, 10(6), 1075–1090.
Roy, S., & Krishnaswamy, S. (2020). On the frequency of symbols in sequences generated by nonlinear feedforward generators. Cryptography and Communications, 12(1), 115–126.
Qasaimeh, M., Al-Qassas, R. S., & Tedmori, S. (2018). Software randomness analysis and evaluation of lightweight ciphers: The prospective for iot security. Multimedia Tools and Applications, 77(14), 18415–18449.
Sýs, M., & Matyáš, V. (2016). Randomness Testing: Result Interpretation and Speed. Springer.
Saravanan, P., & Kalpana, P. (2018). Novel reversible design of advanced encryption standard cryptographic algorithm for wireless sensor networks. Wireless Personal Communications, 100(4), 1427–1458.
Burnett, L., Millan, W., Dawson, E., & Clark, A. (2004). Simpler methods for generating better boolean functions with good cryptographic properties. Australasian Journal of Combinatorics, 29, 231–248.
Sathya Priya, S., Karthigaikumar, P., Siva Mangai, N. M., & Gaurav Das, P. K. (2017). An efficient hardware architecture for high throughput aes encryptor using mux based sub pipelined s-box. Wireless Personal Communications, 94(4), 2259–2273.
Bogdanov, A., Knudsen, L. R., Leander, G., Paar, C., Poschmann, A., Robshaw, M. J., Seurin, Y., & Vikkelsoe, C. (2007). Present: An ultra-lightweight block cipher. In Proceedings of the 9th international workshop on cryptographic hardware and embedded systems, CHES ’07, pp 450–466. Springer.
Bassham, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Leigh, S. D., Levenson, M., Vangel, M., Heckert, N. A., & Banks, D. L. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic applications| nist. Technical report, National Institute of Standards & Technology.
Brown, R. G. (2013). Dieharder: A random number test suite (version 3.31).
Massey, J. (1969). Shift-register synthesis and bch decoding. IEEE transactions on Information Theory, 15(1), 122–127.
Ul Hasan, S., Panario, D., & Wang, Q. (2012). Word-oriented transformation shift registers and their linear complexity. In T. Helleseth & J. Jedwab (Eds.), Sequences and Their Applications—SETA 2012 (pp. 190–201). Springer.
Tarannikov, Y., Korolev, P., & Botev, A. (2001). Autocorrelation coefficients and correlation immunity of boolean functions. In C. Boyd (Ed.), Advances in Cryptology–ASIACRYPT 2001 (pp. 460–479). Springer.
Deb, S., & Bhuyan, B. (2020). Performance analysis of current lightweight stream ciphers for constrained environments. Sādhanā, 45(1), 1–12.
Ekdahl, P., & Johansson, T. (2002). A new version of the stream cipher snow. In International workshop on selected areas in cryptography, pp. 47–61. Springer.
Wu, H. (2008). The stream cipher hc-128. In New stream cipher designs, pp. 39–47. Springer.
ETSI/SAGE. (2011). Specification of the 3gpp confidentiality and integrity algorithms 128-eea3 & 128-eia3: Zuc specification.
Mandal, B., Stănică, P., & Gangopadhyay, S. (2019). New classes of p-ary bent functions. Cryptography and Communications, 11(1), 77–92.
Acknowledgements
The authors want to thank Prof. Subhamoy Maitra and Dr. Sartaj Ul Hasan, their comments and suggestions improved this paper’s editorial and technical quality.
Funding
This work was not funded by any agency.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Conflicts of interest
There is no conflict of interest in publishing this manuscript.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendix A: Description of the MRMG
Appendix A: Description of the MRMG
1.1 A.1: Test Vectors of MRMG (I, II, III)
In this paper, we have considered three types of MRMG. Particularly, all the polynomial equations are listed in [11, B, Page No. -13]. Polynomial equation of the MRMG(I, II, III) mentioned in bellow. \(x^{16} + \sigma x^3 + \wedge \texttt {0x5437af9e} x^2 + \sigma\) [MRMG I] \(x^{16} + \wedge \texttt {0x5e8491f8} x^3 + \mathbf{L} x^6 + \mathbf{R} x^5 + 1\) [MRMG II] \(x^{16} + \wedge \texttt {0x7ceabddf} x^9 + \sqcup _{1, 1}\) [MRMG III] Notation : \(\sigma\) - Circular Rotation operation, \(\wedge\) - AND operation, \(\mathbf{L}\) - Left Rotation, \(\mathbf{R}\) - Right Rotation, \(\sqcup\) - Left Right Shift combination operation, and \(\texttt {0x5437af9e}\) - 32-bit vector. In this work, MRMG coded in C language. Further, MRMG seed value loaded by 16 blocks of Hex bits (that is each block contains 32-bit) and shown in bellow.
1.2 A.2 Hardware Structure of Special Vector Boolean Function
For the special nonlinear filter function implementation, we used the Xilinx (Virtex) FPGA, family Automotive Spartan3, device xa3s50-4-vqg100 for synthesis and simulation. Special vectorial Boolean function is presented in Fig. 4, and its synthesis results are shown in Table 9.
Rights and permissions
About this article
Cite this article
Deb, S., Pal, S. & Bhuyan, B. NMRMG: Nonlinear Multiple-Recursive Matrix Generator Design Approaches and Its Randomness Analysis. Wireless Pers Commun 125, 577–597 (2022). https://doi.org/10.1007/s11277-022-09566-5
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11277-022-09566-5