Abstract
Nowadays, the practice of developing algorithms to maintain the confidentiality of data shows that there is a lack of some features, such as velocity, predictability, etc. Generating pseudorandom numbers is one such problem that lies in the basement of many algorithms, even in hardware microprograms. An unreliable generator can cause cyberattacks on it, despite the security in the upper layers. At the same time, the algorithm should be fast enough to provide uninterrupted circuit work for the entire system. The paper presents a new algorithm generating pseudorandom numbers on cellular automata, which is not only fast and easy-repeating, but unpredictable enough and can be used in cryptographic systems. One of the main tasks of pseudorandom number generators (PRNG) is to present a high level of nonlinearity, or as it can also be named, asymmetry. Using the National Institute of Standards and Technology (NIST) statistical test suite for random number generators and pseudorandom number generators, it is shown that the presented algorithm is more than three times superior to the state-of-the-art methods and algorithms in terms of p-value. A high level of the presented algorithm’s parallelization allows for implementation effectively on calculators with parallel structure. Central Processing Unit (CPU)-based architecture, Field-Programmable Gate Array (FPGA)-based architecture, Compute Unified Device Architecture (CUDA)-based architecture of PRNG and different PRNG implementations are presented to confirm the high performance of the proposed solution.
Subject
Physics and Astronomy (miscellaneous),General Mathematics,Chemistry (miscellaneous),Computer Science (miscellaneous)
Reference53 articles.
1. RSA Key Extraction via Low-Bandwidth Acoustic Cryptanalysis;Genkin;IACR Cryptol. Eprint Arch.,2013
2. Get Your Hands Off My Laptop: Physical Side-Channel Key-Extraction Attacks on PCs;Genkin;J. Cryptogr. Eng.,2014
3. Stealing Keys from PCs by Radio: Cheap Electromagnetic Attacks on Windowed Exponentiation;Genkin;IACR Cryptol. Eprint Arch.,2015
4. Mobile Social Networking under Side-Channel Attacks: Practical Security Challenges;Levina;IEEE Access,2017
5. Side-channel attacks and machine learning approach;Levina;Proceedings of the Conference of Open Innovation Association,2016
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献