Araştırma Makalesi

SecureRandom Kütüphanesi Kullanarak Yazılımsal Trivium Oluşturma

Sayı: 34 31 Mart 2022
PDF İndir
EN TR

Generating Software Trivium Using SecureRandom Library

Abstract

In this study, a software trivium structure was created. Trivium is one of the structures created by connecting 3 LFSRs (Linear feedback shift registers) with various logic gates and used as a random number generator. Trivium structures can be created in hardware or software. There are various methods and algorithms proposed in the literature to determine the initial values (key, initial vector and LFSR initial contents) of software trivium structures. In this study, unlike the existing studies, the first conditions were created by using the Java SecureRandom library. Pseudo-random numbers generated using the software trivium structure created in the study were analyzed with NIST SP 800-22 Rev.1a tests. The binary sequences produced using the generated trivium structure passed the randomness tests successfully.

Keywords

Destekleyen Kurum

İnönü üniversitesi BAP Birimi

Proje Numarası

FBG-2020- 2143

Teşekkür

Bu çalışma İnönü Üniversitesi Bilimsel Araştırma Projeleri Daire Başkanlığı'nın (İnönü BAP) FBG-2020- 2143 numaralı projesi ile desteklenmiştir. Değerli destekleri için İnönü Üniversitesi İnönü BAP'a teşekkürlerimi sunarım.

Kaynakça

  1. Özkaynak F. (2018). Brief review on application of nonlinear dynamics in image encryption, Nonlinear Dynamics, 1573-269X, https://doi.org/10.1007/s11071-018-4056-x
  2. Arrachid K. Et. Al (2014). Arrachid K, Mohamed Mejri M., Sadio T.E., AVTAC: A Framework for Automatic Auditing of Access Control in Windows and Linux Systems, New Trends in Software Methodologies, Tools and Techniques page. 672-691 doi: 10.3233/978-1-61499-434-3-672
  3. Beletsky A. (2021). Generalized Galois-Fibonacci Matrix Generators Pseudo-Random Sequences, Computer Network and Information Security, 6,57-69, DOI: 10.5815/ijcnis.2021.06.05
  4. Manikya D.M. (2021). D. M. Manikya, M. Jagruthi, R. Anjum and A. K. K, "Design of Test Compression for Multiple Scan Chains Circuits," 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), 2021, pp. 1-5, doi: 10.1109/ICSCAN53069.2021.9526387.
  5. S. Islam and I. U. Haq (2016). "Cube attack on Trivium and A5/1 stream ciphers," 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 409-415, doi: 10.1109/IBCAST.2016.7429911.
  6. Ravichandran, D., Rajagopalan, S., Upadhyay, H. N., Rayappan, J. B. B., & Amirtharajan, R. (2018). Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA. Journal of Signal Processing Systems, 91(5), 475–501. https://doi.org/10.1007/s11265-018-1337-z
  7. Mondal, B., Sinha, N., & Mandal, T. (2016). A secure image encryption algorithm using LFSR and RC4 key stream generator. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, ICACNI 2015 (pp. 227-237). (Smart Innovation, Systems and Technologies; Vol. 43). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-81-322-2538-6_24
  8. Goresky M. and Klapper A. M. (2002). "Fibonacci and Galois representations of feedback-with-carry shift registers," in IEEE Transactions on Information Theory, vol. 48, no. 11, pp. 2826-2836, Nov. 2002, doi: 10.1109/TIT.2002.804048.

Ayrıntılar

Birincil Dil

Türkçe

Konular

Mühendislik

Bölüm

Araştırma Makalesi

Yayımlanma Tarihi

31 Mart 2022

Gönderilme Tarihi

7 Mart 2022

Kabul Tarihi

18 Mart 2022

Yayımlandığı Sayı

Yıl 1970 Sayı: 34

Kaynak Göster

APA
İnce, C., İnce, K., & Hanbay, D. (2022). SecureRandom Kütüphanesi Kullanarak Yazılımsal Trivium Oluşturma. Avrupa Bilim ve Teknoloji Dergisi, 34, 639-644. https://doi.org/10.31590/ejosat.1084005

Cited By