Araştırma Makalesi
BibTex RIS Kaynak Göster

SecureRandom Kütüphanesi Kullanarak Yazılımsal Trivium Oluşturma

Yıl 2022, Sayı: 34, 639 - 644, 31.03.2022
https://doi.org/10.31590/ejosat.1084005

Öz

Bu çalışmada yazılımsal trivium yapısı oluşturulmuştur. Trivium, 3 adet LFSR’nin (Doğrusal geri beslemeli kaydırmalı yazmaç) çeşitli mantık kapılarıyla birbirine bağlanmasıyla oluşturulan ve rasgele sayı üreteci olarak kullanılan yapılardan biridir. Trivium yapıları donanımsal veya yazılımsal oluşturulabilir. Yazılımsal trivium yapılarının ilk değerlerini (anahtar, başlangıç vektörü ve LFSR başlangıç içerikleri) belirlemek için literatürde önerilen çeşitli yöntem ve algoritmalar mevcuttur. Bu çalışmada mevcut çalışmalardan farklı olarak ilk şartlar Java SecureRandom kütüphanesi kullanlarak oluşturulmuştur. Çalışmada oluşturulan yazılımsal trivium yapısı kullanılarak üretilen sözde rasgele sayılar NIST SP 800-22 Rev.1a testleri ile analiz edilmiştir. Oluşturulan trivium yapısı kullanılarak üretilen ikili diziler rasgelelik testlerinden başarılı şekilde geçmiştir.

Destekleyen Kurum

İnönü üniversitesi BAP Birimi

Proje Numarası

FBG-2020- 2143

Teşekkür

Bu çalışma İnönü Üniversitesi Bilimsel Araştırma Projeleri Daire Başkanlığı'nın (İnönü BAP) FBG-2020- 2143 numaralı projesi ile desteklenmiştir. Değerli destekleri için İnönü Üniversitesi İnönü BAP'a teşekkürlerimi sunarım.

Kaynakça

  • Özkaynak F. (2018). Brief review on application of nonlinear dynamics in image encryption, Nonlinear Dynamics, 1573-269X, https://doi.org/10.1007/s11071-018-4056-x
  • Arrachid K. Et. Al (2014). Arrachid K, Mohamed Mejri M., Sadio T.E., AVTAC: A Framework for Automatic Auditing of Access Control in Windows and Linux Systems, New Trends in Software Methodologies, Tools and Techniques page. 672-691 doi: 10.3233/978-1-61499-434-3-672
  • Beletsky A. (2021). Generalized Galois-Fibonacci Matrix Generators Pseudo-Random Sequences, Computer Network and Information Security, 6,57-69, DOI: 10.5815/ijcnis.2021.06.05
  • Manikya D.M. (2021). D. M. Manikya, M. Jagruthi, R. Anjum and A. K. K, "Design of Test Compression for Multiple Scan Chains Circuits," 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), 2021, pp. 1-5, doi: 10.1109/ICSCAN53069.2021.9526387.
  • S. Islam and I. U. Haq (2016). "Cube attack on Trivium and A5/1 stream ciphers," 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 409-415, doi: 10.1109/IBCAST.2016.7429911.
  • Ravichandran, D., Rajagopalan, S., Upadhyay, H. N., Rayappan, J. B. B., & Amirtharajan, R. (2018). Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA. Journal of Signal Processing Systems, 91(5), 475–501. https://doi.org/10.1007/s11265-018-1337-z
  • Mondal, B., Sinha, N., & Mandal, T. (2016). A secure image encryption algorithm using LFSR and RC4 key stream generator. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, ICACNI 2015 (pp. 227-237). (Smart Innovation, Systems and Technologies; Vol. 43). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-81-322-2538-6_24
  • Goresky M. and Klapper A. M. (2002). "Fibonacci and Galois representations of feedback-with-carry shift registers," in IEEE Transactions on Information Theory, vol. 48, no. 11, pp. 2826-2836, Nov. 2002, doi: 10.1109/TIT.2002.804048.
  • Chakraborty A., Mazumdar B., Mukhopadhyay D. (2014) Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?. In: Chakraborty R.S., Matyas V., Schaumont P. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2014. Lecture Notes in Computer Science, vol 8804. Springer, Cham. https://doi.org/10.1007/978-3-319-12060-7_2
  • P. Zode, R. Deshmukh (2019). "FPGA Based Novel True Random Number Generator using LFSR with Dynamic Seed," 2019 IEEE 16th India Council International Conference (INDICON), 2019, pp. 1-3, doi: 10.1109/INDICON47234.2019.9029049.
  • Garipcan, A. M. , Erdem, E. & Tuncer, T. (2017). Donanım Tabanlı Trivium Akış Şifreleme Algoritmasının FPGA Ortamında Gerçekleştirilmesi. Fırat Üniversitesi Mühendislik Bilimleri Dergisi , 29 (2) , 119-130
  • Kaya, T. (2020). “Memristor and Trivium-based true random number generator”, Physica A Statistical Mechanics and its Applications, vol. 542, 2020. doi:10.1016/j.physa.2019.124071.
  • Etem T., Kaya T. (2020). Görüntü Şifreleme için Trivium Doğrusal Eşlenik Üreteci Tabanlı Bit Üretimi , Fırat Üniversitesi Mühendislik Bilimleri Dergisi. 32(1), 287-294
  • Berlekamp, Elwyn R. (2015). Algebraic Coding Theory - Revised Edition, World Scientific Publishing Co., Inc. USA, ISBN: 9789814635899
  • Reeds, J. A.; Sloane, N. J. A. (1985), "Shift-Register Synthesis (Modulo n)", SIAM Journal on Computing, 14 (3): 505–513, CiteSeerX 10.1.1.48.4652, doi:10.1137/0214038
  • İnce, K. (2021). Security Analysis of Java SecureRandom Library , Avrupa Bilim ve Teknoloji Dergisi, Ejosat Special Issue 2021 (Araconf), 157-160. DOI: 10.31590/ejosat.900956.
  • Bassham III, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Barker, E. B., ... & Vo, S. (2010). Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications.
  • https://www.ecrypt.eu.org/stream/ (Link erişim:23.01.2022 14:17)
  • Soto, J., & Bassham, L. (2000). Randomness testing of the advanced encryption standard finalist candidates. Booz-Allen And Hamilton Inc Mclean Va.
  • Cannière, C. D., & Preneel, B. (2008). Trivium. In New stream cipher designs (pp. 244-266). Springer, Berlin, Heidelberg. Deb, S., Bhuyan, B. (2021). Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR. Multimed Tools Appl 80, 19803–19826. https://doi.org/10.1007/s11042-020-10308-7

Generating Software Trivium Using SecureRandom Library

Yıl 2022, Sayı: 34, 639 - 644, 31.03.2022
https://doi.org/10.31590/ejosat.1084005

Öz

In this study, a software trivium structure was created. Trivium is one of the structures created by connecting 3 LFSRs (Linear feedback shift registers) with various logic gates and used as a random number generator. Trivium structures can be created in hardware or software. There are various methods and algorithms proposed in the literature to determine the initial values (key, initial vector and LFSR initial contents) of software trivium structures. In this study, unlike the existing studies, the first conditions were created by using the Java SecureRandom library. Pseudo-random numbers generated using the software trivium structure created in the study were analyzed with NIST SP 800-22 Rev.1a tests. The binary sequences produced using the generated trivium structure passed the randomness tests successfully.

Proje Numarası

FBG-2020- 2143

Kaynakça

  • Özkaynak F. (2018). Brief review on application of nonlinear dynamics in image encryption, Nonlinear Dynamics, 1573-269X, https://doi.org/10.1007/s11071-018-4056-x
  • Arrachid K. Et. Al (2014). Arrachid K, Mohamed Mejri M., Sadio T.E., AVTAC: A Framework for Automatic Auditing of Access Control in Windows and Linux Systems, New Trends in Software Methodologies, Tools and Techniques page. 672-691 doi: 10.3233/978-1-61499-434-3-672
  • Beletsky A. (2021). Generalized Galois-Fibonacci Matrix Generators Pseudo-Random Sequences, Computer Network and Information Security, 6,57-69, DOI: 10.5815/ijcnis.2021.06.05
  • Manikya D.M. (2021). D. M. Manikya, M. Jagruthi, R. Anjum and A. K. K, "Design of Test Compression for Multiple Scan Chains Circuits," 2021 International Conference on System, Computation, Automation and Networking (ICSCAN), 2021, pp. 1-5, doi: 10.1109/ICSCAN53069.2021.9526387.
  • S. Islam and I. U. Haq (2016). "Cube attack on Trivium and A5/1 stream ciphers," 2016 13th International Bhurban Conference on Applied Sciences and Technology (IBCAST), pp. 409-415, doi: 10.1109/IBCAST.2016.7429911.
  • Ravichandran, D., Rajagopalan, S., Upadhyay, H. N., Rayappan, J. B. B., & Amirtharajan, R. (2018). Encrypted Biography of Biomedical Image - a Pentalayer Cryptosystem on FPGA. Journal of Signal Processing Systems, 91(5), 475–501. https://doi.org/10.1007/s11265-018-1337-z
  • Mondal, B., Sinha, N., & Mandal, T. (2016). A secure image encryption algorithm using LFSR and RC4 key stream generator. In Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics, ICACNI 2015 (pp. 227-237). (Smart Innovation, Systems and Technologies; Vol. 43). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-81-322-2538-6_24
  • Goresky M. and Klapper A. M. (2002). "Fibonacci and Galois representations of feedback-with-carry shift registers," in IEEE Transactions on Information Theory, vol. 48, no. 11, pp. 2826-2836, Nov. 2002, doi: 10.1109/TIT.2002.804048.
  • Chakraborty A., Mazumdar B., Mukhopadhyay D. (2014) Fibonacci LFSR vs. Galois LFSR: Which is More Vulnerable to Power Attacks?. In: Chakraborty R.S., Matyas V., Schaumont P. (eds) Security, Privacy, and Applied Cryptography Engineering. SPACE 2014. Lecture Notes in Computer Science, vol 8804. Springer, Cham. https://doi.org/10.1007/978-3-319-12060-7_2
  • P. Zode, R. Deshmukh (2019). "FPGA Based Novel True Random Number Generator using LFSR with Dynamic Seed," 2019 IEEE 16th India Council International Conference (INDICON), 2019, pp. 1-3, doi: 10.1109/INDICON47234.2019.9029049.
  • Garipcan, A. M. , Erdem, E. & Tuncer, T. (2017). Donanım Tabanlı Trivium Akış Şifreleme Algoritmasının FPGA Ortamında Gerçekleştirilmesi. Fırat Üniversitesi Mühendislik Bilimleri Dergisi , 29 (2) , 119-130
  • Kaya, T. (2020). “Memristor and Trivium-based true random number generator”, Physica A Statistical Mechanics and its Applications, vol. 542, 2020. doi:10.1016/j.physa.2019.124071.
  • Etem T., Kaya T. (2020). Görüntü Şifreleme için Trivium Doğrusal Eşlenik Üreteci Tabanlı Bit Üretimi , Fırat Üniversitesi Mühendislik Bilimleri Dergisi. 32(1), 287-294
  • Berlekamp, Elwyn R. (2015). Algebraic Coding Theory - Revised Edition, World Scientific Publishing Co., Inc. USA, ISBN: 9789814635899
  • Reeds, J. A.; Sloane, N. J. A. (1985), "Shift-Register Synthesis (Modulo n)", SIAM Journal on Computing, 14 (3): 505–513, CiteSeerX 10.1.1.48.4652, doi:10.1137/0214038
  • İnce, K. (2021). Security Analysis of Java SecureRandom Library , Avrupa Bilim ve Teknoloji Dergisi, Ejosat Special Issue 2021 (Araconf), 157-160. DOI: 10.31590/ejosat.900956.
  • Bassham III, L. E., Rukhin, A. L., Soto, J., Nechvatal, J. R., Smid, M. E., Barker, E. B., ... & Vo, S. (2010). Sp 800-22 rev. 1a. a statistical test suite for random and pseudorandom number generators for cryptographic applications.
  • https://www.ecrypt.eu.org/stream/ (Link erişim:23.01.2022 14:17)
  • Soto, J., & Bassham, L. (2000). Randomness testing of the advanced encryption standard finalist candidates. Booz-Allen And Hamilton Inc Mclean Va.
  • Cannière, C. D., & Preneel, B. (2008). Trivium. In New stream cipher designs (pp. 244-266). Springer, Berlin, Heidelberg. Deb, S., Bhuyan, B. (2021). Chaos-based medical image encryption scheme using special nonlinear filtering function based LFSR. Multimed Tools Appl 80, 19803–19826. https://doi.org/10.1007/s11042-020-10308-7
Toplam 20 adet kaynakça vardır.

Ayrıntılar

Birincil Dil Türkçe
Konular Mühendislik
Bölüm Makaleler
Yazarlar

Cemile İnce 0000-0002-4638-8501

Kenan İnce 0000-0003-4709-9557

Davut Hanbay 0000-0003-2271-7865

Proje Numarası FBG-2020- 2143
Erken Görünüm Tarihi 30 Ocak 2022
Yayımlanma Tarihi 31 Mart 2022
Yayımlandığı Sayı Yıl 2022 Sayı: 34

Kaynak Göster

APA İnce, C., İnce, K., & Hanbay, D. (2022). SecureRandom Kütüphanesi Kullanarak Yazılımsal Trivium Oluşturma. Avrupa Bilim Ve Teknoloji Dergisi(34), 639-644. https://doi.org/10.31590/ejosat.1084005