Pseudorandom Bit Generation Using Coupled Congruential Generators

In this brief, we propose the generation of a pseudorandom bit sequence (PRBS) using a comparative linear congruential generator (CLCG) as follows. A bit ¿1¿ is output if the first linear congruential generator (LCG) produces an output that is greater than the output of the second LCG, and a bit ¿0¿ is output otherwise. Breaking this scheme would require one to obtain the seeds of the two independent generators given the bits of the output bit sequence. We prove that the problem of uniquely determining the seeds for the CLCG requires the following: 1) knowledge of at least log2 m 2 ( m being the LCG modulus) bits of the output sequence and 2) the solution of at least log2 m 2 inequalities, where each inequality (dictated by the output bit observed) is applied over positive integers. Computationally, we show that this task is exponential in n (where n = log2 m is the number of bits in m) with complexity O(22 n). The quality of the PRBS so obtained is assessed by performing a suite of statistical tests (National Institute of Standards and Technology (NIST) 800-22) recommended by NIST. We observe that a variant of our generator that uses two CLCGs (called dual CLCG) pass all the NIST pseudorandomness tests with a high degree of consistency.

[1]  Ranjan Bose,et al.  A novel compression and encryption scheme using variable model arithmetic coding and coupled chaotic system , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[2]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[3]  Massimo Alioto,et al.  A Class of Maximum-Period Nonlinear Congruential Generators Derived From the Rényi Chaotic Map , 2007, IEEE Transactions on Circuits and Systems I: Regular Papers.

[4]  Takashi Kato,et al.  On a nonlinear congruential pseudorandom number generator , 1996, Math. Comput..

[5]  Adi Shamir,et al.  The cryptographic security of truncated linearly related variables , 1985, STOC '85.

[6]  Xuanqin Mou,et al.  Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography , 2001, INDOCRYPT.

[7]  Mieczyslaw Jessa,et al.  Designing security for number sequences generated by means of the sawtooth chaotic map , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[8]  James Theiler,et al.  Parallel random number generators for sequences uniformly distributed over any range of integers , 2006, IEEE Transactions on Circuits and Systems I: Regular Papers.

[9]  Hugo Krawczyk How to Predict Congruential Generators , 1992, J. Algorithms.

[10]  Jacques Stern,et al.  Secret linear congruential generators are not cryptographically secure , 1987, 28th Annual Symposium on Foundations of Computer Science (sfcs 1987).

[11]  Rajesh G. Kavasseri,et al.  Secure pseudo-random bit sequence generation using coupled linear congruential generators , 2008, 2008 IEEE International Symposium on Circuits and Systems.

[12]  J. Wrench Table errata: The art of computer programming, Vol. 2: Seminumerical algorithms (Addison-Wesley, Reading, Mass., 1969) by Donald E. Knuth , 1970 .

[13]  W. Schwarz,et al.  Chaos and cryptography , 2001 .