Secure Gamma Generation For Stream Cipher based on Fuzzy Logic

In this paper, we proposed a new approach for secure bit stream gamma generation based on the concept of fuzzy logic and linear feedback shift registers (LFSRs). We used early-suggested pseudorandom number generator based on fuzzy logic (FPRNG) and suggested the updated version of FPRNG. We improved gamma security by aggregation the seeds with some valuable secure information about FPRNG parameters. We discussed the relationship between the size of the buffer and the degree of the primitive characteristic polynomial of the attached LFSR. We also made an advanced study of the FPRNG membership functions tuning process. We can increase the gamma security as well as stream cipher security by keeping these configurations in secret additionally to seeds.

[1]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[2]  W. G. Chambers Clock-controlled shift registers in binary sequence generators , 1988 .

[3]  Tomsk Russia Radioelectronics,et al.  Dynamic-signature-based user authentication using a fuzzy classifier , 2018 .

[4]  Petr Hájek,et al.  Handbook of mathematical fuzzy logic , 2011 .

[5]  I. A. Hodashinsky,et al.  Bagged ensemble of fuzzy classifiers and feature selection for handwritten signature verification , 2019 .

[6]  Anne Canteaut Linear Feedback Shift Register , 2005, Encyclopedia of Cryptography and Security.

[7]  Hamijah Mohd Rahman,et al.  Fuzzy Evaluation Scheme for KDF Based on Stream Ciphers , 2018, SCDM.

[8]  I. Anikin,et al.  Pseudo-random number generator based on fuzzy logic , 2016, 2016 International Siberian Conference on Control and Communications (SIBCON).

[9]  Fred Piper,et al.  Stream Ciphers , 1982, EUROCRYPT.

[10]  Primitive polynomials selection method for pseudo-random number generator , 2018 .

[11]  Lotfi A. Zadeh Linguistic Variables and Approximate Reasoning , 1982 .

[12]  R. A. Rueppel Analysis and Design of Stream Ciphers , 2012 .

[14]  Craig Bauer,et al.  Secret History: The Story of Cryptology , 2013 .

[15]  Henk C. A. Van Tilborg,et al.  Fundamentals of Cryptology: A Professional Reference and Interactive Tutorial , 1999 .

[16]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[17]  Harald Niederreiter,et al.  On the expected value of the linear complexity and the k-error linear complexity ofperiodic sequences , 2002, IEEE Trans. Inf. Theory.

[18]  Martin Fleury,et al.  Fuzzy-logic threat classification for multi-level selective encryption over real-time video streams , 2020, Journal of Ambient Intelligence and Humanized Computing.

[19]  Dimitrios Kagaris,et al.  LFSR characteristic polynomial and phase shifter computation for two-dimensional test set generation , 2017, 2017 18th IEEE Latin American Test Symposium (LATS).

[20]  Goutam Paul,et al.  RC4 Stream Cipher and Its Variants , 2011 .

[21]  Thumrongrat Amornraksa,et al.  Digital Image Watermarking Based on Fuzzy Image Filter , 2018 .

[22]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[23]  R. V. Meshcheryakov,et al.  A review of methods of embedding information in digital objects for security in the internet of things Oбзop neToдoв вcTpaiвaнiya iнфopnaцii в цiфpoвыe oбъekTы длya oбecпeчeнiya бeзoпacнocTi в «iнTepнeTe вeщeй» , 2019 .

[24]  Henry Beker,et al.  Cipher Systems: The Protection of Communications , 1982 .

[25]  Bart Preneel,et al.  A New Keystream Generator MUGI , 2002, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..