A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments

Symmetric cryptography methods have an important role in security solutions design in data protection. In that context, symmetric cryptography algorithms and pseudo-random generators connected with them have strong influence on designed security solutions. In the computationally constrained environment, security efficiency is also important. In this paper we proposed the design of a new efficient pseudo-random generator parameterized by two pseudo-random sequences. By the probabilistic, information-theoretic and number theory methods we analyze characteristics of the generator. Analysis produced several results. We derived sufficient conditions, regarding parameterizing sequences, so that the output sequence has uniform distribution. Sufficient conditions under which there is no correlation between parameterizing sequences and output sequence are also derived. Moreover, it is shown that mutual information between the output sequence and parameterizing sequences tends to zero when the generated output sequence length tends to infinity. Regarding periodicity, it is shown that, with appropriately selected parameterizing sequences, the period of the generated sequence is significantly longer than the periods of the parameterizing sequences. All this characteristics are desirable regarding security applications. The efficiency of the proposed construction can be achieved by selection parameterizing sequences from the set of efficient pseudo-random number generators, for example, multiple linear feedback shift registers.

[1]  Mark Stamp,et al.  Applied Cryptanalysis: Breaking Ciphers in the Real World , 2007 .

[2]  Goutam Paul,et al.  (Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher , 2012, Journal of Cryptology.

[3]  B V Santhosh Krishna,et al.  A systematic study of security issues in Internet-of-Things (IoT) , 2017, 2017 International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC).

[4]  Byung-Seo Kim,et al.  IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey , 2018, Sensors.

[5]  David M. Wheeler,et al.  Demystifying Internet of Things Security: Successful IoT Device/Edge and Platform Security Deployment , 2019 .

[6]  S. Ziegler Internet of Things Security and Data Protection , 2019, Internet of Things.

[7]  Carsten Maple,et al.  Security and privacy in the internet of things , 2017 .

[8]  Athanasios V. Vasilakos,et al.  Security of the Internet of Things: perspectives and challenges , 2014, Wireless Networks.

[9]  Samer Salam,et al.  Internet of Things From Hype to Reality , 2017 .

[10]  Nicolas Privault,et al.  Understanding Markov Chains , 2013 .

[11]  Zaigham Mahmood,et al.  Security, Privacy and Trust in the IoT Environment , 2019, Springer International Publishing.

[12]  Giancarlo Fortino,et al.  Evaluating Critical Security Issues of the IoT World: Present and Future Challenges , 2018, IEEE Internet of Things Journal.

[13]  Lei Yang,et al.  Security and Privacy in the Internet of Things , 2017 .

[14]  Yang Xiao,et al.  Security and privacy in RFID and applications in telemedicine , 2006, IEEE Commun. Mag..

[15]  Leonid Smalov,et al.  Energy-aware Security in M-Commerce and the Internet of Things , 2009 .

[16]  Georgios Kambourakis,et al.  Security and Privacy in Wireless and Mobile Networks , 2018, Future Internet.

[17]  Imed Romdhani,et al.  Architecting the Internet of Things: State of the Art , 2016 .

[18]  Daniel G. Costa,et al.  Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions , 2017, Cryptogr..

[19]  J. Kim,et al.  How collaboration networks affect innovation in Korea’s information and communication technology industry in the era of Internet of Things , 2016 .

[20]  Gabriel Villarrubia,et al.  PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices , 2019, Sensors.

[21]  Alex Biryukov,et al.  State of the Art in Lightweight Symmetric Cryptography , 2017, IACR Cryptol. ePrint Arch..

[22]  Ronald L. Rivest,et al.  Spritz - a spongy RC4-like stream cipher and hash function , 2016, IACR Cryptol. ePrint Arch..

[23]  Robert John Walters,et al.  Internet of Things: State-of-the-art, Challenges, Applications, and Open Issues , 2018, International Journal of Intelligent Computing Research.

[24]  Muhammad Bilal,et al.  An Authentication Protocol for Future Sensor Networks , 2017, Sensors.

[25]  Pardeep Kumar,et al.  Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey , 2011, Sensors.