Development of a statistically reliable pseudorandom bit sequence

Maria Mandrona1 mandrona27 [at] gmail.com
Yuriy Kostiv2 yura.kostiv [at] gmail.com
Volodymyr Maksymovych
Oleh Harasymchuk3 garasymchuk [at] ukr.net
  1. 1Department of Information Security Management, Lviv State University of Life Safety, UKRAINE, Lviv, Kleparivska street 35, 2Security of Information Technologies Department, Lviv Polytechnic National University, UKRAINE, Lviv, S. Bandery street 12, 3Academic Chair of Data Protection, Lviv Polytechnic National University, UKRAINE, Lviv, S. Bandery street 12
Abstract 

A statistically reliable pseudorandom bit sequence generator has been developed on the basis of additive lagged Fibonacci generator. Studies have been conducted into its the quality of its operation according to the criteria of systemic theoretical approach to the design of generators. The said criteria include: pulse repetition period, statistical characteristics, linear complexity, key information amount
 (length of key) and rate of response

References 

[1] M. A. Ivanov and I. V. Chugunkov Ed., "Teorija, primenenie i ocenka kachestva generatorov psevdosluchajnyh posledovatel'nostej [Theory, application, and quality assessnent of pseudorandom sequence generators]. Moscow: KUDITS-OBRAZ Publ., 2012.
[2] I. D. Horbenko and Iu. I. Horbenko Ed., Prykladna kryptolohiia: Teoriia. Praktyka. Zastosuvannia: monohrafiia [Applied cryptology: Theory. Practice. Application: a monograph]. – Kharkiv: Publishing House «Fort», 2012.
[3] M. М. Mandrona, V. M. Maksymovych "Investigation of the Statistical Characteristics of the Modified Fibonacci Generators" Journal of Automation and Information Sciences. 10.1615/J AutomatInf Scien.v46.i12.60, Рр. 48-53, 2014.
[4] M. М. Mandrona , Yu. M. Kostiv, V. M. Maksymovych, O. I. Harasymchuk, "Generator of pseudorandom bit sequence with increased cryptographic security", Metallurgical and Mining Industry. No 5, Pp. 81-86, 2014.
[5] NIST SP 800-22. “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications”, csrc.nist.gov. [Online]. Available:http://csrc.nist.gov/publications/nistpubs//S P800-22rev1a.pdf [Accessed: April. 2010].