METHOD FOR DEVELOPING PSEUDO-RANDOM NUMBER GENERATORS FOR CRYPTOGRAPHIC APPLICATIONS IN 5G NETWORKS
Open Access
- 24 June 2021
- journal article
- Published by Borys Grinchenko Kyiv University in Cybersecurity: Education, Science, Technique
- Vol. 12 (4), 151-162
- https://doi.org/10.28925/2663-4023.2021.12.151162
Abstract
Today, pseudo-random number generators are used in various systems and applications, including as key generators in stream ciphers. The implementation of the latest information and communication technologies (in particular, 5G networks) strengthens the requirements for ensuring the confidentiality of critical data and forces the development of new methods and means for cryptographic protection. Existing generators, like other cryptographic algorithms, do not meet the requirements for processing speed and security against known types of attacks. From this position, in the paper a method for constructing pseudo-random sequence generators was developed. It allows to build efficient generators for cryptographic applications. Based on this method, software generators of pseudo-random numbers have been developed and implemented. These will be useful for cryptographic applications in modern 5G networks. The developed pseudo-random number generators have passed complex statistical testing by the NIST STS technique (showed results not worse than the results of known pseudo-random sequence generators used in practice to solve similar problems). Besides, they are faster in comparison with analogues used today in 5G networks (for example, with algorithms SNOW and Trivium). In further works it is planned to investigate the security of the developed pseudo-random generators against different types of cryptanalytic attacks, as well as to simulate the work of the developed pseudo-random sequence generators using the base station equipment of modern 5G networks.Keywords
This publication has 6 references indexed in Scilit:
- High-Speed and Secure PRNG for Cryptographic ApplicationsInternational Journal of Computer Network and Information Security, 2020
- Experimental Study of Secure PRNG for Q-trits Quantum Cryptography ProtocolsPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2020
- Further Analysis of PRNG-Based Key Derivation FunctionsIEEE Access, 2019
- Wi-Fi and 5GPublished by Wiley ,2015
- ECRYPT Stream Cipher ProjectPublished by Springer Science and Business Media LLC ,2011
- A statistical test suite for random and pseudorandom number generators for cryptographic applicationsPublished by National Institute of Standards and Technology (NIST) ,2000