2019
DOI: 10.3390/s19235322
|View full text |Cite
|
Sign up to set email alerts
|

A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments

Abstract: Symmetric cryptography methods have an important role in security solutions design in data protection. In that context, symmetric cryptography algorithms and pseudo-random generators connected with them have strong influence on designed security solutions. In the computationally constrained environment, security efficiency is also important. In this paper we proposed the design of a new efficient pseudo-random generator parameterized by two pseudo-random sequences. By the probabilistic, information-theoretic a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 21 publications
(31 reference statements)
0
4
0
Order By: Relevance
“…Solutions based on the above proposals give users complete autonomy and end-to-end security protection. The applicability of solutions of this type allows -Direct establishment of cryptographic keys between communication sites, people or machines, without the mediation of a trusted third party, -Application of secure symmetric cryptographic algorithms in mass communication systems, IoT and WSN (Unkašević et al, 2019), -Simplification of the complexity of security systems thus facilitating their administration, and -By simplifying the complexity and administration of security systems, facilitation of their analysis, potential weaknesses detection and, overall, an in-crease of their security.…”
Section: Discussionmentioning
confidence: 99%
“…Solutions based on the above proposals give users complete autonomy and end-to-end security protection. The applicability of solutions of this type allows -Direct establishment of cryptographic keys between communication sites, people or machines, without the mediation of a trusted third party, -Application of secure symmetric cryptographic algorithms in mass communication systems, IoT and WSN (Unkašević et al, 2019), -Simplification of the complexity of security systems thus facilitating their administration, and -By simplifying the complexity and administration of security systems, facilitation of their analysis, potential weaknesses detection and, overall, an in-crease of their security.…”
Section: Discussionmentioning
confidence: 99%
“…Cryptography uses generators that remember the state, non-linear Boolean functional transformations of the transition to the next state, and the formation of the output bit. In other words, the generator circuit fits into the well-known abstract automaton model [15]. The fundamental point here is that the Boolean functional transformations used have high nonlinearity and meet the criterion of the avalanche effect.…”
Section: Purpose and Objectives Of Researchmentioning
confidence: 99%
“…It is the natural choice to use a symmetric algorithm due to its complexity. Reference [1] presents a generic model of the pseudo-random generator in computationally constrained environments. It can be applied to stream cryptography algorithms, as a subgroup of symmetric cryptography algorithms, in WSN and the Internet of Things (IoT).…”
Section: Summary Of the Special Issuementioning
confidence: 99%