Testing of the Random Codes Generator of Embedded Crypto Protection System

2022;
: pp. 70 - 75
1
Lviv Polytechnic National University
2
Lviv Polytechnic National University, Computer Engineering Department
3
Lviv Polytechnic National University, Department of Electronic Computing Machines

The goal of the publication is to test the random codes generator of the built-in crypto-protection system

Following the list of critical technologies in the production of weapons field and military equipment (following the Decree of the Cabinet of Ministers of Ukraine dated 30.08.2017 No. 600-r), an embedded microcontroller system for the protection of information for on-board equipment has been developed. A valuable stage of the system introduction is its research and testing. One of the stages of testing is the verification of the generator of random codes to use for the generation of encryption keys and digital signatures.

Based on the previous works and research of the Kalyna algorithm, methods and tools for creating a random code generator have been studied to use in the built-in cryptographic data protection system for data encryption/decryption and for working with a digital signature. Means of checking generated random codes and comparing them with existing counterparts have been developed.

The purpose of this article is to check the generator of random codes before using it in the built-in information protection system.

  1. DSTU 7624: 2014 (2015) Information Technology. Cryptographic information protection. Symmetric block transformation algorithm. Kyiv, Ukraine: Ministry of Economic Development of Ukraine, 228 p. http://online.budstandart.com/ua/catalog/doc-page?id_doc=65314 (Accessed: 1 October 2022)
  2. Bilenko V.M. Implementation of Kalyna algorithm at microcontroller (2021). Student technical-scientific conference of IKTA. Lviv, Ukraine. pp. 167–168. https://science.lpnu.ua/sites/default/files/attachments/2021/nov/25578/m... (Accessed: 1 October 2022)
  3. Bilenko V.M., Hlukhov V.S. Implementation Kalyna algorithm in microcontroller “Advances in cyber-physical system” – (2021). vol.6, num. 1. pp. 8–13. DOI: https://doi.org/10.23939/acps2021.01.008 (Accessed: 1 October 2022)
  4. Zayats T. Bilenko V.M., Hlukhov V. Features of using large keys in “Kalyna” algorithm. “Advances in cyber-physical systems” (2022). vol.7 num. 1. pp. 55–62. DOI: https://doi.org/10.23939/acps2022.01.055
  5. Fabio Acerdi, Nicola Massari, Leonardo Gasparini. Structures and Methods for Fully Integrated Quantum Random Number Generators. Journal of Selected Topics in Quantum Electronics (2020). vol.36 num. 3. pp. 36–51. DOI: https://doi.org/10.1109/JSTQE.2020.2990216
  6. Yuan Zhang, Xiaofeng Shi. The reach of pseudo-random signals generator based on FPGA (2018). IEEE 3rd Advanced Information Technology, Electronic and Automation Control Conference (IAEAC). Chongqing, China. pp. 5–14. DOI: https://doi.org/10.1109/IAEAC.2018.8577873
  7. Yuanhao Li, Hong Wang, Zhi Ma. Quantum random number generator using cloud superconducting (2021). Scientific reports. Hong Kong, China. pp. 21–32. DOI: https://doi.org/10.1038%2Fs41598-021-03286-9
  8. Randy Kuang, Dafu Lou, Alez He, Chris McKenzie, Michael Redding. Pseudo Quantum Random Number Generator with Quantum Permutation Pad (2021). IEEE International Conference on Quantum Computing and Engineering, Broomfield, CO, USA. pp. 6–11. DOI: https://doi.org/10.1109/QCE52317.2021.00053
  9. Mohamed Ali Kandi, Djamel Eddie Kouicem, Hicham Lakhlef, Abdelmadjid Bouabdallah, Yacine Challal (2020). A blockchain-Base Key Management Protocol for Secure Device-to-Device Communication in the Internet of things. 19th International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom). Guangzhou, China. pp. 17–21. DOI: https://doi.org/10.1109/TrustCom50675.2020.00255
  10. Surendra Singh Chauhan, Nitin Jain, Satish Chandra Pandey. Digital Signature with Message Security Process (2022). 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE). Greater Noida, India. pp. 36–48. DOI: https://doi.org/10.1109/ICACITE53722.2022.9823539
  11. Vynokurov A. Ciphering algorithm GOST 28147-89, its usage and implementation for computer platform Intel x86 (2001). Moscow. https://tzi.com.ua/downloads/28147-89.pdf (Accessed: 1 October 2022)
  12. FIPS PUB 140-2 (2007). Security Requirements for Cryptographic Modules. National Institute of Standards and Technology. Heytersberg, USA, p. 140. DOI: https://doi.org/10.6028/NIST.FIPS.140-2 (Accessed: 1 October 2022)
  13. Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographical Applications (2010). NIST Spec. Pub. 800-22, rev. 1a. 131 p. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=906762 (Accessed: 1 October 2022)
  14. DSTU 4145-2002 (2003). Cryptography data protection. Digital signature based on elliptical curves. Kyiv, Ukraine: Small Enterprise “Dyna” 39 p. https://itender-online.ru/wp-content/uploads/2017/09/dstu-4145-2002-1.pdf (Accessed: 1 October 2022)