Comparative analysis of digital noise generated by additive Fibonacci generators

2023;
: 67-76
https://doi.org/10.23939/ujit2023.01.067
Received: March 20, 2023
Accepted: May 02, 2023

Цитування за ДСТУ: Ісаков О. В., Войтусік С. С. Порівняльний аналіз цифрових шумів, згенерованих адитивними генераторами Фібоначі. Український журнал інформаційних технологій. 2023. Т. 5, № 1. С. 67–76.

Citation APA: Isakov, O. V., Voitusik, S. S. (2023). Comparative analysis of digital noise generated by additive fibonacci generators. Ukrainian Journal of Information Technology, 5(1), 67–76. https://doi.org/10.23939/ujit2023.01.067

1
Lviv Polytechnic National University, Lviv, Ukraine
2
Lviv Polytechnic National University, Lviv, Ukraine

Noise generators and pseudorandom number generators (PRNGs) are widely used in the field of information technology, including cybersecurity, for modeling, authorization key generation, and technical protection of information. It has been found that the characteristics of digital noise directly depend on the chosen PRNG algorithm. To determine the quality of the generated noise, special tests are performed, which are primarily applied to the sequence generated by the PRNG. The results of digital noise generated by an PRNG based on four different algorithms of additive Fibonacci generators (AFG) are investigated. The choice of generators of the same type allowed us to analyze the effect of different modifications on the final result of the generated sequences to determine their advantages and disadvantages. Digital signal processing techniques such as frequency, autocorrelation and visual analysis, signal-to-noise ratio, and statistical tests of the NIST package were used to test the noise and generated sequences. Functions for interpreting the obtained data were developed using the MATLAB (DSP System Toolbox) application package and the C programming language for automating NIST tests. It has been found that for effective testing, specific stages and their sequence should be determined: determination of the PRNG period, statistical tests of the NIST package, calculation of the autocorrelation function, and other methods of digital signal processing. It was found that modification of one AFG by using a carry bit (MAFG2) does not improve the results of the generated sequence, unlike the PIKE algorithm, which consists of three AFGs. The MAFG algorithm showed better results during the period testing and at the same time passed NIST tests, unlike the unmodified version. The dependence between the order of the generated sequences and the results of their autocorrelation function was revealed. It is proposed that, in addition to general statistical tests, applied tests should be carried out when choosing or developing a new generator, its effectiveness should be checked under the conditions required by existing standards and requirements. The compliance of the generated digital noise with the requirements for devices for technical protection of information, namely the protection of speech information, has been established.

  1. Brent, R. P. (1992). Uniform random number generators for supercomputers.
  2. Ferguson, N., Schneier, B., & Kohno, T. (2010). Cryptography Engineering: Design Principles and Practical Applications.
  3. SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. (2010). SP 800-22 Rev. 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications.
  4. Mohamed, M. A.,  Awang, M. I.  (2017). An empirical analysis of six pseudo-random number generators. Far East Journal of Electronics and Communications, 17, 6, 1373–1388. http://dx.doi.org/10.17654/EC017061373
  5. Kamalika, B., Sukanta, D. (2022). A search for good pseudo-random number generators: Survey and empirical studies. Computer Science Review, 45, 100471. https://doi.org/10.1016/j.cosrev.2022.100471
  6. Ross, J. A. (1994). On Fibonacci Keystream Generators. Fast Software Encryption, 346–352. https://doi.org/10.1007/3-540-60590-8_26
  7. Mingesz, R., Farag, D. (2019), Implementing software defined noise generators. 25th International Conference on Noise and Fluctuations. https://doi.org/10.5075/epfl-ICLAB-ICNF-269296
  8. Mandrona,  M. M., Maksymovych, V. M.,  Kostiv, Yu. M., Harasymchuk, O. I.  (2014). Modyfikatsiia adytyvnoho heneratora Fibonachchi z zapiznenniam. Suchasnyi zakhyst informatsii, 2, 57. http://nbuv.gov.ua/UJRN/szi_2014_2_10
  9. Schneier, B. (1993). Applied Cryptography Protocols, Algorithms, and Source Code in C.
  10. Solomon, W. G., Guang, G. (2005). Signal design for good corre­lation: for wireless communication, cryptography, and radar.
  11. Kun II Park (2018). Fundamentals of Probability and Stochastic Processes with Applications to Communications, Springer. https://doi.org/10.1007/978-3-319-68075-0
  12. Lyons, R. (2010) Understanding Digital Signal Processing, 3rd Edition.
  13. Sherman, C., Butler, J. (2007). Transducers and Arrays for Underwater Sound. Springer Science & Business Media, 276. https://doi.org/10.1007/978-0-387-33139-3
  14. Zasoby aktyvnoho zakhystu movnoi informatsii z akustychnymy ta vibroakustychnymy dzherelamy vyprominiuvannia. Klasy­fi­ka­tsiia ta zahalni tekhnichni vymohy. (2020). https://usts.kiev.ua/wp-content/uploads/2020/07/nd-tzi-r-001-2000.pdf