IMPLEMENTATION OF AN EFFICIENT PSEUDORANDOM BIT GENERATION METHOD AND ITS VLSI ARCHITECTURE
Keywords:
Engineering, bit generation method, VLSI architecture, Blum-Blum-ShubAbstract
Hence, data security has become a top priority. Cryptographic methods help resource-constrained smart devices encrypt and decrypt data. This protects data. PRBGs generate pseudo-random binary sequences from seeds. The cryptographic method's essential building element assures data secrecy. Academic research has used PRBG methods to generate pseudorandom bit sequences. Blum-Blum-Shub (BBS) PRBG is unexpected and cryptographically safe. BBS implementation requires huge integer modular multiplication. This makes the process computationally slow or costly. Han-Carlson adders and Montgomery modular multiplication are proposed for a low-latency BBS design. This will significantly reduce crucial route and computational delay. While improving the critical path, this technique has O(2n) clock delay due to recurrent calculation. This constraint necessitates research on a low hardware complexity coupled-LCG (CLCG) approach. CLCG uses a smaller region, reduced latency, and longer durations than BBS. Nevertheless, it fails the spectrum test, which can be rectified by dual-coupling four LCGs. The dual-CLCG approach requires inequality equations to obtain a valid one-bit random outcome. Inequality equations govern this procedure. Inequality equations slow the hardware implementation of the dual-CLCG approach for pseudorandom bit generation at every uniform clock rate. The thesis proposes a memory-based dual-CLCG architecture to solve this challenge. This architecture creates pseudorandom bits periodically. Its drawbacks include a high beginning clock delay, needless memory use, and a shorter sequence duration than other algorithms. This thesis presents two new PRBG algorithms and VLSI designs to solve these problems. These approaches create a pseudorandom bit every clock cycle with simple electronics. Both methods achieve the maximum length sequence and consistently pass all fifteen NIST benchmark tests. The recommended designs are built using Verilog HDL and prototyped using a commercial FPGA device in a lab. PRBG algorithms may assist produce pseudorandom bits in hardware security applications.
References
R. Roman, P. Najera, and J. Lopez. Securing the internet of things. Computer, 44(9):51–58, Sep. 2011.
W. Trappe, R. Howard, and R. S. Moore. Low-energy security: Limits and opportunities in the internet of things. IEEE Security Privacy, 13(1):14–21, Jan 2015.
E. Fernandes, A. Rahmati, K. Eykholt, and A. Prakash. Internet of things security research: A rehash of old ideas or new intellectual challenges? IEEE Security Privacy, 15(4):79–84, 2017.
A. K. Nain, J. Bandaru, M. A. Zubair, and R. Pachamuthu. A secure phase-encrypted ieee 802.15.4 transceiver design. IEEE Transactions on Computers, 66(8):1421–1427, Aug 2017.
M. Frustaci, P. Pace, G. Aloi, and G. Fortino. Evaluating critical security issues of the iot world: Present and future challenges. IEEE Internet of Things Journal, 5(4):2483–2495, Aug 2018.
S. M. R. Islam, D. Kwak, M. H. Kabir, M. Hossain, and K. Kwak. The internet of things for health care: A comprehensive survey. IEEE Access, 3:678–708, 2015.
F. Firouzi, B. Farahani, M. Ibrahim, and K. Chakrabarty. Keynote paper: From eda to iot ehealth: Promises, challenges, and solutions. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, 37(12):2965–2978, Dec 2018.
P. Verma and S. K. Sood. Fog assisted-iot enabled patient health monitoring in smart homes. IEEE Internet of Things Journal, 5(3):1789–1796, June 2018.
T. Song, R. Li, B. Mei, J. Yu, X. Xing, and X. Cheng. A privacy preserving communication protocol for iot applications in smart homes. IEEE Internet of Things Journal, 4(6):1844–1852, Dec 2017.
A. C. Jose and R. Malekian. Improving smart home security: Integrating logical sensing into smart home. IEEE Sensors Journal, 17(13):4269–4286, July 2017.
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Deepak Jain, Ashwani kumar, C D D Guruprakash
![Creative Commons License](http://i.creativecommons.org/l/by/4.0/88x31.png)
This work is licensed under a Creative Commons Attribution 4.0 International License.
Author(s) hold complete right on the content of this article.