SlideShare a Scribd company logo
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 1 Issue 2, November 2012
www.ijsr.net
Parallel Generators of Pseudo-random Numbers
with Control of Calculation Errors
S. Dichenko1
, O. Finko2
Kuban State University of Technology.
Moskowskaya St., 2, Krasnodar 350072, Russia
1
dichenko.sa@yandex.ru,
2
ofinko@yandex.ru
Abstract: Algorithms of parallel realization of classical "congruent" methods of generation of pseudo-random numbers are discussed.
Algebraic (equational) and matrix interpretations of ways of realization of algorithms are presented. In order to achieve high level of
performance of modern and perspective technical tools of cryptographic protection of data, as well as to provide contemporary stochastic
methods of modeling, it is necessary to realize existing "congruent" methods in parallel. In developing solutions for the problems of
high level of complexity, such as cryptographic protection of data, ensuring high levels of security of functioning in real time is of out-
most importance. In this article the means of ensuring of functional diagnosis of the tools for pseudo-random numbers generation by
means of application of classical methods of superfluous arithmetic coding (module control) are briefly discussed.
Keywords: Pseudo-random numbers, congruent method, cryptography, fault diagnosis and tolerance in cryptography.
1. Introduction
Pseudo-random number (PRN) generators have important
applied meaning for the implementation of most crypto-
graphic algorithms and key material generation systems [1] –
[6]. Stricter requirements for the encryption speed and in-
creasing amount of data which needs to be protected cause
the necessity to construct parallel algorithms of PRN genera-
tion, what should be supported by providing the required
level of reliability of their operation [7], [8].
The purpose of the article is constructing parallel algo-
rithms of PRN generation with control of calculation errors
based on the congruent method.
2. Varieties of the congruent method
Varieties of the congruent method, in particular, are ex-
pressed by formulas (1) – (4):
,1 mnn bxx  (1)
,1 mnn cbxx  (2)
,1
m
n
d
n cxbx  (3)
,1211
21
m
n
d
n
d
n cxbxbx   (4)
where m – module, b – multiple, mb 0 ; c – increment,
mc 0 ; nx – the initial value, mxn 0 ; m
 – smal-
lest non-negative residue of number  module m .
In accordance with the purpose, we pose a problem to
construct parallel algorithms of PRN generation with control
of calculation errors. Algorithms of PRN generation are
shown as algebraic and matrix formulas.
3. Development of parallel algorithms
3.1 Algebraic method
Formula (1) can take the following series of algebraic trans-
formations:


















































,
,
,
,
1
3
2
2
23
2
1
12
1
m
n
k
mknkn
m
n
mn
nmnn
m
n
mn
nmnn
mnn
xbbxx
xb
x
xbbbxx
xb
x
bxbbxx
bxx

with ,2,1k or we have:













,
,
,
22
11
mnkkn
mnn
mnn
xx
xx
xx




(5)
where
m
i
i b , ki ,,2,1  .
For (2) it is possible to get:
 
 













































,1
,1
,1
,
1
1
1
23
23
2
1
12
1
m
k
j
j
n
k
mknkn
m
nmnn
m
n
mn
nmnn
mnn
bcxbcbxx
bbcxbcbxx
bcxbc
x
cbxbcbxx
cbxx


with ,3,2k or we have:













,
,
,
222
111
mknkkn
mnn
mnn
xx
xx
xx




(6)
20
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 1 Issue 2, November 2012
www.ijsr.net
where ;1,,
1
1
11
m
k
j
jimm
i
i ccb








 


 
For (3) it is possible to get:
 
 
































,1
,1
,1
,
1
1
1
23
23
2
12
1
m
k
j
j
n
k
m
kn
d
kn
m
dd
n
d
m
n
d
n
m
d
n
d
m
n
d
n
m
n
d
n
bcxbcxbx
bbcxbcxbx
bcxbcxbx
cxbx

with ,3,2k or we have:













,
,
,
222
111
mknkkn
mnn
mnn
xx
xx
xx




(7)
where ;1,,
1
1
11
m
k
j
jimm
di
i ccb








 


 
.,,2,1 ki 
For (4) it is possible to get:













,
,
,
1
21222
11111
mknknkkn
mnnn
mnnn
xxx
xxx
xxx




(8)
where ;1
2
12
m
  miii 2111    ,
when ,4,3i ;
mii 11   , when ,3,2i ;
c1 ;   miii c 11    , when ,3,2i .
3.2 Examples
Let’s have 4310 x , 756b , 2047m .
Find 321 ,, xxx using (5):
,363431756 204701  m
bxx
,130431756
2047
2
0
2
2 
m
xbx
24431756
2047
3
0
3
3 
m
xbx .
Let’shave 4120 x , 531b , 711c , 4093m .
Find 4321 ,,, xxxx using (6):
,2554711412531 409301  m
cbxx
 
  ,21021531711412531
1
4093
2
10
2
2


m
cxbx 
  ,35771531531711412531
1
4093
23
2
1
0
3
3









 

m
j
jcxbx 
  .9461531531531711412531
1
4093
234
3
1
0
4
4









 

m
j
jcxbx 
3.3 Matrix method
Let’s present the considered algorithms of PRN generation in
matrix form.
For (1) it is possible to get:
,2
1
m
n
k
mn
x
x





















BX
(9)
where
m
i
i b ; .,,2,1 ki 
For (2) it is possible to get:
,2
1
2
1
mk
n
k
mn
x
x






































GBX
(10)
where
.,,2,1;1,,
1
1
11 kiccb
m
k
j
jimm
i
i 







 


 
For (3) it is possible to get:
,2
1
2
1
mk
n
k
mn
x
x






































GBX
where ;1,,
1
1
11
m
k
j
jimm
di
i ccb 







 


 
ki ,,2,1  .
For (4) it is possible to get:
,
2
1
1
2
1
2
1
1
mk
n
k
n
k
mnn
xx
xx


























































GBAX
where ;1
2
12
m
  miii 2111    ,
when ,4,3i ;
mkk 11   , when ,3,2k ;
c1 ;   mkkk c 11    , when ,3,2k .
3.4 Examples
Let’s have 431nx , 756b , 2047m .
Find 321 ,, xxx using (9):
21
International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064
Volume 1 Issue 2, November 2012
www.ijsr.net
.
24
130
363
431
756
756
756
2047
3
2





















 mnxBX
Let’shave 412nx , 531b , 711c , 4093m .
Find 4321 ,,, xxxx using (10):
 
 
 
.
946
3577
2102
2554
1531531531711
1531531711
1531711
711
412
531
531
531
531
23
2
4
3
2

















































m
mnx GBX
4. Control of calculation errors
Let’s use ,qmM  as a composite module in calculating
any of the obtained systems of expressions (5) – (8), where
mq  module introduced for the implementation of control
of calculation errors.
Then each of the expressions (5) – (8) can be rewritten as
a system of expressions on module M , for example (7):

















,
,
,
222
111
M
knkkn
M
nn
M
nn
xx
xx
xx




(11)
where ;1,,
1
1
11
M
k
j
jiMM
di
i ccb 







 






ki ,,1  .
Control digits are calculated by the system:


















,
,
,
222
111
q
knkkn
q
nn
q
nn
rr
rr
rr




, (12)
where ;1,,
1
1
11
q
k
j
jiqq
di
i ccb 







 






.,,1 ki 
Thus the result of (11), (12) is a redundant arithmetic
code, represented by informational 


 knn xx ,,1  and control
vectors knn rr  ,,1  . If the minimal values of the arithmetic
code distance 1min  qd control arithmetic expressions are
as follows:













,0ifis,error
,0ifno,iserror
jn
q
jn
jn
q
jn
rx
rx
where kj 1 .
The final result is:
,11
m
nn xx 
  ,22
m
nn xx 
  , .
m
knkn xx 
 
5. Conclusion
Developed algorithms of accurate parallel PRN generation
provide the required level of perspective highly productive
cryptographic means of protection of data.
References
[1] A.V.Babash, G.P.Shankin, “Cryptology”. SOLON-
PRESS. 1997. (book style)
[2] Henk C.A. van Tilborg, “Fundamentals of Cryptology”.
KLUWER ACADEMIC PUBLISHERS.2000. (book
style)
[3] B.Schneier, “Applied Cryptography”. John Wiley &
Sons, Inc. 1996. (book style)
[4] B.А.Forouzan, “Cryptography and Network Security”.
McGraw Hill. 2008. (book style)
[5] D.E.Knuth,“The Art of Computer Programming. Vo-
lume 2. Seminumerical Algorithms”. Addison-Wesley.
Redwood City. 1981. (book style)
[6] C.P.Schonorr, “On the Construction of Random Num-
ber Generators and Random Function Generators”.
EUROCRUPT. 1988. (journal style)
[7] “Cryptographic Hardware and Embedded Systems –
CHES 2004”. 6th International Workshop Cambridge,
MA, USA, August 11-13, 2004. Proceedings
[8] “Fault Diagnosis and Tolerance in Cryptography”.
Third International Workshop, FDTC 2006, Yokohama,
Japan, October 10, 2006, Proceedings.
Sergey Dichenko- Is a Graduate student. Research
interests are development of parallel algorithms for
generating pseudo-random numbers and binary se-
quences. Error control algorithms.
Oleg Finko - Professor, Doctor of Technical
Sciences. Professor of Department of computer tech-
nologies and information security of the Kuban State
University of Technology. Research interests ‐a resi-
due number system, the use of error-correcting coding
techniques in cryptography, multi-biometric encryption, digital
signature algorithms improve, secure electronic document systems,
Parallel computing logic by modular numerical polyno-
mials.URL: http://www.mathnet.ru/eng/person/40004
22
Ad

More Related Content

Similar to Parallel generators of pseudo random numbers with control of calculation errors (20)

COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
Journal_IJABME
Journal_IJABMEJournal_IJABME
Journal_IJABME
Sarun Maksuanpan
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
cscpconf
 
Fusion based multimodal authentication in biometrics using context sensitive ...
Fusion based multimodal authentication in biometrics using context sensitive ...Fusion based multimodal authentication in biometrics using context sensitive ...
Fusion based multimodal authentication in biometrics using context sensitive ...
csandit
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
ijcsta
 
mws_gen_reg_ppt_nonlinear.ppt
mws_gen_reg_ppt_nonlinear.pptmws_gen_reg_ppt_nonlinear.ppt
mws_gen_reg_ppt_nonlinear.ppt
ssuser6ff4d5
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
tayseer Karam alshekly
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
IJNSA Journal
 
Application of thermal error in machine tools based on Dynamic Bayesian Network
Application of thermal error in machine tools based on Dynamic Bayesian NetworkApplication of thermal error in machine tools based on Dynamic Bayesian Network
Application of thermal error in machine tools based on Dynamic Bayesian Network
IJRES Journal
 
Text encryption
Text encryptionText encryption
Text encryption
tayseer Karam alshekly
 
Random Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionRandom Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image Encryption
AM Publications
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
ijccmsjournal
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
ijccmsjournal
 
Fixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural NetworksFixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural Networks
gerogepatton
 
Fixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural NetworksFixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural Networks
IJITE
 
The Perceptron - Xavier Giro-i-Nieto - UPC Barcelona 2018
The Perceptron - Xavier Giro-i-Nieto - UPC Barcelona 2018The Perceptron - Xavier Giro-i-Nieto - UPC Barcelona 2018
The Perceptron - Xavier Giro-i-Nieto - UPC Barcelona 2018
Universitat Politècnica de Catalunya
 
D143136
D143136D143136
D143136
IJRES Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMSCOLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
COLOR IMAGE ENCRYPTION BASED ON MULTIPLE CHAOTIC SYSTEMS
IJNSA Journal
 
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
FUSION BASED MULTIMODAL AUTHENTICATION IN BIOMETRICS USING CONTEXT-SENSITIVE ...
cscpconf
 
Fusion based multimodal authentication in biometrics using context sensitive ...
Fusion based multimodal authentication in biometrics using context sensitive ...Fusion based multimodal authentication in biometrics using context sensitive ...
Fusion based multimodal authentication in biometrics using context sensitive ...
csandit
 
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
Random Keying Technique for Security in Wireless Sensor Networks Based on Mem...
ijcsta
 
mws_gen_reg_ppt_nonlinear.ppt
mws_gen_reg_ppt_nonlinear.pptmws_gen_reg_ppt_nonlinear.ppt
mws_gen_reg_ppt_nonlinear.ppt
ssuser6ff4d5
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
tayseer Karam alshekly
 
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
CASCADE BLOCK CIPHER USING BRAIDING/ENTANGLEMENT OF SPIN MATRICES AND BIT ROT...
IJNSA Journal
 
Application of thermal error in machine tools based on Dynamic Bayesian Network
Application of thermal error in machine tools based on Dynamic Bayesian NetworkApplication of thermal error in machine tools based on Dynamic Bayesian Network
Application of thermal error in machine tools based on Dynamic Bayesian Network
IJRES Journal
 
Random Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image EncryptionRandom Chaotic Number Generation based Clustered Image Encryption
Random Chaotic Number Generation based Clustered Image Encryption
AM Publications
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
ijccmsjournal
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
ijccmsjournal
 
Fixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural NetworksFixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural Networks
gerogepatton
 
Fixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural NetworksFixed-Point Code Synthesis for Neural Networks
Fixed-Point Code Synthesis for Neural Networks
IJITE
 

More from International Journal of Science and Research (IJSR) (20)

Innovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart FailureInnovations in the Diagnosis and Treatment of Chronic Heart Failure
Innovations in the Diagnosis and Treatment of Chronic Heart Failure
International Journal of Science and Research (IJSR)
 
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverterDesign and implementation of carrier based sinusoidal pwm (bipolar) inverter
Design and implementation of carrier based sinusoidal pwm (bipolar) inverter
International Journal of Science and Research (IJSR)
 
Polarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material systemPolarization effect of antireflection coating for soi material system
Polarization effect of antireflection coating for soi material system
International Journal of Science and Research (IJSR)
 
Image resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fittingImage resolution enhancement via multi surface fitting
Image resolution enhancement via multi surface fitting
International Journal of Science and Research (IJSR)
 
Ad hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo sAd hoc networks technical issues on radio links security & qo s
Ad hoc networks technical issues on radio links security & qo s
International Journal of Science and Research (IJSR)
 
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...Microstructure analysis of the carbon nano tubes aluminum composite with diff...
Microstructure analysis of the carbon nano tubes aluminum composite with diff...
International Journal of Science and Research (IJSR)
 
Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...Improving the life of lm13 using stainless spray ii coating for engine applic...
Improving the life of lm13 using stainless spray ii coating for engine applic...
International Journal of Science and Research (IJSR)
 
An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...An overview on development of aluminium metal matrix composites with hybrid r...
An overview on development of aluminium metal matrix composites with hybrid r...
International Journal of Science and Research (IJSR)
 
Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...Pesticide mineralization in water using silver nanoparticles incorporated on ...
Pesticide mineralization in water using silver nanoparticles incorporated on ...
International Journal of Science and Research (IJSR)
 
Comparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brainComparative study on computers operated by eyes and brain
Comparative study on computers operated by eyes and brain
International Journal of Science and Research (IJSR)
 
T s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusionsT s eliot and the concept of literary tradition and the importance of allusions
T s eliot and the concept of literary tradition and the importance of allusions
International Journal of Science and Research (IJSR)
 
Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...Effect of select yogasanas and pranayama practices on selected physiological ...
Effect of select yogasanas and pranayama practices on selected physiological ...
International Journal of Science and Research (IJSR)
 
Grid computing for load balancing strategies
Grid computing for load balancing strategiesGrid computing for load balancing strategies
Grid computing for load balancing strategies
International Journal of Science and Research (IJSR)
 
A new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidthA new algorithm to improve the sharing of bandwidth
A new algorithm to improve the sharing of bandwidth
International Journal of Science and Research (IJSR)
 
Main physical causes of climate change and global warming a general overview
Main physical causes of climate change and global warming   a general overviewMain physical causes of climate change and global warming   a general overview
Main physical causes of climate change and global warming a general overview
International Journal of Science and Research (IJSR)
 
Performance assessment of control loops
Performance assessment of control loopsPerformance assessment of control loops
Performance assessment of control loops
International Journal of Science and Research (IJSR)
 
Capital market in bangladesh an overview
Capital market in bangladesh an overviewCapital market in bangladesh an overview
Capital market in bangladesh an overview
International Journal of Science and Research (IJSR)
 
Faster and resourceful multi core web crawling
Faster and resourceful multi core web crawlingFaster and resourceful multi core web crawling
Faster and resourceful multi core web crawling
International Journal of Science and Research (IJSR)
 
Extended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy imagesExtended fuzzy c means clustering algorithm in segmentation of noisy images
Extended fuzzy c means clustering algorithm in segmentation of noisy images
International Journal of Science and Research (IJSR)
 
Modeling software architecture with uml
Modeling software architecture with umlModeling software architecture with uml
Modeling software architecture with uml
International Journal of Science and Research (IJSR)
 
Ad

Recently uploaded (20)

Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
Resistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff modelResistance measurement and cfd test on darpa subboff model
Resistance measurement and cfd test on darpa subboff model
INDIAN INSTITUTE OF TECHNOLOGY KHARAGPUR
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIHlecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Abodahab
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Development of MLR, ANN and ANFIS Models for Estimation of PCUs at Different ...
Journal of Soft Computing in Civil Engineering
 
Level 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical SafetyLevel 1-Safety.pptx Presentation of Electrical Safety
Level 1-Safety.pptx Presentation of Electrical Safety
JoseAlbertoCariasDel
 
AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)AI-assisted Software Testing (3-hours tutorial)
AI-assisted Software Testing (3-hours tutorial)
Vəhid Gəruslu
 
Raish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdfRaish Khanji GTU 8th sem Internship Report.pdf
Raish Khanji GTU 8th sem Internship Report.pdf
RaishKhanji
 
Mathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdfMathematical foundation machine learning.pdf
Mathematical foundation machine learning.pdf
TalhaShahid49
 
New Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdfNew Microsoft PowerPoint Presentation.pdf
New Microsoft PowerPoint Presentation.pdf
mohamedezzat18803
 
Degree_of_Automation.pdf for Instrumentation and industrial specialist
Degree_of_Automation.pdf for  Instrumentation  and industrial specialistDegree_of_Automation.pdf for  Instrumentation  and industrial specialist
Degree_of_Automation.pdf for Instrumentation and industrial specialist
shreyabhosale19
 
Compiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptxCompiler Design Unit1 PPT Phases of Compiler.pptx
Compiler Design Unit1 PPT Phases of Compiler.pptx
RushaliDeshmukh2
 
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design ThinkingDT REPORT by Tech titan GROUP to introduce the subject design Thinking
DT REPORT by Tech titan GROUP to introduce the subject design Thinking
DhruvChotaliya2
 
15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...15th International Conference on Computer Science, Engineering and Applicatio...
15th International Conference on Computer Science, Engineering and Applicatio...
IJCSES Journal
 
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdfRICS Membership-(The Royal Institution of Chartered Surveyors).pdf
RICS Membership-(The Royal Institution of Chartered Surveyors).pdf
MohamedAbdelkader115
 
Machine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptxMachine learning project on employee attrition detection using (2).pptx
Machine learning project on employee attrition detection using (2).pptx
rajeswari89780
 
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIHlecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
lecture5.pptxJHKGJFHDGTFGYIUOIUIPIOIPUOHIYGUYFGIH
Abodahab
 
Introduction to FLUID MECHANICS & KINEMATICS
Introduction to FLUID MECHANICS &  KINEMATICSIntroduction to FLUID MECHANICS &  KINEMATICS
Introduction to FLUID MECHANICS & KINEMATICS
narayanaswamygdas
 
fluke dealers in bangalore..............
fluke dealers in bangalore..............fluke dealers in bangalore..............
fluke dealers in bangalore..............
Haresh Vaswani
 
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E..."Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
"Boiler Feed Pump (BFP): Working, Applications, Advantages, and Limitations E...
Infopitaara
 
Data Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptxData Structures_Linear data structures Linked Lists.pptx
Data Structures_Linear data structures Linked Lists.pptx
RushaliDeshmukh2
 
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
211421893-M-Tech-CIVIL-Structural-Engineering-pdf.pdf
inmishra17121973
 
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptxExplainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
Explainable-Artificial-Intelligence-XAI-A-Deep-Dive (1).pptx
MahaveerVPandit
 
Ad

Parallel generators of pseudo random numbers with control of calculation errors

  • 1. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 1 Issue 2, November 2012 www.ijsr.net Parallel Generators of Pseudo-random Numbers with Control of Calculation Errors S. Dichenko1 , O. Finko2 Kuban State University of Technology. Moskowskaya St., 2, Krasnodar 350072, Russia 1 [email protected], 2 [email protected] Abstract: Algorithms of parallel realization of classical "congruent" methods of generation of pseudo-random numbers are discussed. Algebraic (equational) and matrix interpretations of ways of realization of algorithms are presented. In order to achieve high level of performance of modern and perspective technical tools of cryptographic protection of data, as well as to provide contemporary stochastic methods of modeling, it is necessary to realize existing "congruent" methods in parallel. In developing solutions for the problems of high level of complexity, such as cryptographic protection of data, ensuring high levels of security of functioning in real time is of out- most importance. In this article the means of ensuring of functional diagnosis of the tools for pseudo-random numbers generation by means of application of classical methods of superfluous arithmetic coding (module control) are briefly discussed. Keywords: Pseudo-random numbers, congruent method, cryptography, fault diagnosis and tolerance in cryptography. 1. Introduction Pseudo-random number (PRN) generators have important applied meaning for the implementation of most crypto- graphic algorithms and key material generation systems [1] – [6]. Stricter requirements for the encryption speed and in- creasing amount of data which needs to be protected cause the necessity to construct parallel algorithms of PRN genera- tion, what should be supported by providing the required level of reliability of their operation [7], [8]. The purpose of the article is constructing parallel algo- rithms of PRN generation with control of calculation errors based on the congruent method. 2. Varieties of the congruent method Varieties of the congruent method, in particular, are ex- pressed by formulas (1) – (4): ,1 mnn bxx  (1) ,1 mnn cbxx  (2) ,1 m n d n cxbx  (3) ,1211 21 m n d n d n cxbxbx   (4) where m – module, b – multiple, mb 0 ; c – increment, mc 0 ; nx – the initial value, mxn 0 ; m  – smal- lest non-negative residue of number  module m . In accordance with the purpose, we pose a problem to construct parallel algorithms of PRN generation with control of calculation errors. Algorithms of PRN generation are shown as algebraic and matrix formulas. 3. Development of parallel algorithms 3.1 Algebraic method Formula (1) can take the following series of algebraic trans- formations:                                                   , , , , 1 3 2 2 23 2 1 12 1 m n k mknkn m n mn nmnn m n mn nmnn mnn xbbxx xb x xbbbxx xb x bxbbxx bxx  with ,2,1k or we have:              , , , 22 11 mnkkn mnn mnn xx xx xx     (5) where m i i b , ki ,,2,1  . For (2) it is possible to get:                                                  ,1 ,1 ,1 , 1 1 1 23 23 2 1 12 1 m k j j n k mknkn m nmnn m n mn nmnn mnn bcxbcbxx bbcxbcbxx bcxbc x cbxbcbxx cbxx   with ,3,2k or we have:              , , , 222 111 mknkkn mnn mnn xx xx xx     (6) 20
  • 2. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 1 Issue 2, November 2012 www.ijsr.net where ;1,, 1 1 11 m k j jimm i i ccb               For (3) it is possible to get:                                     ,1 ,1 ,1 , 1 1 1 23 23 2 12 1 m k j j n k m kn d kn m dd n d m n d n m d n d m n d n m n d n bcxbcxbx bbcxbcxbx bcxbcxbx cxbx  with ,3,2k or we have:              , , , 222 111 mknkkn mnn mnn xx xx xx     (7) where ;1,, 1 1 11 m k j jimm di i ccb               .,,2,1 ki  For (4) it is possible to get:              , , , 1 21222 11111 mknknkkn mnnn mnnn xxx xxx xxx     (8) where ;1 2 12 m   miii 2111    , when ,4,3i ; mii 11   , when ,3,2i ; c1 ;   miii c 11    , when ,3,2i . 3.2 Examples Let’s have 4310 x , 756b , 2047m . Find 321 ,, xxx using (5): ,363431756 204701  m bxx ,130431756 2047 2 0 2 2  m xbx 24431756 2047 3 0 3 3  m xbx . Let’shave 4120 x , 531b , 711c , 4093m . Find 4321 ,,, xxxx using (6): ,2554711412531 409301  m cbxx     ,21021531711412531 1 4093 2 10 2 2   m cxbx    ,35771531531711412531 1 4093 23 2 1 0 3 3             m j jcxbx    .9461531531531711412531 1 4093 234 3 1 0 4 4             m j jcxbx  3.3 Matrix method Let’s present the considered algorithms of PRN generation in matrix form. For (1) it is possible to get: ,2 1 m n k mn x x                      BX (9) where m i i b ; .,,2,1 ki  For (2) it is possible to get: ,2 1 2 1 mk n k mn x x                                       GBX (10) where .,,2,1;1,, 1 1 11 kiccb m k j jimm i i               For (3) it is possible to get: ,2 1 2 1 mk n k mn x x                                       GBX where ;1,, 1 1 11 m k j jimm di i ccb               ki ,,2,1  . For (4) it is possible to get: , 2 1 1 2 1 2 1 1 mk n k n k mnn xx xx                                                           GBAX where ;1 2 12 m   miii 2111    , when ,4,3i ; mkk 11   , when ,3,2k ; c1 ;   mkkk c 11    , when ,3,2k . 3.4 Examples Let’s have 431nx , 756b , 2047m . Find 321 ,, xxx using (9): 21
  • 3. International Journal of Science and Research (IJSR), India Online ISSN: 2319-7064 Volume 1 Issue 2, November 2012 www.ijsr.net . 24 130 363 431 756 756 756 2047 3 2                       mnxBX Let’shave 412nx , 531b , 711c , 4093m . Find 4321 ,,, xxxx using (10):       . 946 3577 2102 2554 1531531531711 1531531711 1531711 711 412 531 531 531 531 23 2 4 3 2                                                  m mnx GBX 4. Control of calculation errors Let’s use ,qmM  as a composite module in calculating any of the obtained systems of expressions (5) – (8), where mq  module introduced for the implementation of control of calculation errors. Then each of the expressions (5) – (8) can be rewritten as a system of expressions on module M , for example (7):                  , , , 222 111 M knkkn M nn M nn xx xx xx     (11) where ;1,, 1 1 11 M k j jiMM di i ccb                 ki ,,1  . Control digits are calculated by the system:                   , , , 222 111 q knkkn q nn q nn rr rr rr     , (12) where ;1,, 1 1 11 q k j jiqq di i ccb                 .,,1 ki  Thus the result of (11), (12) is a redundant arithmetic code, represented by informational     knn xx ,,1  and control vectors knn rr  ,,1  . If the minimal values of the arithmetic code distance 1min  qd control arithmetic expressions are as follows:              ,0ifis,error ,0ifno,iserror jn q jn jn q jn rx rx where kj 1 . The final result is: ,11 m nn xx    ,22 m nn xx    , . m knkn xx    5. Conclusion Developed algorithms of accurate parallel PRN generation provide the required level of perspective highly productive cryptographic means of protection of data. References [1] A.V.Babash, G.P.Shankin, “Cryptology”. SOLON- PRESS. 1997. (book style) [2] Henk C.A. van Tilborg, “Fundamentals of Cryptology”. KLUWER ACADEMIC PUBLISHERS.2000. (book style) [3] B.Schneier, “Applied Cryptography”. John Wiley & Sons, Inc. 1996. (book style) [4] B.А.Forouzan, “Cryptography and Network Security”. McGraw Hill. 2008. (book style) [5] D.E.Knuth,“The Art of Computer Programming. Vo- lume 2. Seminumerical Algorithms”. Addison-Wesley. Redwood City. 1981. (book style) [6] C.P.Schonorr, “On the Construction of Random Num- ber Generators and Random Function Generators”. EUROCRUPT. 1988. (journal style) [7] “Cryptographic Hardware and Embedded Systems – CHES 2004”. 6th International Workshop Cambridge, MA, USA, August 11-13, 2004. Proceedings [8] “Fault Diagnosis and Tolerance in Cryptography”. Third International Workshop, FDTC 2006, Yokohama, Japan, October 10, 2006, Proceedings. Sergey Dichenko- Is a Graduate student. Research interests are development of parallel algorithms for generating pseudo-random numbers and binary se- quences. Error control algorithms. Oleg Finko - Professor, Doctor of Technical Sciences. Professor of Department of computer tech- nologies and information security of the Kuban State University of Technology. Research interests ‐a resi- due number system, the use of error-correcting coding techniques in cryptography, multi-biometric encryption, digital signature algorithms improve, secure electronic document systems, Parallel computing logic by modular numerical polyno- mials.URL: http://www.mathnet.ru/eng/person/40004 22