Concerning the output function, we observe that
CRC is widely used thanks to its efficiency. Indeed,
CRC efficiency is reached in hardware by a modified
shift register (Dubrova and Mansouri, 2012) and in
software by processing the state in units larger than
one single bit. Depending on the architecture on
which CRC is carried out, the unit can be composed of
4, 8, 16, 32, 64 or 128 bits. The algorithm is speed up
by means of a pre-computed lookup table depending
only on the coefficients of the CRC generator polyno-
mial.
6 CONCLUSION AND FUTURE
WORK
In this paper, we have presented a new lightweight
pseudo random number generator and we have shown
both its randomness and security. The PRNG is
based on very simple operations performed on 1023-
bit states, which correspond to increment a state by
a suitable odd value m and then to reverse the so ob-
tained bit string. Finally, an extended version of CRC
is applied, allowing us to produce at each step a 128-
bit output number. In this position paper, we have
provided a first deep security analysis of our scheme,
by showing that it is truly random and resistant to
a number of possible attacks. As a future work we
plan to deepen the study of the PRNG security against
cryptanalysis attacks and to compare our PRNG with
existing PRNGs on the aspect of efficiency, also by
means of a hardware implementation. Indeed, we
guess that our PRNG is very competitive under this
point of view, as it is based on very simple operations.
ACKNOWLEDGEMENTS
This work has been partially supported by the
TENACE PRIN Project (n. 20103P34XC) funded
by the Italian Ministry of Education, University and
Research and by the Program “Programma Operativo
Nazionale Ricerca e Competitivit`a” 2007-2013, Dis-
tretto Tecnologico CyberSecurity funded by the Ital-
ian Ministry of Education, University and Research.
REFERENCES
Alcaraz, C. and Lopez, J. (2010). A security analysis
for wireless sensor mesh networks in highly criti-
cal systems. Systems, Man, and Cybernetics, Part
C: Applications and Reviews, IEEE Transactions on,
40(4):419–428.
Blum, L., Blum, M., and Shub, M. (1986). A simple un-
predictable pseudo-random number generator. SIAM
Journal on computing, 15(2):364–383.
Buccafurri, F. and Lax, G. (2011). Implementing dispos-
able credit card numbers by mobile phones. Electronic
Commerce Research, 11(3):271–296.
Bundesamt f¨ur Sicherheit in der Informationstechnik
(2014). http://www.bsi.de/english/index.htm.
Cox, G., Dike, C., and Johnston, D. (2011). Intels Digi-
tal Random Number Generator (DRNG). Technical
report, Intel.
Dolev, S., Gilboa, N., Kopeetsky, M., Persiano, G., and
Spirakis, P. G. (2011). Information security for sen-
sors by overwhelming random sequences and permu-
tations. Ad Hoc Networks.
Dubrova, E. and Mansouri, S. S. (2012). A bdd-based ap-
proach to constructing lfsrs for parallel crc encoding.
In Multiple-Valued Logic (ISMVL), 2012 42nd IEEE
International Symposium on, pages 128–133. IEEE.
ECMA (1992). ECMA-182: Data Interchange on 12,7 mm
48-Track Magnetic Tape Cartridges — DLT1 Format.
EPCglobal, E. (2004). Radio-frequency identity protocols
class-1 generation-2 uhf rfid protocol for communica-
tions at 860 mhz–960 mhz version 1.0. 9. K. Chiew et
al./On False Authenticationsfor C1G2 Passive RFID
Tags, 65.
Hill, J. R. (1979). A table driven approach to cyclic redun-
dancy check calculations. SIGCOMM Comput. Com-
mun. Rev., 9(2):40–60.
Huang, Y.-J., Yuan, C.-C., Chen, M.-K., Lin, W.-C., and
Teng, H.-C. (2010). Hardware implementation of rfid
mutual authentication protocol. Industrial Electron-
ics, IEEE Transactions on, 57(5):1573–1582.
L’Ecuyer, P. (1994). Uniform random number generation.
Annals of Operations Research, 53(1):77–120.
Li, Y. and Zhang, X. (2005). Securing credit card trans-
actions with one-time payment scheme. Electronic
Commerce Research and Applications, 4:413–426.
Elsevier Science Publishers B. V.
Meli`a-Segu´ı, J., Garcia-Alfaro, J., and Herrera-
Joancomart´ı, J. (2013). J3gen: A prng for low-cost
passive rfid. Sensors, 13(3):3816–3830.
National Institute of Standards and Technology (2014).
Federal Information Processing Standards Publica-
tion, Washington.
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., and Barker,
E. (2001). A statistical test suite for random and pseu-
dorandom number generators for cryptographic appli-
cations. Technical report, DTIC Document.
Schindler, W. (1999). Functionality classes and evaluation
methodology for deterministic random number gener-
ators. Federal Office for Information Security (BSI).
Tang, B.-y., ZENG, N., ZHENG, L.-x., and CHEN, H.-
h. (2004). Design and implementation of web-
based remote supervisory system in the embedded
system. Journal-Xiamen University Natural Science,
43(5):632–635.
Wang, Y. (2011). sSCADA: securing SCADAinfrastructure
communications. International Journal of Communi-
cation Networks and Distributed Systems, 6(1):59–78.
SECRYPT2014-InternationalConferenceonSecurityandCryptography
328