
www.rsisinternational.org
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XV, Issue III, March 2026
Critical Path and Frequency Performance
The speed of the circuit is determined by the 3-operand adder, which is the most complex part of the math.
However, because our XOR-coupling is very simple and fast, it does not add any extra delay. This allows the
generator to run at a high speed of 200 MHz, making it fast enough for modern high-speed communication.
CONCLUSION
The modified dual-CLCG pseudorandom bit generator proposed in this work demonstrates significant
improvements over traditional PRBG designs. By introducing a simplified XOR-based output stage, the
architecture successfully eliminates irregular timing and reduces latency, enabling the generation of
pseudorandom bits at every clock cycle. This modification enhances reliability and ensures consistent output,
making the design suitable for secure cryptographic applications.
Hardware implementation using Verilog HDL and FPGA synthesis confirmed that the proposed architecture
achieves reduced area utilization, lower flip-flop count, and minimized power consumption. These
improvements make the design particularly suitable for resource-constrained environments such as Internet-of-
Things (IoT) devices, where both efficiency and security are critical requirements.
Statistical validation using the NIST randomness test suite demonstrated that the modified dual-CLCG
generator satisfies all required randomness criteria. Theoretical analysis further confirms the unpredictability
of the generated sequences, ensuring resistance against statistical and linear attacks.
Overall, the proposed modified dual-CLCG architecture provides an efficient, scalable, and secure solution for
pseudorandom bit generation. The improvements in randomness quality, latency reduction, and hardware
efficiency highlight its practical applicability in modern cryptographic and embedded systems.
REFERENCES
1.
J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based IoT:
Challenges,” IEEE Commun. Mag., vol. 55, no. 1, pp. 26–33, Jan. 2017.
2.
Q. Zhang, L. T. Yang, and Z. Chen, “Privacy preserving deep computation model on cloud for big data
feature learning,” IEEE Trans. Compute., vol. 65, no. 5, pp. 1351–1362, May 2016.
3.
E. Fernandes, A. Rahmati, K. Eykholt, and A. Prakash, “Internet of Things security research: A rehash
of old ideas or new intellectual challenges?” IEEE Secure. Privacy, vol. 15, no. 4, pp. 79–84, 2017.
4.
M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the IoT world:
Present and future challenges,” IEEE Internet Things J., vol. 5, no. 4, pp. 2483–2495, Aug. 2018.
5.
E. Zenner, “Cryptanalysis of LFSR-based pseudorandom generators— A survey,” Univ. Mannheim,
Mannheim, Germany, 2004. [Online].Available: http://orbit.dtu.dk/en/publications/cryptanalysis-of-
lfsrbased- pseudorandom-generators–a-survey(59f7106b-1800-49df-8037- fbe9e0e98ced).html
6.
J. Stern, “Secret linear congruential generators are not cryptographically secure,” in Proc. 28th Annu.
Symp. Found. Compute. Sci., Oct. 1987, pp. 421–426.
7.
D. Xiang, M. Chen, and H. Fujiwara, “Using weighted scan enable signals to improve test
effectiveness of scan-based BIST,” IEEE Trans. Compute., vol. 56, no. 12, pp. 1619–1628, Dec. 2007.
8.
L. Blum, M. Blum, and M. Shub, “A simple unpredictable pseudo- random number generator,” SIAM
J. Compute., vol. 15, no. 2, pp. 364–383, 1986.
9.
W. Thomas Cusick, “Properties of the x2 mod N pseudorandom number generator,” IEEE Trans. Inf.
Theory, vol. 41, no. 4, pp. 1155–1159, Jul. 1995.
10.
C. Ding, “Blum-Blum-Shub generator,” IEEE Electron. Lett., vol. 33, no. 8, p. 667, Apr. 1997.
11.
A. Sidorenko and B. Schoenmaker’s, “Concrete security of the Blum- Blum-Shub pseudorandom
generator,” in Cryptography and Coding (Lecture Notes in Computer Science), vol. 3796. Berlin,
Germany: Springer, Nov. 2005, pp. 355–375.
12.
A. K. Panda and C. K. Ray, “FPGA prototype of low latency BBS PRNG,” In Proc. IEEE Int. Symp.
Nanoelectron. Inf. Syst. (INIS), Indore, India, Dec. 2015, pp. 118–123
13.
P. P. Lopez and E. S. Millan, “Cryptographically secure pseudorandom bit generator for RFID tags,”