Design of Modified Dual-CLCG Algorithm for Pseudo-Random Bit Generator

Article Sidebar

Main Article Content

G. Pranathi
J. Srilaxmi
Dr. B. Anitha
K. Karthik

Pseudorandom bit generators (PRBGs) are indispensable in modern cryptography, forming the backbone of secure communication protocols, authentication mechanisms, and privacy-preserving systems. A PRBG must produce sequences that appear statistically random while being computationally unpredictable. Traditional designs such as linear feedback shift registers (LFSR) and linear congruential generators (LCG) are attractive due to their simplicity and low hardware cost, but they fail several National Institute of Standards and Technology (NIST) randomness tests because of inherent linearity. Coupled LCG (CLCG) and dual-CLCG methods improve resilience by combining multiple generators, but they suffer from irregular timing, high latency, and excessive hardware usage.


This paper proposes a modified dual-CLCG algorithm and its VLSI architecture designed to produce pseudorandom bits at a consistent clock rate with minimal hardware overhead. The novelty lies in the use of a simplified XOR stage at the output, which ensures uniform bit generation at every clock cycle. Unlike the dual-CLCG, which requires multiple flip-flops and suffers from asynchronous bit release, the modified design achieves a maximum sequence length of 2^n, requires only one initial delay cycle, and passes all fifteen NIST benchmark tests.


The architecture was implemented using Verilog HDL and prototyped on FPGA hardware. Experimental results demonstrate significant improvements in area efficiency, latency reduction, and power consumption compared to existing designs. The proposed generator not only meets the randomness requirements but also achieves polynomial-time unpredictability, making it suitable for resource-constrained IoT devices where lightweight cryptographic primitives are essential.

Design of Modified Dual-CLCG Algorithm for Pseudo-Random Bit Generator. (2026). International Journal of Latest Technology in Engineering Management & Applied Science, 15(3), 1220-1228. https://doi.org/10.51583/IJLTEMAS.2026.150300105

Downloads

References

J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based IoT: Challenges,” IEEE Commun. Mag., vol. 55, no. 1, pp. 26–33, Jan. 2017.

Q. Zhang, L. T. Yang, and Z. Chen, “Privacy preserving deep computation model on cloud for big data feature learning,” IEEE Trans. Compute., vol. 65, no. 5, pp. 1351–1362, May 2016.

E. Fernandes, A. Rahmati, K. Eykholt, and A. Prakash, “Internet of Things security research: A rehash of old ideas or new intellectual challenges?” IEEE Secure. Privacy, vol. 15, no. 4, pp. 79–84, 2017.

M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet Things J., vol. 5, no. 4, pp. 2483–2495, Aug. 2018.

E. Zenner, “Cryptanalysis of LFSR-based pseudorandom generators— A survey,” Univ. Mannheim, Mannheim, Germany, 2004. [Online].Available: http://orbit.dtu.dk/en/publications/cryptanalysis-of-lfsrbased- pseudorandom-generators–a-survey(59f7106b-1800-49df-8037- fbe9e0e98ced).html

J. Stern, “Secret linear congruential generators are not cryptographically secure,” in Proc. 28th Annu. Symp. Found. Compute. Sci., Oct. 1987, pp. 421–426.

D. Xiang, M. Chen, and H. Fujiwara, “Using weighted scan enable signals to improve test effectiveness of scan-based BIST,” IEEE Trans. Compute., vol. 56, no. 12, pp. 1619–1628, Dec. 2007.

L. Blum, M. Blum, and M. Shub, “A simple unpredictable pseudo- random number generator,” SIAM J. Compute., vol. 15, no. 2, pp. 364–383, 1986.

W. Thomas Cusick, “Properties of the x2 mod N pseudorandom number generator,” IEEE Trans. Inf. Theory, vol. 41, no. 4, pp. 1155–1159, Jul. 1995.

C. Ding, “Blum-Blum-Shub generator,” IEEE Electron. Lett., vol. 33, no. 8, p. 667, Apr. 1997.

A. Sidorenko and B. Schoenmaker’s, “Concrete security of the Blum- Blum-Shub pseudorandom generator,” in Cryptography and Coding (Lecture Notes in Computer Science), vol. 3796. Berlin, Germany: Springer, Nov. 2005, pp. 355–375.

A. K. Panda and C. K. Ray, “FPGA prototype of low latency BBS PRNG,” In Proc. IEEE Int. Symp. Nanoelectron. Inf. Syst. (INIS), Indore, India, Dec. 2015, pp. 118–123

P. P. Lopez and E. S. Millan, “Cryptographically secure pseudorandom bit generator for RFID tags,” in Proc. Int. Conf. Internet Technol. Secured Trans., London, U.K., vol. 11, Nov. 2010, pp. 1–6.

Article Details

How to Cite

Design of Modified Dual-CLCG Algorithm for Pseudo-Random Bit Generator. (2026). International Journal of Latest Technology in Engineering Management & Applied Science, 15(3), 1220-1228. https://doi.org/10.51583/IJLTEMAS.2026.150300105