Design of Modified Dual-CLCG Algorithm for Pseudo-Random Bit Generator
Article Sidebar
Main Article Content
Pseudorandom bit generators (PRBGs) are indispensable in modern cryptography, forming the backbone of secure communication protocols, authentication mechanisms, and privacy-preserving systems. A PRBG must produce sequences that appear statistically random while being computationally unpredictable. Traditional designs such as linear feedback shift registers (LFSR) and linear congruential generators (LCG) are attractive due to their simplicity and low hardware cost, but they fail several National Institute of Standards and Technology (NIST) randomness tests because of inherent linearity. Coupled LCG (CLCG) and dual-CLCG methods improve resilience by combining multiple generators, but they suffer from irregular timing, high latency, and excessive hardware usage.
This paper proposes a modified dual-CLCG algorithm and its VLSI architecture designed to produce pseudorandom bits at a consistent clock rate with minimal hardware overhead. The novelty lies in the use of a simplified XOR stage at the output, which ensures uniform bit generation at every clock cycle. Unlike the dual-CLCG, which requires multiple flip-flops and suffers from asynchronous bit release, the modified design achieves a maximum sequence length of 2^n, requires only one initial delay cycle, and passes all fifteen NIST benchmark tests.
The architecture was implemented using Verilog HDL and prototyped on FPGA hardware. Experimental results demonstrate significant improvements in area efficiency, latency reduction, and power consumption compared to existing designs. The proposed generator not only meets the randomness requirements but also achieves polynomial-time unpredictability, making it suitable for resource-constrained IoT devices where lightweight cryptographic primitives are essential.
Downloads
References
J. Zhou, Z. Cao, X. Dong, and A. V. Vasilakos, “Security and privacy for cloud-based IoT: Challenges,” IEEE Commun. Mag., vol. 55, no. 1, pp. 26–33, Jan. 2017.
Q. Zhang, L. T. Yang, and Z. Chen, “Privacy preserving deep computation model on cloud for big data feature learning,” IEEE Trans. Compute., vol. 65, no. 5, pp. 1351–1362, May 2016.
E. Fernandes, A. Rahmati, K. Eykholt, and A. Prakash, “Internet of Things security research: A rehash of old ideas or new intellectual challenges?” IEEE Secure. Privacy, vol. 15, no. 4, pp. 79–84, 2017.
M. Frustaci, P. Pace, G. Aloi, and G. Fortino, “Evaluating critical security issues of the IoT world: Present and future challenges,” IEEE Internet Things J., vol. 5, no. 4, pp. 2483–2495, Aug. 2018.
E. Zenner, “Cryptanalysis of LFSR-based pseudorandom generators— A survey,” Univ. Mannheim, Mannheim, Germany, 2004. [Online].Available: http://orbit.dtu.dk/en/publications/cryptanalysis-of-lfsrbased- pseudorandom-generators–a-survey(59f7106b-1800-49df-8037- fbe9e0e98ced).html
J. Stern, “Secret linear congruential generators are not cryptographically secure,” in Proc. 28th Annu. Symp. Found. Compute. Sci., Oct. 1987, pp. 421–426.
D. Xiang, M. Chen, and H. Fujiwara, “Using weighted scan enable signals to improve test effectiveness of scan-based BIST,” IEEE Trans. Compute., vol. 56, no. 12, pp. 1619–1628, Dec. 2007.
L. Blum, M. Blum, and M. Shub, “A simple unpredictable pseudo- random number generator,” SIAM J. Compute., vol. 15, no. 2, pp. 364–383, 1986.
W. Thomas Cusick, “Properties of the x2 mod N pseudorandom number generator,” IEEE Trans. Inf. Theory, vol. 41, no. 4, pp. 1155–1159, Jul. 1995.
C. Ding, “Blum-Blum-Shub generator,” IEEE Electron. Lett., vol. 33, no. 8, p. 667, Apr. 1997.
A. Sidorenko and B. Schoenmaker’s, “Concrete security of the Blum- Blum-Shub pseudorandom generator,” in Cryptography and Coding (Lecture Notes in Computer Science), vol. 3796. Berlin, Germany: Springer, Nov. 2005, pp. 355–375.
A. K. Panda and C. K. Ray, “FPGA prototype of low latency BBS PRNG,” In Proc. IEEE Int. Symp. Nanoelectron. Inf. Syst. (INIS), Indore, India, Dec. 2015, pp. 118–123
P. P. Lopez and E. S. Millan, “Cryptographically secure pseudorandom bit generator for RFID tags,” in Proc. Int. Conf. Internet Technol. Secured Trans., London, U.K., vol. 11, Nov. 2010, pp. 1–6.

This work is licensed under a Creative Commons Attribution 4.0 International License.
All articles published in our journal are licensed under CC-BY 4.0, which permits authors to retain copyright of their work. This license allows for unrestricted use, sharing, and reproduction of the articles, provided that proper credit is given to the original authors and the source.