A Class of Random Sequences for Key Generation

Similar documents
Binary GH Sequences for Multiparty Communication. Krishnamurthy Kirthi

Narayana Sequences for Cryptographic Applications

On Randomness of Goldbach Sequences

Random Residue Sequences and the Number Theoretic Hilbert Transform

B. Encryption using quasigroup

Multiparty Probability Computation and Verification

Prime Reciprocal Digit Frequencies and the Euler Zeta Function

Number Theory. Modular Arithmetic

How does the computer generate observations from various distributions specified after input analysis?

THE CUBIC PUBLIC-KEY TRANSFORMATION*

Solution Sheet (i) q = 5, r = 15 (ii) q = 58, r = 15 (iii) q = 3, r = 7 (iv) q = 6, r = (i) gcd (97, 157) = 1 = ,

Remainders. We learned how to multiply and divide in elementary

Computer Architecture 10. Residue Number Systems

Recursive Definitions

Residue Number Systems Ivor Page 1

Cryptography Lecture 3. Pseudorandom generators LFSRs

How does the computer generate observations from various distributions specified after input analysis?

Discrete Logarithm Problem

Definition 6.1 (p.277) A positive integer n is prime when n > 1 and the only positive divisors are 1 and n. Alternatively

Numbers. Çetin Kaya Koç Winter / 18

SUFFIX PROPERTY OF INVERSE MOD

A Piggybank Protocol for Quantum Cryptography

#A11 INTEGERS 12 (2012) FIBONACCI VARIATIONS OF A CONJECTURE OF POLIGNAC

1. Consider the conditional E = p q r. Use de Morgan s laws to write simplified versions of the following : The negation of E : 5 points

GENERALIZED ARYABHATA REMAINDER THEOREM

Number Theory. CSS322: Security and Cryptography. Sirindhorn International Institute of Technology Thammasat University CSS322. Number Theory.

Running Modulus Recursions

SPLITTING FIELDS AND PERIODS OF FIBONACCI SEQUENCES MODULO PRIMES

Residue Number Systems. Alternative number representations. TSTE 8 Digital Arithmetic Seminar 2. Residue Number Systems.

Three-Bit Monomial Hyperovals

Pseudo-Random Numbers Generators. Anne GILLE-GENEST. March 1, Premia Introduction Definitions Good generators...

CHAPTER 3. Congruences. Congruence: definitions and properties

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Singer and GMW constructions (or generalized GMW constructions), little else is known about p-ary two-level autocorrelation sequences. Recently, a few

A. Algebra and Number Theory

FIBONACCI NUMBERS AND DECIMATION OF BINARY SEQUENCES

Basic elements of number theory

Basic elements of number theory

EULER S THEOREM KEITH CONRAD

KEYWORDS: Multiple Valued Logic (MVL), Residue Number System (RNS), Quinary Logic (Q uin), Quinary Full Adder, QFA, Quinary Half Adder, QHA.

CPSC 467: Cryptography and Computer Security

Sets. We discuss an informal (naive) set theory as needed in Computer Science. It was introduced by G. Cantor in the second half of the nineteenth

Public Key Encryption

Review. CS311H: Discrete Mathematics. Number Theory. Computing GCDs. Insight Behind Euclid s Algorithm. Using this Theorem. Euclidian Algorithm

Encryption: The RSA Public Key Cipher

ASSIGNMENT 12 PROBLEM 4

MATH 310: Homework 7

Cryptography. pieces from work by Gordon Royle

PROBLEMS ON CONGRUENCES AND DIVISIBILITY

New Construction of Single Cycle T-function Families

CPSC 467b: Cryptography and Computer Security

Mathematics of Public Key Cryptography

Stream Ciphers. Çetin Kaya Koç Winter / 20

Distributed computation of the number. of points on an elliptic curve

#A66 INTEGERS 14 (2014) SMITH NUMBERS WITH EXTRA DIGITAL FEATURES

CHAPTER 3 CHAOTIC MAPS BASED PSEUDO RANDOM NUMBER GENERATORS

CS 6260 Some number theory

3 The fundamentals: Algorithms, the integers, and matrices

CS March 17, 2009

Aspect of Prime Numbers in Public Key Cryptosystem

COMPUTER ARITHMETIC. 13/05/2010 cryptography - math background pp. 1 / 162

Fermat s Little Theorem. Fermat s little theorem is a statement about primes that nearly characterizes them.

Homework 7 Solutions, Math 55

Optimization of new Chinese Remainder theorems using special moduli sets

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables M. Hamdi, R. Rhouma, S. Belghith

8 Primes and Modular Arithmetic

CPSC 467b: Cryptography and Computer Security

Congruence Classes. Number Theory Essentials. Modular Arithmetic Systems

COT 3100 Applications of Discrete Structures Dr. Michael P. Frank

Applied Cryptography and Computer Security CSE 664 Spring 2017

Finite Fields. Mike Reiter

CSE 20 DISCRETE MATH. Winter

arithmetic properties of weighted catalan numbers

First, let's review classical factoring algorithm (again, we will factor N=15 but pick different number)

Chapter 2 (Part 3): The Fundamentals: Algorithms, the Integers & Matrices. Integers & Algorithms (2.5)

PROPERTIES OF THE EULER TOTIENT FUNCTION MODULO 24 AND SOME OF ITS CRYPTOGRAPHIC IMPLICATIONS

SUM OF TWO REPDIGITS A SQUARE. Bart Goddard Department of Mathematics, University of Texas at Austin, Austin, Texas

DISTRIBUTION OF THE FIBONACCI NUMBERS MOD 2. Eliot T. Jacobson Ohio University, Athens, OH (Submitted September 1990)

SOME CONGRUENCES FOR TRACES OF SINGULAR MODULI

8. Given a rational number r, prove that there exist coprime integers p and q, with q 0, so that r = p q. . For all n N, f n = an b n 2

Refining the Stern Diatomic Sequence

1. Given the public RSA encryption key (e, n) = (5, 35), find the corresponding decryption key (d, n).

CSE 20 DISCRETE MATH. Winter

4 Number Theory and Cryptography

Notes on Continued Fractions for Math 4400

Course MA2C02, Hilary Term 2013 Section 9: Introduction to Number Theory and Cryptography

Number Theory: Applications. Number Theory Applications. Hash Functions II. Hash Functions III. Pseudorandom Numbers

New Constructions for De Bruijn Tori

CSE 20: Discrete Mathematics

All Good (Bad) Words Consisting of 5 Blocks

Subquadratic Space Complexity Multiplication over Binary Fields with Dickson Polynomial Representation

cse 311: foundations of computing Fall 2015 Lecture 12: Primes, GCD, applications

Carmen s Core Concepts (Math 135)

Integers and Division

PUTNAM TRAINING NUMBER THEORY. Exercises 1. Show that the sum of two consecutive primes is never twice a prime.

MATH 4400 SOLUTIONS TO SOME EXERCISES. 1. Chapter 1

An efficient parallel pseudorandom bit generator based on an asymmetric coupled chaotic map lattice

CSE 20 DISCRETE MATH. Fall

A NEW RANDOM NUMBER GENERATOR USING FIBONACCI SERIES

OWO Lecture: Modular Arithmetic with Algorithmic Applications

Transcription:

A Class of Random Sequences for Key Generation Krishnamurthy Kirthi and Subhash Kak Abstract: This paper investigates randomness properties of sequences derived from Fibonacci and Gopala-Hemachandra sequences modulo m for use in key distribution applications. We show that for sequences modulo a prime a binary random sequence B(n) is obtained based on whether the period is p-1 (or a divisor) or p+ (or a divisor). For the more general case of arbitrary m, we use the property if the period is a multiple of 8 or not. The sequences for prime modulo have much better autocorrelation properties. These are good candidates for key distribution since the generation process is not computationally complex. Keywords: Cryptographic key sequences, Gopala-Hemachandra sequences, Fibonacci sequences, randomness measures, key distribution. Introduction A good key sequence for cryptographic applications must have excellent randomness properties but also be easy to generate (Figure 1). Lacking this, keys can become the weak point of an otherwise strong cryptographic system. Here we propose the use of Fibonacci and the related Gopala-Hemachandra (GH) sequences [1]-[3] for this purpose. These sequences have applications in coding and cryptography that are well known. We consider the randomness properties of the residues of the Fibonacci sequence F(n) = 0, 1, 1,, 3, 5, 8,. and the related Gopala- Hemachandra sequence GHa,b(n) = a, b, a+b, a+b, a+3b, modulo m (The sequence GHa,b will also be called (a,b)-gh). We do so by considering m to be either a prime or as a composite number. Note that GHa,b(n) = GHa,b-1(n) + F(n). i Kx Key Generator K i Figure 1. Key generation The general period properties of such sequences are well known [4]-[6] but how these numbers indexed by m may be mapped into random sequences has not been investigated. We need good mappings to map these into binary sequence that have 1

excellent autocorrelation properties. For different perspectives on randomness, that includes physical and algorithmic aspects, see [7]-[11]. Fibonacci and GH sequences are iterative. Another related iterative mapping is the algorithm to generate 1/p for prime p, the binary expansion a(n) of which is given by n the formula [1]-[15] a( n) mod p mod. Other related sequences of interest to the computer scientist and to the student of dynamical system theory include those obtained from general iterative maps [16]-[18]. In this paper, we summarize general properties of the periods of Fibonacci sequences mod m. Then, we present the mapping to transform these sequences into binary sequences that have excellent randomness properties. Periods of Fibonacci and GH sequences mod m As mentioned before GH sequences can be written in terms of the Fibonacci sequence. Thus: GH,1(n) = F(n)+F(n-1), for n > 1 As example, the sequence GH,1(n) can be written as:, 1, 3, 4, 7, 11, = 0, 1, 1,, 3, 5, 8, + 0, 0,,, 4, 6, 10, This indicates that the period of the GH sequence modulo m will be identical to that of the corresponding Fibonacci sequence. Consider an F sequence to mod m series where m is a prime number. In this case, we can see that there can at most be p -1 pairs of consecutive residues in a period. For example, for m=p=3, the sequence will be 0, 1, 1,, 0,,, 1. This consists of the pairs 01, 0, 10, 11, 1, 0, 1, which is all the possible pairs excepting 00, since that cannot be in such a sequence for it will lead to the next number being 0 that is impossible in a periodic residue sequence. Since p -1 is (p-1)(p+1), the period of the residue sequence will either be divisor of p-1 or p+1 (or equivalently of p+). The periods of Fibonacci sequence mod m, with m as a prime, has been shown to be either p-1 if p 1 or 9 (mod 10) or p+ if p 3 or 7(mod 10). The periods of GH sequences likewise follow the same behavior. The periods of generalized (a,b)-gh sequence mod p are [6]: (i) (p-1) or a divisor thereof if the prime number p ends with 1 or 9. (ii) (p+) or a divisor thereof if the prime number p ends with 3 or 7. (iii) 0 for p =5. The pertinent result for the period, N, of GH sequence for non-prime modulo m is: n N(m) 6m with equality iff m 5, for n=1,, 3,.

This includes the value when the modulus is 5. Thus, the periods can be grouped into types: p-1 or p+. Generating the sequence One can generate an arbitrary element of the F sequence by means of the following formula: where 1 n n F( n) ( u v )mod m 5 and 1 u 5 1 5 v This result is easily proven by noting that u u 1 and v v 1. We get the sequence: 3 3 F (0) 0; F(1) ( u v)/ 5 1; F() ( u v )/ 5 1 ; F(3) ( u v )/ 5 ; 4 4 F (4) ( u v )/ 5 3; and so on. If n is a whole number, F(n) is generated and modulus of F(n) is calculated. Thus, F(n) mod m can be generated easily. On the other hand, obtaining n from F(n) mod m is difficult for large m, even if sufficient number of consecutive digits are available. n Kx Fibonacci Generator F(n) mod m Figure. F(n) generator Mapping into random binary sequence As mentioned before, we propose to divide the sequence of periods for modulo p based on the property whether the period is a divisor of p-1 or p+. We will include p=5 in the class p-1 since the period 0= 5x(5-1). We assign periods with multiples of (p-1) or divisor as binary value +1 and periods with multiples of (p+) or divisor as binary value -1. Table 1 provides the first 5 prime numbers for easy reference. 3

Table 1: Binary mapping of prime periods Prime numbers Periods In terms of p Binary value 3 8 p+ -1 5 0 5(p-1) 1 7 16 p+ -1 11 10 p-1 1 13 8 p+ -1 17 36 p+ -1 19 18 p-1 1 3 48 p+ -1 9 14 (p-1)/ 1 31 30 p-1 1 37 76 p+ -1 41 40 p-1 1 43 88 p+ -1 47 3 (p+)/3-1 53 108 p+ -1 59 58 p-1 1 61 60 p-1 1 67 136 p+ -1 71 70 p-1 1 73 148 p+ -1 79 78 p-1 1 83 168 p+ -1 89 44 (p-1)/ 1 97 196 p+ -1 101 50 (p-1)/ 1 We call the resulting binary sequence B(n). The first 0 bits of B(n) are -1,1,-1,1,-1,- 1,1,-1,1,1,-1,1,-1,-1,-1,1,1,-1,1 and -1. Autocorrelation properties We first consider prime moduli and determine the autocorrelation properties of B(n) to determine how good they are from the point of view of randomness [15]. 4

The autocorrelation function is calculated using the formula: n 1 C(k) = 1 n B jb j+k j=0 where B j and B j+k are the binary values of the sequence generated by the above process, and n is the length of the sequence. Figures 3 and 4 present the normalized autocorrelation function of the B(n) sequence for 175 and 300 points. Figure 3. Autocorrelation of B(n) for sequence length 175 Figure 4. Autocorrelation of B(n) for sequence length 300 Looking at Figure 3 and Figure 4, their randomness is apparent from the effective two-valued character of the function. 5

Randomness may be calculated using the randomness measure, R(x), of a discrete sequence x by the expression below [8]: R(x) = 1 n 1 k=1 C(k) n 1 According to this measure a constant sequence will have the measure of 0 whereas a fully random sequence will have the measure of 1. The randomness measure values for Figure 3 and Figure 4 using the above formula is found to be 0.9516 and 0.9631. General moduli m. The challenge is to find the property that helps map the period information into two classes that lead to a random binary sequence like B(n). For length of 300, we found the property whether the period is a multiple of 8 to effectively put the period values into two classes. But the randomness measure of such a sequence was much inferior compared to that of Figures 3 and 4 with a value of 0.8988. Conclusion We have shown that for Fibonacci and GH sequences modulo a prime a binary random sequence B(n) is obtained based on whether the period is p-1 (or a divisor) or p+ (or a divisor). For the more general case of arbitrary m, we used the property if the period is a multiple of 8 or not. The sequences for prime modulo have excellent autocorrelation properties. These are good candidates for key generation since the generation process is not computationally complex. References 1. J. Wu, Extended Fibonacci cubes. IEEE Trans. on Parallel and Distributed Systems 8, 103-110, 1997.. J.H. Thomas, Variations on the Fibonacci universal code. arxiv:cs/0701085 (007) 3. M. Basu and B. Prasad, Long range variations on the Fibonacci universal code. Journal of Number Theory 130: 195-1931 (010) 4. A. Nalli and C. Ozyilmaz, The third order variations on the Fibonacci universal code. Journal of Number Theory 149: 15-3 (015) 5. S. Gupta, P. Rockstroh, and F.E. Su, Splitting fields and periods of Fibonacci sequences modulo primes, Math. Mag. 85: 130 135 (01) 6. M. Renault, The period, rank, and order of the (a,b)-fibonacci sequence mod m. Math. Mag. 86: 37-380 (013) 7. A Kolmogorov, Three approaches to the quantitative definition of information. Problems of Information Transmission. 1:1-17 (1965) 6

8. S. Kak, Classification of random binary sequences using Walsh-Fourier analysis. IEEE Trans. on Electromagnetic Compatibility, EMC-13: 74-77 (1971) 9. S Kak, Information, physics and computation. Found. of Phys. 6: 17-137 (1996) 10. R. Landauer, The physical nature of information. Physics Letters A 17: 188-193 (1996) 11. S Kak, Quantum information and entropy. Int. Journal of Theo. Phys. 46: 860-876 (007) 1. S. Kak and A. Chatterjee, On decimal sequences. IEEE Trans. on Information Theory IT-7: 647 65 (1981) 13. S. Kak, Encryption and error-correction coding using D sequences. IEEE Trans. on Computers C-34: 803-809 (1985) 14. N. Mandhani and S. Kak, Watermarking using decimal sequences. Cryptologia 9: 50-58 (005) 15. S.B. Thippireddy, Binary random sequences obtained from decimal sequences. arxiv preprint arxiv:0809.0676 (008) 16. S. Kak, Feedback neural networks: new characteristics and a generalization. Circuits, Systems, and Signal Processing 1: 63-78 (1993) 17. N.S. Korripati, Random sequences generated by recursive maps. https://subhask.okstate.edu/sites/default/files/nikhil11.pdf 18. S. Kak, Goldbach partitions and sequences. Resonance 19: 108-1037 (014) 7