SlideShare una empresa de Scribd logo
1 de 5
Descargar para leer sin conexión
Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications
                (IJERA)              ISSN: 2248-9622        www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1067-1071
          FPGA IMPLEMENTATION OF NON-LINEAR PRNG USING
                   RESEEDING- MIXING METHOD
                                  Deepika Gurajapu, D.Nagesh,
                        M.Tech (student), Pragati Engineering College, Surampalem
                        Assistant professor, Pragati engineering college, Surampalem


ABSTRACT                                                           The need for true random numbers is
    We present a new reseeding-mixing method               needed in many applications, this has resulted in
to extend the system period length and to enhance
the statistical properties of a chaos-based logistic       specialized hardware being built to produce a
map pseudo random number generator (PRNG).                 sequence of true random numbers instead of using a
The reseeding method removes the short periods             software method of producing random like number
of the digitized logistic map and the mixing               sequences.
method extends the system period length to 2253 by                   There are many natural occurring events
“XOring” with a DX generator. Here we also                 that exhibit true random behaviour. The world of
present the method to increase the randomization           quantum physics is characterized by purely random
by changing the initial pattern periodically.              events as well as natural decay of radioactive
                                                           material are just two examples of many, truly
1. INTRODUCTION                                            random events. These processes, although very good
          The understanding of random numbers and          sources of random data, are not practical for many
how a number is defined to be random is essential to       computing needs. There are however more practical
the understanding of this paper. In a statistical sense,   ways of generating true random data sequences.
there is no such thing a single random number. This                    One such method is by allowing a current
is because it is impossible to perform any statistical     to flow thought a resistor. Thermal agitation of free
tests on a single number. Instead it is better to define   electrons causes small voltage fluctuations. It is this
a sequence of numbers to be random, or speak of a          random noise that circuit designers try to minimise
number chosen from a random sequence of numbers.           as much as possible [Ghausi]. If the amplitude of the
[Knuth]                                                    voltage fluctuations across the resistor are made
          A random number can be defined as a              large enough to use practically, a true random
number from an independent set of numbers which            number generator could be constructed [Connor].
is the output of a natural event and has a very high       This can be used, together with a comparator and a
degree of uncertainty. The next number generated is        microprocessor to feed a sequence of “random” bits
completely independent from all previous numbers           into the PC via the COM port. This sequence of bits
generated and is selected purely by chance. The set        will of course have to be tested statistically to make
of numbers produced will have a given distribution         sure that it does actually exhibit random properties.
[Knuth]. Here, it is assumed that all random               Another possible way to generate random data is to
sequences have a uniform distribution between zero,        connect an antenna to an amplifier and measure the
and one, excluding which is written as [0,1)               noise picked up. This is very similar to measuring
mathematically. All possible numbers in this range         the noise from a resistor, except that the sequence
has an equal probability of being selected.                collected will have to be analyzed using Fourier
Randomness is easier understood as the outcome of          analysis to check that there are no dominating
some natural process or event. A true random               frequencies in the data. This does however have its
number generator has an infinite period and given          drawbacks
the same input parameters, will never produce the                    .
same output.                                               A. Pseudo Random Numbers
          Secondly, a pseudo random number can be                    Obtaining random numbers from a physical
defined as a number from a set of numbers, which           source can often be impractical in many applications
is the output of a mathematical function, which tries      such as portable web applications. This led to the
to “mimic” a true random number. This therefore            development of a mathematical method to create a
makes them completely deterministic [Jansson].             sequence of numbers that could mimic true random
          Poor PRNG’s have been an issue since the         numbers. Because a mathematical source is not a
release of IBM’s RANDU generator in the early              true source of random numbers, it is called a pseudo
1960’s.                                                    random number. This is due to the mathematical
                                                           function being completely deterministic and hence,
II .Random Numbers                                         non-random. In the 1940’s von Neuman developed
                                                           the first mathematical algorithm to create random


                                                                                                 1067 | P a g e
Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications
                (IJERA)              ISSN: 2248-9622        www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1067-1071
numbers. This was known as the middle-square              A. Selecting A Seed
method, and while it could produce seemingly                       Selecting a seed number for a PRNG can be
random number sequences, it quickly proved to be a        a very important process in the correct operation of a
very poor source of pseudo random numbers. These          PRNG. In some applications it is acceptable to use a
methods of producing pseudo random numbers are            predefined seeding value or, for example the time of
known as pseudo random number generators or               day. In security applications, this method of seeding
PRNG for short.                                           a PRNG is not so simple. If the seeding value can be
                                                          discovered, the entire security of an application can
B. Current Prngs                                          be broken .
         The first reliable PRNG algorithm was                     This technique is known as delayed
proposed by D. H. Lehmer in 1949, called the Linear       coordinates and can be explained as a comb being
Congruential Generator (or Linear Congruential            passed through a set of numbers to pick out, or
Method, LCM). This method has been one of the             identify, any patterns in the data. This can be
most well known and widely used methods for               extended to as many dimensions as one likes also
generating random sequences. However, this method         known as n-dimensional space. Three dimensions
is not without flaws. It is well know that the            are used so that it is easy to plot on set of three axes.
sequence generated forms a lattice structure in 3-        An extra dimension is possible in the form of
space. 3-space are three sets of coordinates (3-tuple)    displaying time data. This will show how the
plotted against three sets of axis. This concept can be   sequence is being generated and whether there is
extended to 4,5… n-space.                                 some pattern in the generation process. Also, by
                                                          modifying the lag it is possible to find dependencies
III. Qualities of Prng Must Possess                       in the data that is not immediately obvious. Another
          A good PRNG can be designed and built           very similar method as the one above is to check
following a few simple guide lines. This however          how dependent a number in a sequence is from its
does not make the actual task of designed such an         predecessor
algorithm a menial task.
These six characteristics are as follows:                 B. Construction And Testing Of A Hardware
--Since processing power is not limited to the extent     RNG
as it was a few decades ago, PRNG algorithms must                  The use of a physical device to generate
still be short and efficient. This will allow pseudo      random numbers can possibly be one of the most
random numbers to be generated in only a few clock        secure methods of generating random numbers for
cycles to allow the processor to continue with the        computational needs. It is not, however, suited for
main calling function or program [Jansson, Atreya].       all applications. Monte Carlo experiments, for
--Since PRNG’s are of the form of a mathematical          example, should not be performed using a physical
function, it is noted that they will, at some stage,      random number generator. This is due to the fact that
begin to repeat themselves [Park]. It is this period of   the same sequence of numbers can never be obtained
a PRNG that must be as long as possible [Jansson,         again which will result in an experiment never being
Atreya].                                                  replicated exactly. This will have major implications
---There are statistical tests in use that can test the   when results need to be verified by colleagues.
possibility of randomness with high levels of             Instead, a good PRNG should be used with very
accuracy. The sequence produced from a PRNG               good statistical properties. But for purposes of
should be checked against these tests, and pass them      security and cryptography, the use of a physical
[Jansson].                                                device is desirable. This is because a hardware
--By analysing the outputs of a PRNG, it should not       device, if properly constructed, will have a high
be possible to predict the next number that will be       degree of entropy.
generated [Atreya].
--A random number sequence, in its binary                 C. PRNGs for Simulations
representation, must have, on average, an equal           The output sequence of random numbers is produced
amount of 1’s and 0’s. Furthermore, there must be         in the following manner.
no noticeable patterns in the bit string. [Atreya].                   Xi+1 = aXi + c(mod n)
--A PRNG must be seeded with a value, and given
the same value, the same sequence of numbers must         D. Linear Feedback Shift Register
be produced (this is especially important for Monte                 Linear feedback shift register (LFSR) is
Carlo simulations discussed later). For systems           composed of a register of n memory elements, each
where the PRNG must behave in a more random               of them is capable of storing one bit, and having one
manner, the seed must not be known or must not be         input and one output; and a clock which controls the
able to be calculated. In this aspect, it is important    shift operation (the °ow of data between these
that the seed contain a high level on entropy.            elements) and the feedback operation. At each time
                                                          unit the content of element 0 is output, the content of
                                                          each element i is moved to element i+1, and the new


                                                                                                 1068 | P a g e
Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications
                (IJERA)              ISSN: 2248-9622        www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1067-1071
content of element n+1 is the output of the feedback      be set to Seed1 by the Start command. The Next-
function.                                                 State construction circuitry produces the next state
          The feedback function is xor of the content     value according to the recursive formula. For each
of a fixed subset of the register elements. This subset   generated state value, the reseeding control unit
(also called a tap sequence) is represented by a          (RCU) in the Reseeding Module compares the
polynomial of the form                                    values       for checking the fixed point
                                                          condition,




         If element is used as input to the feedback
function (i.e., c0 = 1), the LFSR is said to be non-
singular. If the LFSR is non-singular and the
polynomial is a primitive polynomial, and the initial
content of the register is not all zero, then the LFSR
produces output with the maximum possible period
2n+1. [21] (H16:2) listsof primitive polynomials
modulo 2.                                                 and increases the reseeding counter (RC) at the same
                                                          time. The RC will be reset and the reseeding
E. Generalized Feedback Shift Register                    operation will be activated when either the fixed
          Generalized feedback shift register (GFSR)      point condition is detected or the RC reaches the
[15] is a refinement of LFSR. It is non-singular, the     reseeding period � . When reseeding is activated,
                                                                              �
polynomial is primitive, and its degree is 3 (a           the state register will be loaded through the
trinomial). Among GFSR'sadvantages are: better            reseeding multiplexer (RMux) with a value
distribution, long period, and speed.                     described in Section III-B. Otherwise, the value of
                                                          __� is directly loaded into the state register. The
                                                               _
F. Reseeding Technique                                    output of the proposed RM-PRNG is obtained by
         Reseeding technique is widely used in            mixing Xt+1 with the output Yt+1 from an auxiliary
LFSR for test pattern generation [26], [27] and in        linear generator
CB-PRNG for period extension. Cernák [13]                 (ALG) in the Vector Mixing Module according to
presented a reseeding method either to perturb the        the rule given in Section III-C.
state value or the system parameter of digitized
logistic map (LGM) for removing the short periods         A. Nonlinear Module
of a CB-PRNG. In 1998, Sang et al. applied a                       We use the LGM as the next-state
different reseeding method in perturbing a CB-            construction function in the Nonlinear Module so
PRNG to extend its period length up to 3.362x10 29        that
and the lower bound of the reseeded system can be
calculated. Li et al. [16] discovered that the
reseeding technique not only removes the short
periods but also improves the statistical properties of                                                     (1)
CB-PRNG. Recently, these merits of reseeding were         . Choosing a value 4 for not only makes the LG
confirmed by exhaustive simulation [28] in a 32-b         Mchaotic but also simplifies the implementation of
implementation of a CB-PRNG.                              (1) to merely left-shifting the product      by 2 b.
                                                          However, the state size decreases from 32 to 31 b,
                                                          because the dynamics (1) are the same. This is
IV. Proposed RM-PRNG
                                                          equivalent to a degradation of resolution by 1 b. In
          Fig. 1 shows the schematic diagram of the
                                                          addition, fixed as well as short periods exist when
RM-PRNG, which is composed of three modules:
                                                          the LGM is digitized. From exhaustive runs for all of
Nonlinear Module, Reseeding Module, and Vector
                                                          the seeds, we obtain all other periods for the 32-b
Mixing Module. In a 32-b implementation, the
                                                          LGM without reseeding. They are given in Table I
Nonlinear Module has a controlled 32-b state
                                                          with the longest period (18 675) and the set of short
register and a Next-State construction circuitry. The
                                                          listed separately along with their total occurrences.
controlled register stores the state value which can
                                                          Clearly, the performance of a CB-PRNG using only

                                                                                              1069 | P a g e
Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications
                (IJERA)              ISSN: 2248-9622        www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1067-1071
the Nonlinear Module is unsatisfactory. To solve the
fixed points and short-period problem, a Reseeding
Module is in order.

B. Reseeding Module
          The removal of the fixed points by the
reseeding mechanism is obvious. When the fixed
point condition is detected or the reseeding period is
reached, the value loaded to the state register will be
perturbed away from in the RCU by the fixed pattern
according to the formula where subscripts ,i ,j are
the bit-index, L is integer. In order to minimize the
degradation of the statistical properties of chaos
dynamics, the magnitude of the perturbation of the
fixed pattern should be small compared Here, we set
L=5 so that the maximum relative perturbation is                             Simulated output.
only (25-1)/232 and the degradation can be ignored
[15]. Clearly, the effectiveness of removing short-       Area Utilization Report
periods depends on the reseeding period as well as
the reseeding pattern . However, choosing the
optimal reseeding period and the reseeding pattern is
nontrivial. Nevertheless, several guidelines to
choose a suitable combination had been proposed
and discussed in our previous work [28]. First, the
reseeding period should avoid being the values or
the multiples of the short periods of the unperturbed
digitized LGM. Otherwise, if the 5 LSBs of equal to
when the reseeding procedure is activated. Then no
effective reseeding will be realized and the system
will be trapped in the short-period cycle. Hence,
prime numbers should be used as the reseeding
period candidates. Although the average period of
the reseeded PRNG has increased more than 100
times relative to that of the non reseeded
counterpart, the period can in fact be extended
tremendously in the Vector Mixing Module
described below.                                          Flow summary report

                                                          CONCLUSIONS
                                                                   The proposed one is a hardware
                                                          implementation of RM-PRNG to offer long periods
                                                          and high throughput rate while adhering to
                                                          established statistical standards for PRNGs. The
                                                          reseeding mechanism solves the short-period
                                                          problem originated from the digitization of the
                                                          chaotic map, while mixing a CB-PRNG with a long-
                                                          period DX generator extends the period length to the
                                                          theoretically calculated value greater than         .
                                                          Replacing a hardware-demanding CB-PRNG with a
                                                          hardware-efficient MRG, the hardware cost is
                                                          reduced and the hardware efficiency achieves 0.538
                                                          Mb/s-gate. In addition, the high throughput rate ( 
                                                          6.4 Gb/s) is attained because RM-PRNG can
                                                          generate multiple random bits in an iteration

                                                          REFERANCES:
                                                            [1]   J. E. Gentle, Random Number Generation
                                                                  and Monte Carlo Methods, 2nd ed. New
                                                                  York: Springer-Verlag, 2003.

                                                                                              1070 | P a g e
Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications
                (IJERA)              ISSN: 2248-9622        www.ijera.com
                   Vol. 2, Issue 5, September- October 2012, pp.1067-1071
 [2]    M. P. Kennedy, R. Rovatti, and G. Setti,
        Chaotic              Electronics            in
        Telecommunications. Boca Raton, FL:
        CRC, 2000.
 [3]    D. Knuth, The Art of Computer
        Programming, 2nd ed. Reading, MA:
        Addison-Wesley, 1981.
 [4]    A. Klapper and M. Goresky, “Feedback
        shift registers, 2-adic span, and combiners
        with memory,” J. Cryptology, vol. 10, pp.
        111–147, 1997.
 [5]    D. H. Lehmer, “Mathematical methods in
        large-scale computing units,” in Proc. 2nd
        Symp. Large Scale Digital Comput.
        Machinery, Cambridge, MA, 1951, pp.
        141–146, Harvard Univ. Press.
 [6]    P. C. Wu, “Multiplicative, congruential
        random-number generators with multiplier
        � � and modulus � __,” ACM Trans.
          � �
        Math. Software, vol. 23, pp. 255–265,
        1997.
 [7]    L. Y. Deng and H. Xu, “A system of high-
        dimensional, efficient, longcycle and
        portable     uniform      random       number
        generators,” ACM Trans. Model Comput.
        Simul., vol. 13, no. 4, pp. 299–309, Oct. 1,
        2003.
 [8]    L. Y. Deng, “Efficient and portable
        multiple recursive generators of large
        order,” ACM Trans. Modeling Comput.
        Simul., vol. 15, no. 1, pp. 1–13, Jan. 2005.
 [9]    L. Blum, M. Blum, and M. Shub, “A simple
        unpredictable pseudorandom             number
        generator,” SIAM J. Comput., vol. 15, pp.
        364–383, 1986.
 [10]   B. M. Gammel, R. Goettfert, and O.
        Kniffler, “An NLFSR-based stream
        cipher,” in Proc. IEEE Int. Symp. Circuits
        Syst., 2006, pp. 2917–2920.
 [11]   D. Mukhopadhyay,D. R. Chowdhury, and
        C. Rebeiro, “Theory of composing non-
        linear machines with predictable cyclic
        structures,” in Proc. 8th Int. Conf. Cellular
        Autom. Res. Ind., 2008, pp. 210–219,
        Springer.
 [12]   D. Mukhopadhyay, “Group properties of
        non-linear cellular automata,” J. Cellular
        Autom., vol. 5, no. 1, pp. 139–155, Oct.
        2009.
 [13]   J. Cermak, “Digital generators of chaos,”
        Phys Lett. A, vol. 214, no.3–4, pp. 151–160,
        1996. [14] T. Sang, R.Wang, and Y.Yan,
        “Perturbance-based algorithm to expand
        cycle length of chaotic




                                                                              1071 | P a g e

Más contenido relacionado

Destacado

Telefonía móvil en áreas rurales: Oportunidades para la agricultura
Telefonía móvil en áreas rurales: Oportunidades para la agriculturaTelefonía móvil en áreas rurales: Oportunidades para la agricultura
Telefonía móvil en áreas rurales: Oportunidades para la agriculturaRIBDA 2009
 
e-ghost Revista ESIDE
e-ghost Revista ESIDEe-ghost Revista ESIDE
e-ghost Revista ESIDEAlvaro Marin
 
Clipping news online 2556(2013)
Clipping news online 2556(2013)Clipping news online 2556(2013)
Clipping news online 2556(2013)nongluck_nc
 
Internediate metal conduit imc steel conduit- ống thép luồn dây điện - gi co...
Internediate metal conduit  imc steel conduit- ống thép luồn dây điện - gi co...Internediate metal conduit  imc steel conduit- ống thép luồn dây điện - gi co...
Internediate metal conduit imc steel conduit- ống thép luồn dây điện - gi co...AP Smartube Conduit
 
San ValentíN
San ValentíNSan ValentíN
San ValentíNinaenaito
 
Actividad para la reflexión clase 4
Actividad para la reflexión clase 4Actividad para la reflexión clase 4
Actividad para la reflexión clase 4UPTM
 
Decreto Eleições Nazaré da Mata
Decreto Eleições Nazaré da MataDecreto Eleições Nazaré da Mata
Decreto Eleições Nazaré da MataPaulo Veras
 

Destacado (20)

Oc2423022305
Oc2423022305Oc2423022305
Oc2423022305
 
Nw2422642271
Nw2422642271Nw2422642271
Nw2422642271
 
Ol2423602367
Ol2423602367Ol2423602367
Ol2423602367
 
Ao25246249
Ao25246249Ao25246249
Ao25246249
 
R24129136
R24129136R24129136
R24129136
 
V24154161
V24154161V24154161
V24154161
 
Oi2423352339
Oi2423352339Oi2423352339
Oi2423352339
 
Cn31594600
Cn31594600Cn31594600
Cn31594600
 
Cx31676679
Cx31676679Cx31676679
Cx31676679
 
Da31699705
Da31699705Da31699705
Da31699705
 
Telefonía móvil en áreas rurales: Oportunidades para la agricultura
Telefonía móvil en áreas rurales: Oportunidades para la agriculturaTelefonía móvil en áreas rurales: Oportunidades para la agricultura
Telefonía móvil en áreas rurales: Oportunidades para la agricultura
 
9- Atenció a la demència. Dra. Isabel Fort
9- Atenció a la demència. Dra. Isabel Fort9- Atenció a la demència. Dra. Isabel Fort
9- Atenció a la demència. Dra. Isabel Fort
 
e-ghost Revista ESIDE
e-ghost Revista ESIDEe-ghost Revista ESIDE
e-ghost Revista ESIDE
 
Clipping news online 2556(2013)
Clipping news online 2556(2013)Clipping news online 2556(2013)
Clipping news online 2556(2013)
 
Internediate metal conduit imc steel conduit- ống thép luồn dây điện - gi co...
Internediate metal conduit  imc steel conduit- ống thép luồn dây điện - gi co...Internediate metal conduit  imc steel conduit- ống thép luồn dây điện - gi co...
Internediate metal conduit imc steel conduit- ống thép luồn dây điện - gi co...
 
o_12132_muv250_0416
o_12132_muv250_0416o_12132_muv250_0416
o_12132_muv250_0416
 
San ValentíN
San ValentíNSan ValentíN
San ValentíN
 
Actividad para la reflexión clase 4
Actividad para la reflexión clase 4Actividad para la reflexión clase 4
Actividad para la reflexión clase 4
 
PresentacióN1
PresentacióN1PresentacióN1
PresentacióN1
 
Decreto Eleições Nazaré da Mata
Decreto Eleições Nazaré da MataDecreto Eleições Nazaré da Mata
Decreto Eleições Nazaré da Mata
 

Similar a Fv2510671071

AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...cscpconf
 
Pseudo-Random Number Generators: A New Approach
Pseudo-Random Number Generators: A New ApproachPseudo-Random Number Generators: A New Approach
Pseudo-Random Number Generators: A New ApproachNithin Prince John
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewIJERA Editor
 
The Most Important Algorithms
The Most Important AlgorithmsThe Most Important Algorithms
The Most Important Algorithmswensheng wei
 
Probability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdfProbability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdfVedant Srivastava
 
Performance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoPerformance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoRahul Shirude
 
Random number generators
Random number generatorsRandom number generators
Random number generatorsBob Landstrom
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksIRJET Journal
 
Advances in composite integer factorization
Advances in composite integer factorizationAdvances in composite integer factorization
Advances in composite integer factorizationAlexander Decker
 
Computer Simulation of Nano-Structures
Computer Simulation of Nano-StructuresComputer Simulation of Nano-Structures
Computer Simulation of Nano-StructuresAqeel Khudhair
 
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingA Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingIJERA Editor
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsJigisha Aryya
 
Comparative study of various approaches for transaction Fraud Detection using...
Comparative study of various approaches for transaction Fraud Detection using...Comparative study of various approaches for transaction Fraud Detection using...
Comparative study of various approaches for transaction Fraud Detection using...Pratibha Singh
 

Similar a Fv2510671071 (20)

40120140502003
4012014050200340120140502003
40120140502003
 
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
 
Pseudo Random Number
Pseudo Random NumberPseudo Random Number
Pseudo Random Number
 
J45015460
J45015460J45015460
J45015460
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
Pseudo-Random Number Generators: A New Approach
Pseudo-Random Number Generators: A New ApproachPseudo-Random Number Generators: A New Approach
Pseudo-Random Number Generators: A New Approach
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In Labview
 
88 92
88 9288 92
88 92
 
The Most Important Algorithms
The Most Important AlgorithmsThe Most Important Algorithms
The Most Important Algorithms
 
Probability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdfProbability and random processes project based learning template.pdf
Probability and random processes project based learning template.pdf
 
Performance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence DetectionalgoPerformance Efficient DNA Sequence Detectionalgo
Performance Efficient DNA Sequence Detectionalgo
 
FYP Journal Paper
FYP Journal PaperFYP Journal Paper
FYP Journal Paper
 
Gk3611601162
Gk3611601162Gk3611601162
Gk3611601162
 
Random number generators
Random number generatorsRandom number generators
Random number generators
 
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor NetworksEfficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
Efficient Data Gathering with Compressive Sensing in Wireless Sensor Networks
 
Advances in composite integer factorization
Advances in composite integer factorizationAdvances in composite integer factorization
Advances in composite integer factorization
 
Computer Simulation of Nano-Structures
Computer Simulation of Nano-StructuresComputer Simulation of Nano-Structures
Computer Simulation of Nano-Structures
 
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String MatchingA Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
A Novel Framework for Short Tandem Repeats (STRs) Using Parallel String Matching
 
Algorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systemsAlgorithm selection for sorting in embedded and mobile systems
Algorithm selection for sorting in embedded and mobile systems
 
Comparative study of various approaches for transaction Fraud Detection using...
Comparative study of various approaches for transaction Fraud Detection using...Comparative study of various approaches for transaction Fraud Detection using...
Comparative study of various approaches for transaction Fraud Detection using...
 

Último

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 

Último (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 

Fv2510671071

  • 1. Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1067-1071 FPGA IMPLEMENTATION OF NON-LINEAR PRNG USING RESEEDING- MIXING METHOD Deepika Gurajapu, D.Nagesh, M.Tech (student), Pragati Engineering College, Surampalem Assistant professor, Pragati engineering college, Surampalem ABSTRACT The need for true random numbers is We present a new reseeding-mixing method needed in many applications, this has resulted in to extend the system period length and to enhance the statistical properties of a chaos-based logistic specialized hardware being built to produce a map pseudo random number generator (PRNG). sequence of true random numbers instead of using a The reseeding method removes the short periods software method of producing random like number of the digitized logistic map and the mixing sequences. method extends the system period length to 2253 by There are many natural occurring events “XOring” with a DX generator. Here we also that exhibit true random behaviour. The world of present the method to increase the randomization quantum physics is characterized by purely random by changing the initial pattern periodically. events as well as natural decay of radioactive material are just two examples of many, truly 1. INTRODUCTION random events. These processes, although very good The understanding of random numbers and sources of random data, are not practical for many how a number is defined to be random is essential to computing needs. There are however more practical the understanding of this paper. In a statistical sense, ways of generating true random data sequences. there is no such thing a single random number. This One such method is by allowing a current is because it is impossible to perform any statistical to flow thought a resistor. Thermal agitation of free tests on a single number. Instead it is better to define electrons causes small voltage fluctuations. It is this a sequence of numbers to be random, or speak of a random noise that circuit designers try to minimise number chosen from a random sequence of numbers. as much as possible [Ghausi]. If the amplitude of the [Knuth] voltage fluctuations across the resistor are made A random number can be defined as a large enough to use practically, a true random number from an independent set of numbers which number generator could be constructed [Connor]. is the output of a natural event and has a very high This can be used, together with a comparator and a degree of uncertainty. The next number generated is microprocessor to feed a sequence of “random” bits completely independent from all previous numbers into the PC via the COM port. This sequence of bits generated and is selected purely by chance. The set will of course have to be tested statistically to make of numbers produced will have a given distribution sure that it does actually exhibit random properties. [Knuth]. Here, it is assumed that all random Another possible way to generate random data is to sequences have a uniform distribution between zero, connect an antenna to an amplifier and measure the and one, excluding which is written as [0,1) noise picked up. This is very similar to measuring mathematically. All possible numbers in this range the noise from a resistor, except that the sequence has an equal probability of being selected. collected will have to be analyzed using Fourier Randomness is easier understood as the outcome of analysis to check that there are no dominating some natural process or event. A true random frequencies in the data. This does however have its number generator has an infinite period and given drawbacks the same input parameters, will never produce the . same output. A. Pseudo Random Numbers Secondly, a pseudo random number can be Obtaining random numbers from a physical defined as a number from a set of numbers, which source can often be impractical in many applications is the output of a mathematical function, which tries such as portable web applications. This led to the to “mimic” a true random number. This therefore development of a mathematical method to create a makes them completely deterministic [Jansson]. sequence of numbers that could mimic true random Poor PRNG’s have been an issue since the numbers. Because a mathematical source is not a release of IBM’s RANDU generator in the early true source of random numbers, it is called a pseudo 1960’s. random number. This is due to the mathematical function being completely deterministic and hence, II .Random Numbers non-random. In the 1940’s von Neuman developed the first mathematical algorithm to create random 1067 | P a g e
  • 2. Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1067-1071 numbers. This was known as the middle-square A. Selecting A Seed method, and while it could produce seemingly Selecting a seed number for a PRNG can be random number sequences, it quickly proved to be a a very important process in the correct operation of a very poor source of pseudo random numbers. These PRNG. In some applications it is acceptable to use a methods of producing pseudo random numbers are predefined seeding value or, for example the time of known as pseudo random number generators or day. In security applications, this method of seeding PRNG for short. a PRNG is not so simple. If the seeding value can be discovered, the entire security of an application can B. Current Prngs be broken . The first reliable PRNG algorithm was This technique is known as delayed proposed by D. H. Lehmer in 1949, called the Linear coordinates and can be explained as a comb being Congruential Generator (or Linear Congruential passed through a set of numbers to pick out, or Method, LCM). This method has been one of the identify, any patterns in the data. This can be most well known and widely used methods for extended to as many dimensions as one likes also generating random sequences. However, this method known as n-dimensional space. Three dimensions is not without flaws. It is well know that the are used so that it is easy to plot on set of three axes. sequence generated forms a lattice structure in 3- An extra dimension is possible in the form of space. 3-space are three sets of coordinates (3-tuple) displaying time data. This will show how the plotted against three sets of axis. This concept can be sequence is being generated and whether there is extended to 4,5… n-space. some pattern in the generation process. Also, by modifying the lag it is possible to find dependencies III. Qualities of Prng Must Possess in the data that is not immediately obvious. Another A good PRNG can be designed and built very similar method as the one above is to check following a few simple guide lines. This however how dependent a number in a sequence is from its does not make the actual task of designed such an predecessor algorithm a menial task. These six characteristics are as follows: B. Construction And Testing Of A Hardware --Since processing power is not limited to the extent RNG as it was a few decades ago, PRNG algorithms must The use of a physical device to generate still be short and efficient. This will allow pseudo random numbers can possibly be one of the most random numbers to be generated in only a few clock secure methods of generating random numbers for cycles to allow the processor to continue with the computational needs. It is not, however, suited for main calling function or program [Jansson, Atreya]. all applications. Monte Carlo experiments, for --Since PRNG’s are of the form of a mathematical example, should not be performed using a physical function, it is noted that they will, at some stage, random number generator. This is due to the fact that begin to repeat themselves [Park]. It is this period of the same sequence of numbers can never be obtained a PRNG that must be as long as possible [Jansson, again which will result in an experiment never being Atreya]. replicated exactly. This will have major implications ---There are statistical tests in use that can test the when results need to be verified by colleagues. possibility of randomness with high levels of Instead, a good PRNG should be used with very accuracy. The sequence produced from a PRNG good statistical properties. But for purposes of should be checked against these tests, and pass them security and cryptography, the use of a physical [Jansson]. device is desirable. This is because a hardware --By analysing the outputs of a PRNG, it should not device, if properly constructed, will have a high be possible to predict the next number that will be degree of entropy. generated [Atreya]. --A random number sequence, in its binary C. PRNGs for Simulations representation, must have, on average, an equal The output sequence of random numbers is produced amount of 1’s and 0’s. Furthermore, there must be in the following manner. no noticeable patterns in the bit string. [Atreya]. Xi+1 = aXi + c(mod n) --A PRNG must be seeded with a value, and given the same value, the same sequence of numbers must D. Linear Feedback Shift Register be produced (this is especially important for Monte Linear feedback shift register (LFSR) is Carlo simulations discussed later). For systems composed of a register of n memory elements, each where the PRNG must behave in a more random of them is capable of storing one bit, and having one manner, the seed must not be known or must not be input and one output; and a clock which controls the able to be calculated. In this aspect, it is important shift operation (the °ow of data between these that the seed contain a high level on entropy. elements) and the feedback operation. At each time unit the content of element 0 is output, the content of each element i is moved to element i+1, and the new 1068 | P a g e
  • 3. Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1067-1071 content of element n+1 is the output of the feedback be set to Seed1 by the Start command. The Next- function. State construction circuitry produces the next state The feedback function is xor of the content value according to the recursive formula. For each of a fixed subset of the register elements. This subset generated state value, the reseeding control unit (also called a tap sequence) is represented by a (RCU) in the Reseeding Module compares the polynomial of the form values for checking the fixed point condition, If element is used as input to the feedback function (i.e., c0 = 1), the LFSR is said to be non- singular. If the LFSR is non-singular and the polynomial is a primitive polynomial, and the initial content of the register is not all zero, then the LFSR produces output with the maximum possible period 2n+1. [21] (H16:2) listsof primitive polynomials modulo 2. and increases the reseeding counter (RC) at the same time. The RC will be reset and the reseeding E. Generalized Feedback Shift Register operation will be activated when either the fixed Generalized feedback shift register (GFSR) point condition is detected or the RC reaches the [15] is a refinement of LFSR. It is non-singular, the reseeding period � . When reseeding is activated, � polynomial is primitive, and its degree is 3 (a the state register will be loaded through the trinomial). Among GFSR'sadvantages are: better reseeding multiplexer (RMux) with a value distribution, long period, and speed. described in Section III-B. Otherwise, the value of __� is directly loaded into the state register. The _ F. Reseeding Technique output of the proposed RM-PRNG is obtained by Reseeding technique is widely used in mixing Xt+1 with the output Yt+1 from an auxiliary LFSR for test pattern generation [26], [27] and in linear generator CB-PRNG for period extension. Cernák [13] (ALG) in the Vector Mixing Module according to presented a reseeding method either to perturb the the rule given in Section III-C. state value or the system parameter of digitized logistic map (LGM) for removing the short periods A. Nonlinear Module of a CB-PRNG. In 1998, Sang et al. applied a We use the LGM as the next-state different reseeding method in perturbing a CB- construction function in the Nonlinear Module so PRNG to extend its period length up to 3.362x10 29 that and the lower bound of the reseeded system can be calculated. Li et al. [16] discovered that the reseeding technique not only removes the short periods but also improves the statistical properties of (1) CB-PRNG. Recently, these merits of reseeding were . Choosing a value 4 for not only makes the LG confirmed by exhaustive simulation [28] in a 32-b Mchaotic but also simplifies the implementation of implementation of a CB-PRNG. (1) to merely left-shifting the product by 2 b. However, the state size decreases from 32 to 31 b, because the dynamics (1) are the same. This is IV. Proposed RM-PRNG equivalent to a degradation of resolution by 1 b. In Fig. 1 shows the schematic diagram of the addition, fixed as well as short periods exist when RM-PRNG, which is composed of three modules: the LGM is digitized. From exhaustive runs for all of Nonlinear Module, Reseeding Module, and Vector the seeds, we obtain all other periods for the 32-b Mixing Module. In a 32-b implementation, the LGM without reseeding. They are given in Table I Nonlinear Module has a controlled 32-b state with the longest period (18 675) and the set of short register and a Next-State construction circuitry. The listed separately along with their total occurrences. controlled register stores the state value which can Clearly, the performance of a CB-PRNG using only 1069 | P a g e
  • 4. Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1067-1071 the Nonlinear Module is unsatisfactory. To solve the fixed points and short-period problem, a Reseeding Module is in order. B. Reseeding Module The removal of the fixed points by the reseeding mechanism is obvious. When the fixed point condition is detected or the reseeding period is reached, the value loaded to the state register will be perturbed away from in the RCU by the fixed pattern according to the formula where subscripts ,i ,j are the bit-index, L is integer. In order to minimize the degradation of the statistical properties of chaos dynamics, the magnitude of the perturbation of the fixed pattern should be small compared Here, we set L=5 so that the maximum relative perturbation is Simulated output. only (25-1)/232 and the degradation can be ignored [15]. Clearly, the effectiveness of removing short- Area Utilization Report periods depends on the reseeding period as well as the reseeding pattern . However, choosing the optimal reseeding period and the reseeding pattern is nontrivial. Nevertheless, several guidelines to choose a suitable combination had been proposed and discussed in our previous work [28]. First, the reseeding period should avoid being the values or the multiples of the short periods of the unperturbed digitized LGM. Otherwise, if the 5 LSBs of equal to when the reseeding procedure is activated. Then no effective reseeding will be realized and the system will be trapped in the short-period cycle. Hence, prime numbers should be used as the reseeding period candidates. Although the average period of the reseeded PRNG has increased more than 100 times relative to that of the non reseeded counterpart, the period can in fact be extended tremendously in the Vector Mixing Module described below. Flow summary report CONCLUSIONS The proposed one is a hardware implementation of RM-PRNG to offer long periods and high throughput rate while adhering to established statistical standards for PRNGs. The reseeding mechanism solves the short-period problem originated from the digitization of the chaotic map, while mixing a CB-PRNG with a long- period DX generator extends the period length to the theoretically calculated value greater than . Replacing a hardware-demanding CB-PRNG with a hardware-efficient MRG, the hardware cost is reduced and the hardware efficiency achieves 0.538 Mb/s-gate. In addition, the high throughput rate (  6.4 Gb/s) is attained because RM-PRNG can generate multiple random bits in an iteration REFERANCES: [1] J. E. Gentle, Random Number Generation and Monte Carlo Methods, 2nd ed. New York: Springer-Verlag, 2003. 1070 | P a g e
  • 5. Deepika Gurajapu, D.Nagesh / International Journal of Engineering Research and Applications (IJERA) ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 5, September- October 2012, pp.1067-1071 [2] M. P. Kennedy, R. Rovatti, and G. Setti, Chaotic Electronics in Telecommunications. Boca Raton, FL: CRC, 2000. [3] D. Knuth, The Art of Computer Programming, 2nd ed. Reading, MA: Addison-Wesley, 1981. [4] A. Klapper and M. Goresky, “Feedback shift registers, 2-adic span, and combiners with memory,” J. Cryptology, vol. 10, pp. 111–147, 1997. [5] D. H. Lehmer, “Mathematical methods in large-scale computing units,” in Proc. 2nd Symp. Large Scale Digital Comput. Machinery, Cambridge, MA, 1951, pp. 141–146, Harvard Univ. Press. [6] P. C. Wu, “Multiplicative, congruential random-number generators with multiplier � � and modulus � __,” ACM Trans. � � Math. Software, vol. 23, pp. 255–265, 1997. [7] L. Y. Deng and H. Xu, “A system of high- dimensional, efficient, longcycle and portable uniform random number generators,” ACM Trans. Model Comput. Simul., vol. 13, no. 4, pp. 299–309, Oct. 1, 2003. [8] L. Y. Deng, “Efficient and portable multiple recursive generators of large order,” ACM Trans. Modeling Comput. Simul., vol. 15, no. 1, pp. 1–13, Jan. 2005. [9] L. Blum, M. Blum, and M. Shub, “A simple unpredictable pseudorandom number generator,” SIAM J. Comput., vol. 15, pp. 364–383, 1986. [10] B. M. Gammel, R. Goettfert, and O. Kniffler, “An NLFSR-based stream cipher,” in Proc. IEEE Int. Symp. Circuits Syst., 2006, pp. 2917–2920. [11] D. Mukhopadhyay,D. R. Chowdhury, and C. Rebeiro, “Theory of composing non- linear machines with predictable cyclic structures,” in Proc. 8th Int. Conf. Cellular Autom. Res. Ind., 2008, pp. 210–219, Springer. [12] D. Mukhopadhyay, “Group properties of non-linear cellular automata,” J. Cellular Autom., vol. 5, no. 1, pp. 139–155, Oct. 2009. [13] J. Cermak, “Digital generators of chaos,” Phys Lett. A, vol. 214, no.3–4, pp. 151–160, 1996. [14] T. Sang, R.Wang, and Y.Yan, “Perturbance-based algorithm to expand cycle length of chaotic 1071 | P a g e