Abstract
We suggested a new approach for secure gamma generation in stream ciphers with application to secure data transmission between components of cyber-physical systems (in terms of ensuring confidentiality). Secure gamma generation is based on using a new type of pseudo-random number generator (PRNG) with linear feedback shift registers (LFSR) and fuzzy logic. We used a nonlinear combination function based on fuzzy logic for selecting the best LSFR while generating the output. We adjusted some parameters of fuzzy PRNG (FPRNG) to get the best pseudo-random sequences (gamma), which are very close to white random noise. We also studied the structure of FPRNG to select the best design that better fits the requirements of good gamma generators with application to cyber-physical systems. We showed that the suggested approach allows generating gamma sequences with better quality than many others. It makes possible using this approach in new stream ciphers and applying them to ensure confidentiality of data transmission between different components of cyber-physical systems (CPS).
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Suh, S.C., Tanik, U.J., Carbone, J.N., Egorlu, A.: Applied Cyber-Physical Systems, 253 pp. Springer-Verlag, New York (2014)
Ali, S., Al Balushi, T., Nadir, Z., Hussain, O.K.: Cyber Security for Cyber-Physical Systems, 768 pp. Springer International Publishing (2018)
Kravets, A.G., Bolshakov, A.A., Schervakov, M.V. (eds.): Cyber-Physical Systems: Advances in Design & Modelling, 340 pp. Springer Nature Switzerland, (2020)
Krushel, E.A., Stepanchenko, I.V., Panfilov, A.E., Berisheva, E.D.: An experience of optimization approach application to improve the urban passenger transport structure. In: Kravets, A., Shcherbakov, M., Kultsova, M., Lijima, T. (eds.) Knowledge-Based Software Engineering, 11th Joint Conference, JCKBSE, pp. 27–39, Springer, Cham, Heidelberg, New York, Dordrecht, London (2014)
Paar, C., Peizl, J.: Understanding Cryptography, 372 pp. Springer-Verlag, Berlin, Heidelberg (2010)
Huang, S.C.H., MacCallum, D., Du D.: Network Security. Springer US, 280 p (2010)
Rueppel R.A.: Analysis and Design of Stream Ciphers, 244 pp. Berlin, Heidelberg, Springer-Verlag (1986)
Henk, C.A.V.T.: Fundamentals of Cryptology: A Professional Reference and Tutorial. The Springer International Series in Engineering and Computer Science, 2000th edition, 492 pp (1999)
Zimmermann, H.J.: Fuzzy Set Theory—And Its Applications, 2nd edn. Springer Science + Business Media, LLC, 408 pp (1991)
Trillas, E., Eciolaza, L.: Fuzzy logic, 204 pp. Springer International Publishing (2015)
Anikin, I.V., Alnajjar, K.: Fuzzy Stream Cipher System, International Siberian Conference on Control and Communications (SIBCON), Omsk, Russia (2015). https://doi.org/10.1109/sibcon.2015.7146976
Anikin, I.V., Alnajjar, K.: Pseudo-random Number Generator Based on Fuzzy Logic, International Siberian Conference on Control and Communications (SIBCON), Moscow, Russia (2016). https://doi.org/10.1109/SIBCON.2016.7491667
Anikin, I.V., Alnajjar, K.: Primitive Polynomials Selection Method for Pseudo-Random Number Generator Based on Fuzzy Logic. IEEE Dynamics of Systems, Mechanisms, and Machines (Dynamics), Omsk, Russia (2017)
Anikin, I.V., Alnajjar, K.: Increasing the quality of pseudo-random number generator based on fuzzy logic generator. J. Phys.: Conf. Ser. 1096(1), 012193 (2018)
Wasserstein, R.L., Lazar, N.A.: The ASA’s statement on p-values: context, process, and purpose. Am. Stat. 70(2), 129–133 (2016)
Knuth, D. E.: The Art of Computer Programming: Semi-numerical Algorithms, 624 pp. Addison-Wesley publishing company (1968)
Meidl, W., Niederreiter, H.: On the expected value of the linear complexity and the k-error linear complexity of periodic sequences. IEEE Trans. Inf. Theor. 48, 2817–2825 (2002)
Rueppel, R.A.: Analysis and Design of Stream Ciphers, 244 pp. Springer-Verlag, Berlin (1986)
Marsaglia, G.: DIEHARD: Battery of Tests of Randomness. Available: http://stat.fsu.edu/pub/diehard (1996)
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Vangel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. NIST Special Publication 800–22. http://csrc.nist.gov/rng/SP800-22b.pdf (2001)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this chapter
Cite this chapter
Anikin, I., Alnajjar, K. (2021). Secure Data Transmission in Cyber-Physical Systems Based on the New Approach for Stream Cipher’s Gamma Generation. In: Kravets, A.G., Bolshakov, A.A., Shcherbakov, M.V. (eds) Cyber-Physical Systems. Studies in Systems, Decision and Control, vol 350. Springer, Cham. https://doi.org/10.1007/978-3-030-67892-0_27
Download citation
DOI: https://doi.org/10.1007/978-3-030-67892-0_27
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-67891-3
Online ISBN: 978-3-030-67892-0
eBook Packages: EngineeringEngineering (R0)