<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Studies on the Computational Model of PRNG for Data Privacy Risk Mitigation in 5G Networks</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Al-Farabi Kazakh National University</institution>
          ,
          <addr-line>71 al-Farabi Ave., Almaty, 050040</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Dangara State University</institution>
          ,
          <addr-line>Markazi str. 25, Dangara, 735320</addr-line>
          ,
          <country country="TJ">Tajikistan</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>Kazakh Humanitarian Juridical Innovative University</institution>
          ,
          <addr-line>Lenin str, 11, Semey, 070000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>Kherson National Technical University</institution>
          ,
          <addr-line>Beryslavske shose 24, Kherson, 73008</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff4">
          <label>4</label>
          <institution>National Aviation University</institution>
          ,
          <addr-line>Liubomyra Huzara ave.1, Kyiv, 03058</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff5">
          <label>5</label>
          <institution>State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</institution>
          ,
          <addr-line>Maksyma Zalizniaka str.3/6, Kyiv, 03142</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff6">
          <label>6</label>
          <institution>Yessenov University</institution>
          ,
          <addr-line>microdistrict 32, Main building, Aktau, 130000</addr-line>
          ,
          <country country="KZ">Kazakhstan</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Today, pseudo-random number generators (PRNGs) are used in various systems and applications, including as key generators in stream ciphers, blockchain, game industry and others. The implementation of the latest information and communication technology (in particular, modern 5G networks) strengthens the requirements for privacy risk mitigation of critical data and forces the development of new methods and means for cryptographic security. In the paper, a computational model of PRNG was developed and studied. It allows to build efficient algorithms for privacy risk mitigation. Based on this model, software PRNGs have been developed and studied (speed and security parameters were verified). These will be useful for confidentiality ensuring and data privacy risk mitigation in modern 5G networks as well as blockchain technologies.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Computational Model</kwd>
        <kwd>PRNG</kwd>
        <kwd>Data Privacy</kwd>
        <kwd>Risk</kwd>
        <kwd>Algorithm</kwd>
        <kwd>5G Networks</kwd>
        <kwd>Blockchain</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        Today randomness is an important unit in many modern computer applications (especially
games, simulations, cryptography). Computers use a form of randomness known as pseudo
randomness, it means simulation of randomness. A pseudo random event looks random but is
completely predictable or deterministic (result of completely predictable mathematical
algorithm). Pseudo-random number generator (PRNG) can be used as key generator in stream
ciphers [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ] to form large key sequence with small input data of PRNG. This generator creates bit
sequence similar to random sequence by statistical parameters. In practice, these sequences are
not random and can be reproduced – key sequence should be as longer as possible and variable.
PRNG output must be the function of encryption key and it’s very important for privacy
ensuring. To generate random numbers by computer the hardware should be used (for example,
noise from semiconductor devices; bits of digitized sound from the microphone; intervals
between interruptions of external or internal devices; intervals between keystrokes; air
temperature on hardware components). New communication standard 5G has improved
requirements for confidentiality (privacy) as well as novel secure encryption algorithms and
PRNG should be developed (Fig. 1) [
        <xref ref-type="bibr" rid="ref2">2</xref>
        ].
      </p>
    </sec>
    <sec id="sec-2">
      <title>2. Related papers analysis</title>
      <p>
        Analysis of related papers in this direction [
        <xref ref-type="bibr" rid="ref3 ref4 ref5 ref6">3-6</xref>
        ] shows different approaches in PRNG creation
that influences on their characteristics and properties. There are two following categories of
PRNGs:
1) Cryptographically secure PRNG based on
 stream ciphers (Dragon-128, SEAL, RC4, RC5, RC6, Grain, Yamb, Phelix);
 block ciphers (AES, ANSI X9.17, DES),
 one way functions (BBS, RSA, Dual_EC_DRBG, GPSSD).
2) Cryptographically insecure PRNG based on
 elementary recurents (linear congruental generator, polinomyal congruental
generator, additive Fibonacci generator, lagged Fibonacci generator and others);
 operations in finite fields (Galois generator, De Bruijn generator, Golman generator
and others).
      </p>
      <p>
        Most up-to-date cryptographic applications require random numbers, for example key
generation, cryptographic nonces, salts in certain signature schemes, including ECDSA,
RSASSA-PSS. The security and privacy of 5G is better than in 4G (Fig. 2) [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] by using many
secure algorithms.
      </p>
    </sec>
    <sec id="sec-3">
      <title>3. The main part of the research study 3.1. Theoretical principles of the model construction</title>
      <p>
        On the basis of analysis, as a prototype of computational model well-known PRNG Trivium [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]
was chosen. Trivium is a synchronous stream cipher designed by cryptographers C. De Cannière
and B. Preneel to provide a flexible trade-off between speed and gate count in hardware, and
reasonably efficient software implementation. Trivium was one of the eSTREAM competition
winners and its recommended for using in modern communication networks as hardware unit.
To improve PRNG Trivium following modifications were proposed:
      </p>
      <p>1. Parameters n , t , e , k were specified and after their fixing new PRNG structure is
forming (capacity of operations is changing). All operations are performing not on the bits but on
the vectors of some size (bytes).</p>
      <p>2. To improve non-linearity parameters substitution operation S (x) was specified. For any
new formed PRNG new unique S (x) can be specified.</p>
      <p>3. To generate pseudo-random sequences PRNG internal status vector Ei , key vector for
sequence generation K and index of the current iteration of forming (generation) i are used.</p>
      <p>4. For generation function Fgen stage of variables initialization was modified, the dynamic
carry shift and substitution operations were specified.</p>
      <p>5. For generation function Fgen usage of independent functions FA , FB , FC and FD was
proposed, these functions depend on internal status vector of previous generation stage, key
vector K and index of current iteration of generation i . Output of the functions FA , FB , FC
and FD will be the data of necessary length (input and output data length will be different). For
any new formed PRNG new unique functions FA , FB , FC and FD can be specified. In fact,
these functions are independent byte-oriented PRNGs (without requirements for
cryptographically security), they can work in parallel. For synchronization and optimization of
sequence generation procedure the speed of sequence generation should be something like
similar.</p>
      <p>6. Final stage of sequence m forming and operation ordering were modified as well as the
substitution operation was specified.</p>
      <p>Various PRNGs can be constructed by modification / fixing parameters n , t , e , k as well
all specifying functions FA , FB , FC , FD and operation S ( x) .</p>
      <p>Computational model description</p>
      <p>Let n, t ∈ Z+ , then for generation pseudo-random sequence M , M ∈ V
with length N = n ⋅ t bits it is necessary to form t sequences with length n bit:
, V
N</p>
      <p>N
∈ {0,1}N</p>
      <p>M = ( m1, m2 , ..., mt−1, mt ) , mi ∈Vn , i =1, t .</p>
      <p>Process of generation every mi , mi ∈Vn , i =1, t performs in the following manner:
mi , Ei = Fgen ( Ei−1, K , i ) , i =1, t ,
where Ei is internal status vector of PRNG after generation i -th mi , Ei ∈Ve , e ∈ Z+ ,
E = IV , IV is initialization vector, IV ∈Ve , K is key vector for sequence generation,
0
K ∈Vk , k ∈ Z+ , Fgen is function of generation the sequence mi .</p>
      <sec id="sec-3-1">
        <title>Function Fgen ( E, K , i ) is performing by 2 following stages:</title>
        <p>1) variables initialization;
2) sequence forming.</p>
        <p>Stage 1 of function Fgen ( E, K , i ) performing. At the beginning the processing of internal
status vector is performing E , E ∈Ve :</p>
        <p>E</p>
        <p>=S ( E ) &lt;&lt;&lt; i ,
where x &lt;&lt;&lt; y is operation of right dynamic carry shift of argument x on y bits, S ( x) is
some substitution operation.</p>
        <p>Next the internal status vector E of PRNG and key vector K are disintegrated on 4
components:</p>
        <p>E = ( Ea , Eb , Ec , Ed ) , E ∈Ve , e = a + b + c + d ,
Ea ∈Va , Eb ∈Vb , Ec ∈Vc , Ed ∈Vd , a, b, c, d ∈ Z+ ,
K = ( Ka , Kb , Kc , Kd ) , K ∈V , k = a′ + b′ + c′ + d ′ ,</p>
        <p>k</p>
        <p>Ka ∈Va′ , Kb ∈Vb′ , Kc ∈Vc′ , Kd ∈Vd′ , a′, b′, c′, d ′ ∈ Z+ .</p>
        <p>Vectors Ea , Eb , Ec , Ed and Ka , Kb , Kc , Kd will be used in the next stage of the
function Fgen ( E, K , i ) .</p>
        <p>Stage 2 of function Fgen ( E, K , i ) . On this stage the forming of sequence m , m ∈Vn is
performing. For this objective 4 additional functions
FA ( Ea , Ka , i ) , FB ( Eb , Kb , i ) ,
FC ( Ec , Kc , i ) і FD ( Ed , Kd , i ) are using, where F , F , FC and FD are functions, that have
A B
internal status vector and key vector as input data, and sequence with length n bits as output
data. These functions can be constructed on the base of non-linear shift registers, block and
stream symmetric ciphers, hash functions and others.</p>
        <p>In this case, process of sequence m , m ∈Vn and new value of internal status vector E ,</p>
      </sec>
      <sec id="sec-3-2">
        <title>E ∈Ve generation in function Fgen ( E, K , i ) will be follow:</title>
        <p>Stage 1. Formation of additional vectors A , B , C і D and calculation of new values of
vectors Ea , Eb , Ec , Ed :</p>
        <p>Stage 2. Calculation of the new value internal status vector E , E ∈V :
e
Stage 3. Formation of the sequence m , m ∈V :</p>
        <p>n
A, Ea = FA ( Ea , Ka , i ) , A ∈Vn , Ea ∈Va ,
B, Eb = FB ( Eb , Kb , i ) , B ∈V , E ∈Vb ,</p>
        <p>n b
C, Ec = FC ( Ec , Kc , i ) , C ∈V , E ∈Vc ,</p>
        <p>n c
D, Ed = FD ( Ed , Kd , i ) , D ∈V , Ed ∈V .</p>
        <p>n d</p>
        <p>E = ( Eb , Ed , Ea , Ec ) .</p>
        <p>AB = A &lt;&lt;&lt; B , AB ∈V ,</p>
        <p>n
CD = C &lt;&lt;&lt; D , CD ∈V ,</p>
        <p>n
BC = B + CD , BC ∈V ,</p>
        <p>n
AD =AB ⊕ D , AD ∈V ,</p>
        <p>n
m =AD ⊕ S ( BC ) , m ∈V ,
n
where ⊕ і + are operations modulo addition 2 and 2n respectively, S ( x) is substitution
operation.</p>
        <p>Output of the function Fgen ( E, K , i ) will be vectors m , m ∈Vn and E , E ∈V :
e
( m, E ) = Fgen ( E, K , i ) .</p>
        <p>In this Section computational model of PRNG was described. Based on PRNG Trivium, this
model includes internal status vector and key vector processing, dynamic carry shift and 4
nonlinear functions. It allows to construct effective PRNGs for privacy ensuring in modern
communication networks (5G networks and others).</p>
        <p>3.2.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Software PRNG development</title>
      <p>On the basis of developed computational model 3 PRNGs 5Gen-1, 5Gen-2 and 5Gen-3 was
constructed:</p>
      <p>5Gen-1 was constructed with following set of parameters n = 128 , a = 128 , b = 100 ,
c = 111 , d = 173 , e = a + b + c + d = 512 , a′ = 128 , b′ = 128 , c′ = 128 , d ′ = 128 ,
k = a′ + b′ + c′ + d ′ = 512 . FA , FB , FC and FD are functions based on the non-linear shift
register. As substitution S ( x) the operation S ( x) = ( s0 ( x31 ), ..., s0 ( x0 )) was used, where
x j ∈ V16 , j = 0,31, S0 is the substitution on the set V16 .</p>
      <p>Substitution S0 is constructed with parameters, presented in Table 1.
5Gen-2 was constructed with following set of parameters n = 256 , a = 138 , b = 120 , c = 116 ,
d = 138 , e = a + b + c + d = 512 , a′ = 128 , b′ = 128 , c′ = 128 , d ′ = 128 ,
k = a′ + b′ + c′ + d ′ = 512 . FA , FB , FC and FD are functions based on the non-linear shift
register. As substitution S ( x) the operation S (x) = ( s7 ( x63 ) , ..., s0 ( x0 )) was used, where
x j ∈ V8 , j = 0,63 , Sb is substitution on the set V8 , b = 0,7 (by the order 8 different
substitution tables are using).</p>
      <p>Substitution Si , i = 0, 7 is constructed with parameters, presented in Tables 2-9.
Parameters for substitution table S1 construction for 5Gen-2 algorithm
{ 20, 40, 80, 1, 2, 4, 8, 10}
5Gen-3 was constructed with following set of parameters n = 128 , a = 128 , b = 128 , c = 128 ,
d = 128 , e = a + b + c + d = 512 , a′ = 128 , b′ = 128 , c′ = 128 , d ′ = 128 ,
k = a′ + b′ + c′ + d ′ = 512 . F , F , FC and FD are functions based on AES-128 algorithm. As</p>
      <p>A B
substitution S ( x) the operation S ( x) = ( s0 ( x63 ), ..., s0 ( x0 )) was used, where x j ∈ V8 ,
j = 0,63 , S0 − підстановка на множині V8 .</p>
      <p>Substitution S0 is constructed with parameters, presented in Tables 10.</p>
    </sec>
    <sec id="sec-5">
      <title>Experimental study and discussion</title>
      <sec id="sec-5-1">
        <title>Statistical parameters investigation</title>
        <p>
          Statistical parameters of developed PRNGs were investigated using traditional techniques
NIST STS [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ] and DIEHARD [13]. Given results were compared with testing results of
generator BBS as well as stream ciphers SNOW [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] and Trivium (used in 5G networks). NIST
STS are used to determine the qualitative and quantitative features of the sequences randomness.
Three basic criteria are used to draw conclusions about passing random sequences of statistical
tests are following:
 Criterion for decision-making based on the establishment of some threshold level.
 Criterion based on establishing a fixed confidence interval.
 Criterion for some appropriate statistical test probability value P-value.
        </p>
        <p>The statistical test is based on the verification of null hypothesis H0 – that the sequence under
study is random. Alternative hypothesis H1 is also provided – the sequence under study is not
random. Therefore, the generated sequence is examined by a set of tests, each of which
concludes whether the hypothesis H0 is rejected or accepted. For each test, adequate randomness
statistics are selected based on which the hypothesis H0 is further rejected or accepted.
Theoretically, the distribution of statistics for the null hypothesis is calculated using
mathematical methods. The critical value is then determined from such an exemplary
distribution. When performing the test, the value of the test statistic is calculated, which is
compared to the critical value. In case of exceeding the test critical value over the reference,
hypothesis H1 is accepted, otherwise – hypothesis H0.</p>
        <p>For the experiments, the following input parameters were selected for the use of NIST STS:
1. The length of the test sequence n=106 bit.
2. The number of sequences being tested m=100.
3. Significance level α = 0, 01 .</p>
        <p>4. Number of tests q=188, among them: Frequency − 1, Block Frequency − 1, Cumulative
Sums − 2, Runs − 1, Longest Run − 1, Rank − 1, FFT − 1, Non Overlapping Template − 148,
Overlapping Template − 1, Universal − 1, Approximate Entropy − 1, Random Excursions − 8,
Random Excursions Variant − 18, Serial − 2, Linear Complexity − 1.</p>
        <p>The confidence interval rule was applied, the lower bound being 0.96015. For every
algorithms 10 files with sequences (100 Mbit) and investigated by NIST STS technique.</p>
        <p>
          The results of testing are presented on Fig. 3-5.
Also developed algorithms were investigated by DIEHARD technique (one of the best practice
and traditional approach in cryptography for measuring quality of PRNG and statistical security).
Results of testing for 5Gen-3 algorithms presented on Fig. 6 (other two algorithms 5Gen-1 and
5Gen-2 showed 100% results).
Results presented on Fig. 3-5 as well as detail experimental data (Table 11) show that developed
algorithms 5Gen-1, 5Gen-2 and 5Gen-3 have passed complex control by NIST STS technique
and show better results (in some cases) than existed and well-known algorithms [
          <xref ref-type="bibr" rid="ref11">11-12</xref>
          ].
        </p>
        <p>Results presented on Fig. 6 show that developed algorithms have passed complex security
control by DIEHARD technique as well as verified good quality of PRNG and statistical security
of potential systems based on these algorithms [14-16].</p>
      </sec>
      <sec id="sec-5-2">
        <title>Speed parameters investigation</title>
        <p>For investigation developed PRNGs 5Gen-1, 5Gen-2, 5Gen-3 were realized as software tools
using programming language С++. Given results were compared with results of well-known
SNOW generator. Experimental study was carried out using work station Intel Core i3-3220
3.3GHz and files with different size. Average results are presented on the Table 12.
As we can see from Table 12 speed of the developed algorithms are higher in comparison with
SNOW till 21% outside two results of 5Gen-3 algorithm.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>4. Conclusions</title>
      <p>In this paper analysis of different approaches in PRNG creation and implementation was carried
out. Two categories of PRNGs were defined (cryptographically secure and cryptographically
insecure) as well cryptographic applications that require random numbers were defined (key
generation, cryptographic nonces, salts in certain signature schemes). But there are many
relevant tasks related with data privacy risk mitigation and confidentiality ensuring in 4G/5G
that can be solved by advanced PRNG development and implementation.</p>
      <p>Computational model of PRNG was developed. Based on PRNG Trivium, this model
includes internal status vector and key vector processing, dynamic carry shift and 4 non-linear
functions. It allows to construct effective PRNGs for data privacy risk mitigation in modern
communication networks (5G networks and others).</p>
      <p>On the basis of developed computational model 3 PRNGs 5Gen-1, 5Gen-2 and 5Gen-3 was
constructed and realized as software tools. These PRNGs have passed complex statistical testing
by NIST STS technique as well as speed parameters investigation (developed algorithms are
higher in comparison with SNOW till 21%).</p>
      <p>Additionally, developed algorithms were investigated by DIEHARD technique (one of the
best practice and traditional approach in cryptography for measuring quality of PRNG and
statistical security). These algorithms have passed complex security control by DIEHARD
technique as well as verified good quality of PRNG and statistical security of potential systems
based on these algorithms.</p>
    </sec>
    <sec id="sec-7">
      <title>References</title>
      <p>[12] J.M.Mcginthy, A.J.Michaels, Further Analysis of PRNG-Based Key Derivation Functions,</p>
      <p>IEEE Access, vol. 7, 2019, pp. 95978-95986
[13] P.S.Paul, M.Sadia, M.S.Hasan, Design of a Dynamic Parameter-Controlled Chaotic-PRNG
in a 65 nm CMOS process, IEEE 14th Dallas Circuits and Systems Conference (DCAS),
2020, pp. 1-4, doi: 10.1109/DCAS51144.2020.9330647
[14] Z.Hua, Y.Zhou, One-Dimensional Nonlinear Model for Producing Chaos, in IEEE
Transactions on Circuits and Systems I: Regular Papers, vol. 65, no. 1, 2018, pp. 235-246,
Jan. doi: 10.1109/TCSI.2017.2717943
[15] M.Iavich, A.Gagnidze, G.Iashvili, S.Gnatyuk, V.Vialkova, Lattice based Merkle, CEUR</p>
      <p>Workshop Proceedings, vol. 2470, 2019, pp. 13-16
[16] S.Ergün, Security analysis of a random number generator based on a double-scroll chaotic
circuit”, 16th International Symposium on Communications and Information Technologies
(ISCIT), 2016, pp. 123-126, doi: 10.1109/ISCIT.2016.7751605</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>Z.</given-names>
            <surname>Hu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Okhrimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>S.</given-names>
            <surname>Tynymbayev</surname>
          </string-name>
          ,
          <string-name>
            <surname>M.</surname>
          </string-name>
          <article-title>Iavich, High-speed and secure PRNG for cryptographic applications</article-title>
          ,
          <source>International Journal of Computer Network and Information Security</source>
          , Volume
          <volume>12</volume>
          ,
          <string-name>
            <surname>Issue</surname>
            <given-names>3</given-names>
          </string-name>
          ,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>Security</given-names>
            <surname>Comparison</surname>
          </string-name>
          <article-title>Between Wi-Fi 6 and 5G</article-title>
          , https://forum.huawei.com/ enterprise/en/security
          <article-title>-comparison-between-wi-fi-6-and</article-title>
          -5g/thread/615836-
          <fpage>869</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>S.</given-names>
            <surname>Yevseyev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Koroliov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Krasnyanska</surname>
          </string-name>
          ,
          <article-title>Analysis of current methods of generating pseudorandom sequences</article-title>
          ,
          <source>Eastern-European Journal of Advanced Technology</source>
          ,
          <volume>3</volume>
          /4 (
          <issue>45</issue>
          ),
          <year>2010</year>
          , pр.
          <fpage>11</fpage>
          -
          <lpage>15</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>W.Z.</given-names>
            <surname>Yang</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Z.J.</given-names>
            <surname>Zheng</surname>
          </string-name>
          ,
          <source>PRNG based on the variant logic” 7th International Conference on Communications and Networking in China</source>
          ,
          <year>2012</year>
          , pp.
          <fpage>202</fpage>
          -
          <lpage>205</lpage>
          , doi: 10.1109/ChinaCom.
          <year>2012</year>
          .6417476
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>R.</given-names>
            <surname>Hobincu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>O.</given-names>
            <surname>Datcu</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Macovei</surname>
          </string-name>
          ,
          <article-title>Entropy global control for a chaos based PRNG</article-title>
          ,
          <source>42nd International Conference on Telecommunications and Signal Processing (TSP)</source>
          ,
          <year>2019</year>
          , pp.
          <fpage>432</fpage>
          -
          <lpage>435</lpage>
          , doi: 10.1109/TSP.
          <year>2019</year>
          .8768818
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>Y.S.S.</given-names>
            <surname>Risqi</surname>
          </string-name>
          ,
          <string-name>
            <surname>S.</surname>
          </string-name>
          <article-title>Windarta, tatistical test on lightweight block cipher-based PRNG</article-title>
          ,
          <source>11th International Conference on Telecommunication Systems Services and Applications (TSSA)</source>
          ,
          <year>2017</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>4</lpage>
          , doi: 10.1109/TSSA.
          <year>2017</year>
          .8272925
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[7] 5G security is fundamentally better than LTE security but the attack surface is massively</article-title>
          increased, https://www.rcrwireless.com/20200416/5g/huawei-cto
          <string-name>
            <surname>-</surname>
          </string-name>
          5g
          <string-name>
            <surname>-</surname>
          </string-name>
          securiuty-standards
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>C.De Cannière</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          <string-name>
            <surname>Preneel</surname>
          </string-name>
          , TRIVIUM - Specifications, eSTREAM,
          <source>ECRYPT Stream Cipher Project, Report 2005/030</source>
          (
          <year>2005</year>
          ), http://www.ecrypt.eu.org/stream
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>NIST</surname>
            <given-names>STS</given-names>
          </string-name>
          ,
          <article-title>Download documentation</article-title>
          and software https://github.com/kravietz/nist-sts
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>P.</given-names>
            <surname>Ekdahl</surname>
          </string-name>
          , T. Johansson,
          <string-name>
            <surname>SNOW.</surname>
          </string-name>
          <article-title>A new stream cipher</article-title>
          ,
          <source>Proceedings of the First NESSIE Workshop</source>
          , NESSIE,
          <year>2000</year>
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <given-names>S.</given-names>
            <surname>Gnatyuk</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T.</given-names>
            <surname>Okhrimenko</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Fesenko</surname>
          </string-name>
          et al,
          <article-title>Experimental Study of Secure PRNG for Qtrits Quantum Cryptography Protocols</article-title>
          ,
          <source>Proceedings of the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT</source>
          <year>2020</year>
          ), Kyiv, Ukraine, May
          <volume>14</volume>
          ,
          <year>2020</year>
          , pp.
          <fpage>183</fpage>
          -
          <lpage>188</lpage>
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>