<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">Studies on the Computational Model of PRNG for Data Privacy Risk Mitigation in 5G Networks</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author>
							<persName><forename type="first">Sergiy</forename><surname>Gnatyuk</surname></persName>
							<email>s.gnatyuk@yu.edu.kz</email>
							<affiliation key="aff0">
								<orgName type="institution">Yessenov University</orgName>
								<address>
									<addrLine>microdistrict 32, Main building</addrLine>
									<postCode>130000</postCode>
									<settlement>Aktau</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
							<affiliation key="aff1">
								<orgName type="institution">National Aviation University</orgName>
								<address>
									<addrLine>Liubomyra Huzara ave.1</addrLine>
									<postCode>03058</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
							<affiliation key="aff2">
								<orgName type="department">State Scientific and Research Institute of Cybersecurity Technologies and Information Protection</orgName>
								<address>
									<addrLine>Maksyma Zalizniaka str.3/6</addrLine>
									<postCode>03142</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Dinara</forename><surname>Ospanova</surname></persName>
							<affiliation key="aff3">
								<orgName type="institution">Kazakh Humanitarian Juridical Innovative University</orgName>
								<address>
									<addrLine>Lenin str, 11</addrLine>
									<postCode>070000</postCode>
									<settlement>Semey</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Lytvynenko</surname></persName>
							<affiliation key="aff4">
								<orgName type="institution">Kherson National Technical University</orgName>
								<address>
									<addrLine>Beryslavske shose 24</addrLine>
									<postCode>73008</postCode>
									<settlement>Kherson</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Zhazira</forename><surname>Amirgaliyeva</surname></persName>
							<email>zh.amirgaliyeva@gmail.com</email>
							<affiliation key="aff5">
								<orgName type="institution">Al-Farabi Kazakh National University</orgName>
								<address>
									<addrLine>71 al-Farabi Ave</addrLine>
									<postCode>050040</postCode>
									<settlement>Almaty</settlement>
									<country key="KZ">Kazakhstan</country>
								</address>
							</affiliation>
						</author>
						<author>
							<persName><forename type="first">Nurali</forename><forename type="middle">Nabot</forename><surname>Shohiyon</surname></persName>
							<affiliation key="aff6">
								<orgName type="institution">Dangara State University</orgName>
								<address>
									<addrLine>Markazi str. 25</addrLine>
									<postCode>735320</postCode>
									<settlement>Dangara</settlement>
									<country key="TJ">Tajikistan</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">Studies on the Computational Model of PRNG for Data Privacy Risk Mitigation in 5G Networks</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">B65B1B7F70F856BBFA293F7D357682E1</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-19T16:27+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>Computational Model, PRNG, Data Privacy, Risk, Algorithm, 5G Networks, Blockchain (N.N.Shohiyon) ORCID: 0000-0003-4992-0564 (S.Gnatyuk)</term>
					<term>0000-0002-2206-7367 (D.Ospanova)</term>
					<term>0000-0002-1536-5542 (V.Lytvynenko)</term>
					<term>0000-0003-0484-8060 (Z.Amirgaliyeva)</term>
					<term>0000-0003-2843-0945 (N.N.Shohiyon)</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>Today, pseudo-random number generators (PRNGs) are used in various systems and applications, including as key generators in stream ciphers, blockchain, game industry and others. The implementation of the latest information and communication technology (in particular, modern 5G networks) strengthens the requirements for privacy risk mitigation of critical data and forces the development of new methods and means for cryptographic security. In the paper, a computational model of PRNG was developed and studied. It allows to build efficient algorithms for privacy risk mitigation. Based on this model, software PRNGs have been developed and studied (speed and security parameters were verified). These will be useful for confidentiality ensuring and data privacy risk mitigation in modern 5G networks as well as blockchain technologies.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Today randomness is an important unit in many modern computer applications (especially games, simulations, cryptography). Computers use a form of randomness known as pseudo randomness, it means simulation of randomness. A pseudo random event looks random but is completely predictable or deterministic (result of completely predictable mathematical algorithm). Pseudo-random number generator (PRNG) can be used as key generator in stream ciphers <ref type="bibr" target="#b0">[1]</ref> to form large key sequence with small input data of PRNG. This generator creates bit sequence similar to random sequence by statistical parameters. In practice, these sequences are not random and can be reproduced -key sequence should be as longer as possible and variable. PRNG output must be the function of encryption key and it's very important for privacy ensuring. To generate random numbers by computer the hardware should be used (for example, noise from semiconductor devices; bits of digitized sound from the microphone; intervals between interruptions of external or internal devices; intervals between keystrokes; air temperature on hardware components). New communication standard 5G has improved requirements for confidentiality (privacy) as well as novel secure encryption algorithms and PRNG should be developed (Fig. <ref type="figure" target="#fig_0">1</ref>) <ref type="bibr" target="#b1">[2]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Related papers analysis</head><p>Analysis of related papers in this direction <ref type="bibr" target="#b2">[3]</ref><ref type="bibr" target="#b3">[4]</ref><ref type="bibr" target="#b4">[5]</ref><ref type="bibr" target="#b5">[6]</ref> shows different approaches in PRNG creation that influences on their characteristics and properties. There are two following categories of PRNGs: Most up-to-date cryptographic applications require random numbers, for example key generation, cryptographic nonces, salts in certain signature schemes, including ECDSA, RSASSA-PSS. The security and privacy of 5G is better than in 4G (Fig. <ref type="figure" target="#fig_1">2</ref>) <ref type="bibr" target="#b6">[7]</ref> by using many secure algorithms. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">The main part of the research study</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Theoretical principles of the model construction</head><p>On the basis of analysis, as a prototype of computational model well-known PRNG Trivium <ref type="bibr" target="#b7">[8]</ref> was chosen. Trivium is a synchronous stream cipher designed by cryptographers C. De Cannière and B. Preneel to provide a flexible trade-off between speed and gate count in hardware, and reasonably efficient software implementation. Trivium was one of the eSTREAM competition winners and its recommended for using in modern communication networks as hardware unit. To improve PRNG Trivium following modifications were proposed:</p><p>1. Parameters n , t , e , k were specified and after their fixing new PRNG structure is forming (capacity of operations is changing). All operations are performing not on the bits but on the vectors of some size (bytes).</p><p>2. To improve non-linearity parameters substitution operation ( ) S x was specified. For any new formed PRNG new unique ( ) S x can be specified.</p><p>3. To generate pseudo-random sequences PRNG internal status vector i E , key vector for sequence generation K and index of the current iteration of forming (generation) i are used. 4. For generation function gen F stage of variables initialization was modified, the dynamic carry shift and substitution operations were specified. </p><formula xml:id="formula_0">S x . Computational model description Let , n t Z + ∈ , then for generation pseudo-random sequence M , M V N ∈ , { } 0,1 N V N ∈ with length N n t</formula><p>= ⋅ bits it is necessary to form t sequences with length n bit: ( )</p><formula xml:id="formula_1">1 2 1</formula><p>, , ..., ,</p><formula xml:id="formula_2">t t M m m m m − = , i n m V ∈ , 1, i t = .</formula></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Process of generation every</head><formula xml:id="formula_3">i m , i n m V ∈ , 1, i t =</formula><p>performs in the following manner:</p><formula xml:id="formula_4">( ) 1 , , , i i gen i m E F E K i − = , 1, i t = ,</formula><p>where i E is internal status vector of PRNG after generation i</p><formula xml:id="formula_5">-th i m , i e E V ∈ , e Z + ∈ , 0 E IV = , IV is initialization vector, e IV V ∈ , K is key vector for sequence generation, k K V ∈ , k Z + ∈ , gen F is function of generation the sequence i m . Function ( ) , ,</formula><p>gen F E K i is performing by 2 following stages:</p><p>1) variables initialization;</p><p>2) sequence forming.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Stage 1 of function ( )</head><p>, ,</p><p>gen F E K i performing. At the beginning the processing of internal status vector is performing E , e E V ∈ :</p><p>( )</p><formula xml:id="formula_6">E S E i = &lt;&lt;&lt; ,</formula><p>where x y &lt;&lt;&lt; is operation of right dynamic carry shift of argument x on y bits, ( ) S x is some substitution operation. Next the internal status vector E of PRNG and key vector K are disintegrated on 4 components:</p><formula xml:id="formula_7">( ) , , , a b c d E E E E E = , e E V ∈ , e a b c d = + + + , a a E V ∈ , b b E V ∈ , c c E V ∈ , d d E V ∈ , , , , a b c d Z + ∈ , ( ) , ,<label>,</label></formula><formula xml:id="formula_8">a b c d K K K K K = , k K V ∈ , k a b c d ′ ′ ′ ′ = + + + , a a K V ′ ∈ , b b K V ′ ∈ , c c K V ′ ∈ , d d K V ′ ∈ , , , , a b c d Z + ′ ′ ′ ′∈ . Vectors a E , b E , c E , d E and a K , b K , c K , d K will be used in the next stage of the function ( ) , , gen F E K i . Stage 2 of function ( ) , ,</formula><p>gen F E K i . On this stage the forming of sequence m , n m V ∈ is performing. For this objective 4 additional functions ( )</p><formula xml:id="formula_9">, , A a a F E K i , ( ) , , B b b F E K i , ( ) , , C c c F E K i і ( ) , , D d d</formula><p>F E K i are using, where A F , B F , C F and D F are functions, that have internal status vector and key vector as input data, and sequence with length n bits as output data. These functions can be constructed on the base of non-linear shift registers, block and stream symmetric ciphers, hash functions and others.</p><p>In this case, process of sequence m , </p><formula xml:id="formula_10">vectors a E , b E , c E , d E : ( ) , , , a A a a A E F E K i = , n A V ∈ , a a E V ∈ , ( ) , , , b B b b B E F E K i = , n B V ∈ , b b E V ∈ , ( ) , , , c C c c C E F E K i = , n C V ∈ , c c E V ∈ , ( ) , ,<label>,</label></formula><formula xml:id="formula_11">d D d d D E F E K i = , n D V ∈ , d d E V ∈ .</formula><p>Stage 2. Calculation of the new value internal status vector E ,</p><formula xml:id="formula_12">e E V ∈ : ( ) , , , b d a c E E E E E = . Stage 3. Formation of the sequence m , n m V ∈ : AB A B = &lt;&lt;&lt; , n AB V ∈ , CD C D = &lt;&lt;&lt; , n CD V ∈ , BC B CD = + , n BC V ∈ , AD AB D = ⊕ , n AD V ∈ , (<label>)</label></formula><formula xml:id="formula_13">m AD S BC = ⊕ , n m V ∈ ,</formula><p>where ⊕ і + are operations modulo addition 2 and 2 n respectively, ( ) </p><formula xml:id="formula_14">S</formula><formula xml:id="formula_15">( ) ( ) , , , gen m E F E K i = .</formula><p>In this Section computational model of PRNG was described. Based on PRNG Trivium, this model includes internal status vector and key vector processing, dynamic carry shift and 4 nonlinear functions. It allows to construct effective PRNGs for privacy ensuring in modern communication networks (5G networks and others).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Software PRNG development</head><p>On the basis of developed computational model 3 PRNGs 5Gen-1, 5Gen-2 and 5Gen-3 was constructed:</p><p>5Gen (by the order 8 different substitution tables are using).</p><p>Substitution S i , 0,7 i = is constructed with parameters, presented in Tables <ref type="table" target="#tab_11">2-9</ref>.        </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Experimental study and discussion</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Statistical parameters investigation</head><p>Statistical parameters of developed PRNGs were investigated using traditional techniques NIST STS <ref type="bibr" target="#b8">[9]</ref> and DIEHARD <ref type="bibr" target="#b12">[13]</ref>. Given results were compared with testing results of generator BBS as well as stream ciphers SNOW <ref type="bibr" target="#b9">[10]</ref> and Trivium (used in 5G networks). NIST STS are used to determine the qualitative and quantitative features of the sequences randomness. Three basic criteria are used to draw conclusions about passing random sequences of statistical tests are following:</p><p> Criterion for decision-making based on the establishment of some threshold level.  Criterion based on establishing a fixed confidence interval.  Criterion for some appropriate statistical test probability value P-value.</p><p>The statistical test is based on the verification of null hypothesis H0 -that the sequence under study is random. Alternative hypothesis H1 is also provided -the sequence under study is not random. Therefore, the generated sequence is examined by a set of tests, each of which concludes whether the hypothesis H0 is rejected or accepted. For each test, adequate randomness statistics are selected based on which the hypothesis H0 is further rejected or accepted. Theoretically, the distribution of statistics for the null hypothesis is calculated using mathematical methods. The critical value is then determined from such an exemplary distribution. When performing the test, the value of the test statistic is calculated, which is compared to the critical value. In case of exceeding the test critical value over the reference, hypothesis H1 is accepted, otherwise -hypothesis H0.</p><p>For the experiments, the following input parameters were selected for the use of NIST STS:</p><p>1. The length of the test sequence n=10 6 bit.</p><p>2. The number of sequences being tested m=100. The confidence interval rule was applied, the lower bound being 0.96015. For every algorithms 10 files with sequences (100 Mbit) and investigated by NIST STS technique.</p><p>The results of testing are presented on Fig. <ref type="figure">3-5</ref>.  Results presented on Fig. <ref type="figure">3</ref>-5 as well as detail experimental data (Table <ref type="table" target="#tab_13">11</ref>) show that developed algorithms 5Gen-1, 5Gen-2 and 5Gen-3 have passed complex control by NIST STS technique and show better results (in some cases) than existed and well-known algorithms <ref type="bibr" target="#b10">[11]</ref><ref type="bibr" target="#b11">[12]</ref>. Results presented on Fig. <ref type="figure" target="#fig_5">6</ref> show that developed algorithms have passed complex security control by DIEHARD technique as well as verified good quality of PRNG and statistical security of potential systems based on these algorithms <ref type="bibr" target="#b13">[14]</ref><ref type="bibr" target="#b14">[15]</ref><ref type="bibr" target="#b15">[16]</ref>. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Speed parameters investigation</head><p>For investigation developed PRNGs 5Gen-1, 5Gen-2, 5Gen-3 were realized as software tools using programming language С++. Given results were compared with results of well-known SNOW generator. Experimental study was carried out using work station Intel Core i3-3220 3.3GHz and files with different size. Average results are presented on the Table <ref type="table" target="#tab_14">12</ref>. As we can see from Table <ref type="table" target="#tab_14">12</ref> speed of the developed algorithms are higher in comparison with SNOW till 21% outside two results of 5Gen-3 algorithm.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Conclusions</head><p>In this paper analysis of different approaches in PRNG creation and implementation was carried out. Two categories of PRNGs were defined (cryptographically secure and cryptographically insecure) as well cryptographic applications that require random numbers were defined (key generation, cryptographic nonces, salts in certain signature schemes). But there are many relevant tasks related with data privacy risk mitigation and confidentiality ensuring in 4G/5G that can be solved by advanced PRNG development and implementation. Computational model of PRNG was developed. Based on PRNG Trivium, this model includes internal status vector and key vector processing, dynamic carry shift and 4 non-linear functions. It allows to construct effective PRNGs for data privacy risk mitigation in modern communication networks (5G networks and others).</p><p>On the basis of developed computational model 3 PRNGs 5Gen-1, 5Gen-2 and 5Gen-3 was constructed and realized as software tools. These PRNGs have passed complex statistical testing by NIST STS technique as well as speed parameters investigation (developed algorithms are higher in comparison with SNOW till 21%).</p><p>Additionally, developed algorithms were investigated by DIEHARD technique (one of the best practice and traditional approach in cryptography for measuring quality of PRNG and statistical security). These algorithms have passed complex security control by DIEHARD technique as well as verified good quality of PRNG and statistical security of potential systems based on these algorithms.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Privacy ensuring procedures in different network communication standards</figDesc><graphic coords="2,89.65,184.59,453.50,135.95" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: 4G/5G encryption comparison But there are many relevant tasks related with data privacy ensuring in 4G/5G that can be solved by PRNG development and implementation. From this viewpoint, the main target of this paper is development and study of the computational model of PRNG for data privacy risk mitigation in 5G networks.</figDesc><graphic coords="3,105.70,80.80,393.24,128.83" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Stage 1 .</head><label>1</label><figDesc>and new value of internal status vector E , i will be follow: Formation of additional vectors A , B , C і D and calculation of new values of</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>4 .</head><label>4</label><figDesc>Number of tests q=188, among them: Frequency − 1, Block Frequency − 1, Cumulative Sums − 2, Runs − 1, Longest Run − 1, Rank − 1, FFT − 1, Non Overlapping Template − 148, Overlapping Template − 1, Universal − 1, Approximate Entropy − 1, Random Excursions − 8, Random Excursions Variant − 18, Serial − 2, Linear Complexity − 1.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 3 :Figure 4 :Figure 5 :</head><label>345</label><figDesc>Figure 3: Statistical portrait of 5Gen-1 algorithm by NIST STS technique</figDesc><graphic coords="8,171.05,545.54,262.09,123.94" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: Statistical testing results of 5Gen-3 algorithm by DIEHARD technique</figDesc><graphic coords="9,199.55,451.40,205.41,195.85" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_1"><head></head><label></label><figDesc>, they can work in parallel. For synchronization and optimization of sequence generation procedure the speed of sequence generation should be something like similar.6. Final stage of sequence m forming and operation ordering were modified as well as the substitution operation was specified.Various PRNGs can be constructed by modification / fixing parameters n , t , e , k as well</figDesc><table><row><cell>cryptographically security)all specifying functions A F , B F , C F , D F and operation ( )</cell></row><row><cell>5. For generation function gen F usage of independent functions A F , B F , C F and D F was</cell></row><row><cell>proposed, these functions depend on internal status vector of previous generation stage, key</cell></row><row><cell>vector K and index of current iteration of generation i . Output of the functions A F , B F , C F</cell></row><row><cell>and D F will be the data of necessary length (input and output data length will be different). For</cell></row><row><cell>any new formed PRNG new unique functions A F , B F , C F and D F can be specified. In fact,</cell></row><row><cell>these functions are independent byte-oriented PRNGs (without requirements for</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_3"><head>Table 1 .</head><label>1</label><figDesc></figDesc><table><row><cell></cell><cell></cell><cell cols="11">-1 was constructed with following set of parameters</cell><cell cols="2">n =</cell><cell cols="2">128</cell><cell>,</cell><cell cols="2">a =</cell><cell cols="2">128</cell><cell>,</cell><cell>b =</cell><cell>100</cell><cell>,</cell></row><row><cell>c =</cell><cell>111</cell><cell>,</cell><cell>d =</cell><cell>173</cell><cell>,</cell><cell>e a b c d = + + + =</cell><cell>512</cell><cell>,</cell><cell>a′ =</cell><cell>128</cell><cell>,</cell><cell cols="2">b′ =</cell><cell cols="2">128</cell><cell>,</cell><cell cols="2">c′ =</cell><cell cols="2">128</cell><cell>,</cell><cell>d′ =</cell><cell>128</cell><cell>,</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_4"><head>Table 2</head><label>2</label><figDesc>Parameters for substitution table0</figDesc><table><row><cell cols="2">S construction for 5Gen-2 algorithm</cell><cell></cell></row><row><cell>M</cell><cell>C</cell><cell>V</cell></row><row><cell>{ 29, 52, A4, 49, 92, 25, 4a, 94 }</cell><cell>07</cell><cell>D8</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_5"><head>Table 3</head><label>3</label><figDesc>Parameters for substitution table1</figDesc><table><row><cell cols="2">S construction for 5Gen-2 algorithm</cell><cell></cell></row><row><cell>M</cell><cell>C</cell><cell>V</cell></row><row><cell>{ 70, E0, C1, 83, 7, E, 1C, 38 }</cell><cell>A2</cell><cell>44</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_6"><head>Table 4</head><label>4</label><figDesc>Parameters for substitution table 2S construction for 5Gen-2 algorithm</figDesc><table><row><cell>M</cell><cell>C</cell><cell>V</cell></row><row><cell>{ 3E, 7C, F8, F1, E3, C7, 8F, 1F }</cell><cell>72</cell><cell></cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_7"><head>Table 5</head><label>5</label><figDesc>Parameters for substitution table 3S construction for 5Gen-2 algorithm</figDesc><table><row><cell>M</cell><cell>C</cell><cell>V</cell></row><row><cell>{ E3, C7, 8F, 1F, 3E, 7C, F8, F1 }</cell><cell>43</cell><cell>9B</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_8"><head>Table 6</head><label>6</label><figDesc>Parameters for substitution table4</figDesc><table><row><cell cols="2">S construction for 5Gen-2 algorithm</cell><cell></cell></row><row><cell>M</cell><cell>C</cell><cell>V</cell></row><row><cell>{ E5, CB, 97, 2F, 5E, BC, 79, F2 }</cell><cell>A0</cell><cell>8C</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_9"><head>Table 7</head><label>7</label><figDesc>Parameters for substitution table 5S construction for 5Gen-2 algorithm</figDesc><table><row><cell>M</cell><cell>C</cell><cell>V</cell></row><row><cell>{ AB, 57, AE, 5D, BA, 75, EA, D5 }</cell><cell>7B</cell><cell>C6</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_10"><head>Table 8</head><label>8</label><figDesc>Parameters for substitution table 6S construction for 5Gen-2 algorithm</figDesc><table><row><cell>M</cell><cell>C</cell><cell>V</cell></row><row><cell>{ 91, 23, 46, 8C, 19, 32, 64, C8 }</cell><cell>ED</cell><cell>B0</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_11"><head>Table 9</head><label>9</label><figDesc>Parameters for substitution table 7S construction for 5Gen-2 algorithm</figDesc><table><row><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>M</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>C</cell><cell>V</cell></row><row><cell></cell><cell></cell><cell></cell><cell></cell><cell cols="8">{ F8, F1, E3, C7, 8F, 1F, 3E, 7C}</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell>18</cell><cell>75</cell></row><row><cell cols="14">5Gen-3 was constructed with following set of parameters</cell><cell>n =</cell><cell cols="2">128</cell><cell>,</cell><cell>a =</cell><cell>128</cell><cell>,</cell><cell>b =</cell><cell>128</cell><cell>,</cell><cell>c =</cell><cell>128</cell><cell>,</cell></row><row><cell>d =</cell><cell>128</cell><cell cols="2">,</cell><cell cols="3">e a b c d = + + + =</cell><cell>512</cell><cell>,</cell><cell></cell><cell></cell><cell>a′ =</cell><cell>128</cell><cell>,</cell><cell>b′ =</cell><cell cols="2">128</cell><cell>,</cell><cell>c′ =</cell><cell>128</cell><cell>,</cell><cell>d′ =</cell><cell>128</cell><cell>,</cell></row><row><cell cols="5">k a b c d ′ ′ ′ = + + + = ′</cell><cell>512</cell><cell cols="13">. A F , B F , C F and D F are functions based on AES-128 algorithm. As</cell></row><row><cell cols="7">substitution ( ) S x the operation</cell><cell cols="2">( ) S x</cell><cell>=</cell><cell>(</cell><cell cols="2">( ) 63 s x 0</cell><cell>, ...,</cell><cell cols="2">( ) 0 s x 0</cell><cell cols="2">)</cell><cell>was used, where</cell><cell>x</cell><cell>8 V j ∈ ,</cell></row><row><cell>j =</cell><cell cols="2">0,63</cell><cell cols="9">, 0 S − підстановка на множині 8 V .</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell cols="19">Substitution 0 S is constructed with parameters, presented in Tables 10.</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_12"><head>Table 10</head><label>10</label><figDesc></figDesc><table><row><cell cols="2">Parameters for substitution table 0 S construction for 5Gen-3 algorithm</cell><cell></cell></row><row><cell>M</cell><cell>C</cell><cell>V</cell></row><row><cell>{ 20, 40, 80, 1, 2, 4, 8, 10}</cell><cell>59</cell><cell>6B</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_13"><head>Table 11</head><label>11</label><figDesc></figDesc><table><row><cell cols="2">Results of statistical parameters investigation by NIST STS technique</cell><cell></cell></row><row><cell>PRNG</cell><cell cols="2">Test total amount, where passed 99% sequences 96% sequences</cell></row><row><cell>BBS</cell><cell>133.4 (70.96%)</cell><cell>188 (100%)</cell></row><row><cell>SNOW</cell><cell>134.8 (71.70%)</cell><cell>188 (100%)</cell></row><row><cell>Trivium</cell><cell>130.1 (69.20%)</cell><cell>187.6 (99.78%)</cell></row><row><cell>5Gen-1</cell><cell>134.1 (71,32%)</cell><cell>188 (100%)</cell></row><row><cell>5Gen-2</cell><cell>136.4 (72,55%)</cell><cell>187.8 (99.89%)</cell></row><row><cell>5Gen-3</cell><cell>137.3 (73,03%)</cell><cell>188 (100%)</cell></row></table></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_14"><head>Table 12</head><label>12</label><figDesc></figDesc><table><row><cell cols="2">Results of speed parameters investigation</cell><cell></cell><cell></cell><cell></cell><cell></cell><cell></cell></row><row><cell>PRNG</cell><cell cols="2">File 1, 1 МB t ,s v , МB/s</cell><cell cols="2">File 2, 10 МB t ,s v , МB/s</cell><cell cols="2">File, 100 МB t ,s v , МB/s</cell></row><row><cell>SNOW</cell><cell>0.011</cell><cell>90.91</cell><cell>0.107</cell><cell>93.46</cell><cell>1.01</cell><cell>99.01</cell></row><row><cell>5Gen-1</cell><cell>0.009</cell><cell>111.11</cell><cell>0.091</cell><cell>109.89</cell><cell>0.88</cell><cell>113.64</cell></row><row><cell>5Gen-2</cell><cell>0.010</cell><cell>100.00</cell><cell>0.098</cell><cell>102.04</cell><cell>0.92</cell><cell>108.70</cell></row><row><cell>5Gen-3</cell><cell>0.014</cell><cell>71.43</cell><cell>0.112</cell><cell>89.29</cell><cell>0.99</cell><cell>101.01</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<analytic>
		<title level="a" type="main">High-speed and secure PRNG for cryptographic applications</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Hu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Okhrimenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Tynymbayev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Iavich</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">International Journal of Computer Network and Information Security</title>
		<imprint>
			<biblScope unit="volume">12</biblScope>
			<biblScope unit="issue">3</biblScope>
			<biblScope unit="page" from="1" to="10" />
			<date type="published" when="2020">2020</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<ptr target="https://forum.huawei.com/enterprise/en/security-comparison-between-wi-fi-6-and-5g/thread/615836-869" />
		<title level="m">Security Comparison Between Wi-Fi 6 and 5G</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">Analysis of current methods of generating pseudorandom sequences</title>
		<author>
			<persName><forename type="first">S</forename><surname>Yevseyev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">R</forename><surname>Koroliov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Krasnyanska</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">Eastern-European Journal of Advanced Technology</title>
		<imprint>
			<biblScope unit="volume">3</biblScope>
			<biblScope unit="issue">4</biblScope>
			<biblScope unit="page" from="11" to="15" />
			<date type="published" when="2010">2010</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">PRNG based on the variant logic</title>
		<author>
			<persName><forename type="first">W</forename><forename type="middle">Z</forename><surname>Yang</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Z</forename><forename type="middle">J</forename><surname>Zheng</surname></persName>
		</author>
		<idno type="DOI">10.1109/ChinaCom.2012.6417476</idno>
	</analytic>
	<monogr>
		<title level="m">7th International Conference on Communications and Networking in China</title>
				<imprint>
			<date type="published" when="2012">2012</date>
			<biblScope unit="page" from="202" to="205" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<analytic>
		<title level="a" type="main">Entropy global control for a chaos based PRNG</title>
		<author>
			<persName><forename type="first">R</forename><surname>Hobincu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">O</forename><surname>Datcu</surname></persName>
		</author>
		<author>
			<persName><forename type="first">C</forename><surname>Macovei</surname></persName>
		</author>
		<idno type="DOI">10.1109/TSP.2019.8768818</idno>
	</analytic>
	<monogr>
		<title level="m">International Conference on Telecommunications and Signal Processing (TSP)</title>
				<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="page" from="432" to="435" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b5">
	<analytic>
		<title level="a" type="main">tatistical test on lightweight block cipher-based PRNG</title>
		<author>
			<persName><forename type="first">Y</forename><forename type="middle">S S</forename><surname>Risqi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Windarta</surname></persName>
		</author>
		<idno type="DOI">10.1109/TSSA.2017.8272925</idno>
	</analytic>
	<monogr>
		<title level="m">11th International Conference on Telecommunication Systems Services and Applications (TSSA)</title>
				<imprint>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b6">
	<monogr>
		<ptr target="https://www.rcrwireless.com/20200416/5g/huawei-cto-5g-securiuty-standards" />
		<title level="m">5G security is fundamentally better than LTE security but the attack surface is massively increased</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">C</forename><surname>De Cannière</surname></persName>
		</author>
		<author>
			<persName><forename type="first">B</forename><surname>Preneel</surname></persName>
		</author>
		<idno>Report 2005/030</idno>
		<ptr target="http://www.ecrypt.eu.org/stream" />
		<title level="m">TRIVIUM -Specifications, eSTREAM, ECRYPT Stream Cipher Project</title>
				<imprint>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<ptr target="https://github.com/kravietz/nist-sts" />
		<title level="m">Download documentation and software</title>
				<imprint/>
		<respStmt>
			<orgName>NIST STS</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<analytic>
		<title level="a" type="main">A new stream cipher</title>
		<author>
			<persName><forename type="first">P</forename><surname>Ekdahl</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Johansson</surname></persName>
		</author>
		<author>
			<persName><surname>Snow</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the First NESSIE Workshop</title>
				<meeting>the First NESSIE Workshop<address><addrLine>NESSIE</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b10">
	<analytic>
		<title level="a" type="main">Experimental Study of Secure PRNG for Qtrits Quantum Cryptography Protocols</title>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">T</forename><surname>Okhrimenko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Fesenko</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Proceedings of the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT 2020)</title>
				<meeting>the 2020 IEEE 11th International Conference on Dependable Systems, Services and Technologies (DESSERT 2020)<address><addrLine>Kyiv, Ukraine</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2020-05-14">May 14, 2020</date>
			<biblScope unit="page" from="183" to="188" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<analytic>
		<title level="a" type="main">Further Analysis of PRNG-Based Key Derivation Functions</title>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">M</forename><surname>Mcginthy</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">J</forename><surname>Michaels</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="j">IEEE Access</title>
		<imprint>
			<biblScope unit="volume">7</biblScope>
			<biblScope unit="page" from="95978" to="95986" />
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<analytic>
		<title level="a" type="main">Design of a Dynamic Parameter-Controlled Chaotic-PRNG in a 65 nm CMOS process</title>
		<author>
			<persName><forename type="first">P</forename><forename type="middle">S</forename><surname>Paul</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><surname>Sadia</surname></persName>
		</author>
		<author>
			<persName><forename type="first">M</forename><forename type="middle">S</forename><surname>Hasan</surname></persName>
		</author>
		<idno type="DOI">10.1109/DCAS51144.2020.9330647</idno>
	</analytic>
	<monogr>
		<title level="m">IEEE 14th Dallas Circuits and Systems Conference (DCAS)</title>
				<imprint>
			<date type="published" when="2020">2020</date>
			<biblScope unit="page" from="1" to="4" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<analytic>
		<title level="a" type="main">One-Dimensional Nonlinear Model for Producing Chaos</title>
		<author>
			<persName><forename type="first">Z</forename><surname>Hua</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Y</forename><surname>Zhou</surname></persName>
		</author>
		<idno type="DOI">10.1109/TCSI.2017.2717943</idno>
	</analytic>
	<monogr>
		<title level="j">IEEE Transactions on Circuits and Systems I: Regular Papers</title>
		<imprint>
			<biblScope unit="volume">65</biblScope>
			<biblScope unit="issue">1</biblScope>
			<biblScope unit="page" from="235" to="246" />
			<date type="published" when="2018-01">2018. Jan</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<analytic>
		<author>
			<persName><forename type="first">M</forename><surname>Iavich</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><surname>Gagnidze</surname></persName>
		</author>
		<author>
			<persName><forename type="first">G</forename><surname>Iashvili</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Gnatyuk</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Vialkova</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Lattice based Merkle</title>
		<title level="s">CEUR Workshop Proceedings</title>
		<imprint>
			<date type="published" when="2019">2019</date>
			<biblScope unit="volume">2470</biblScope>
			<biblScope unit="page" from="13" to="16" />
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<analytic>
		<title level="a" type="main">Security analysis of a random number generator based on a double-scroll chaotic circuit</title>
		<author>
			<persName><forename type="first">S</forename><surname>Ergün</surname></persName>
		</author>
		<idno type="DOI">10.1109/ISCIT.2016.7751605</idno>
	</analytic>
	<monogr>
		<title level="m">16th International Symposium on Communications and Information Technologies (ISCIT)</title>
				<imprint>
			<date type="published" when="2016">2016</date>
			<biblScope unit="page" from="123" to="126" />
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
