Abstract

The article is dedicated to systematization of scientific positions about the static testing of sequences, widely used in cryptographic systems of information protection for the production of key and additional information (random numbers, vectors of initialization, etc.). Existing approaches to testing pseudorandom sequences, their advantages and disadvantages are considered. It is revealed that for sequences of length up to 100 bits there are not enough existing statistical packets. Perspective direction of research – static testing of sequences using n- dimensional statistics is considered. The joint distributions of 2-chains and 3-chains of a fixed type of random (0, 1) -sequences allow for statistical analysis of local sections of this sequence. Examples, tables, diagrams that can be used to test for randomness of the location of zeros and ones in the bit section are 16 lengths. The paper proposes a methodology for testing pseudorandom sequences, an explicit form of the joint distribution of 2- and 3-chains numbers of various options of random bit sequence of a given small length is obtained. As a result of the implementation of this technique, an information system will be created that will allow analyzing the pseudorandom sequence of a small length and choosing a quality pseudorandom sequence for use in a particular subject area.

Highlights

  • Оrgаnіzаtіоns hаve оnly just begun dіsсоverіng аnd benefіtіng frоm the оppоrtunіtіes prоvіded by the Іnternet оf Тhіngs (IoT)

  • As a result of applying this technique for testing pseudo-random sequences for twodimensional statistics (relations (2) - (4)), you can build a bubble diagram with which you can get the probability of the distribution of zeros and ones in a given sequence

  • An analysis of the effectiveness of pseudorandom sequence generators is an urgent issue of cybersecurity in the use of more advanced methods of encryption and information security

Read more

Summary

Introduction

Оrgаnіzаtіоns hаve оnly just begun dіsсоverіng аnd benefіtіng frоm the оppоrtunіtіes prоvіded by the Іnternet оf Тhіngs (IoT). Recommendations for protecting information in the Internet of things are aimed at improving the security of devices, networks and data. First of all, methods of "strong authentication" should be provided, including, for example, two-factor authentication, assignment of "hard" specified unique identification and authentication data, as well as the use of modern secure protocols [14]. After providing the credentials, the user or device must present a one-time password generated by the key distribution center, thereby confirming its authenticity This method does not require additional computing resources or storage from the devices, but it is not applicable for devices that, for example, cannot support the ability to enter the received one-time password. Other studies suggest using the concept of “digital memories” for authentication, which would solve the problem of users remembering complex passwords This method imposes resource limits on devices. The application of uniform methods and means is complicated by the lack of standardization and heterogeneity of such networks

Problem Statement
Results and Discussion
Conclusions

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.