1. Introduction
Additive Fibonacci generators (AFG) are one of the types of pseudorandom sequence generators that are widely used in many technical means, particularly in cryptographic means of information protection. In their traditional design, they do not provide adequate cryptosecurity, but can be used as part of cryptographic devices [
1,
2,
3,
4,
5,
6,
7,
8,
9]. Recently, we proposed a modified AFG (MAFG), in which the introduction to their structure and additional logic circuit, allowed us to include, in the process of arithmetic addition, the result of a logical function from the binary values of the resulting register, which significantly improved the statistical characteristics of the pseudorandom output sequence [
10,
11,
12,
13,
14,
15].
At present, almost all classic AFGs and new MAFGs, designed for hardware implementation, operate according to recurrent equations with modules whose values are equal to the power of two. It simplifies their hardware implementation but narrows their functionality and worsens the statistical characteristics of the output pseudorandom sequences.
In [
16], we proposed AFGs that can work with an arbitrary value of a module, including a module whose value is a prime number. However, these devices do not have an additional logic circuit [
10,
11,
12,
13,
14,
15], which does not allow satisfactory statistical characteristics to be obtained without the involvement of additional devices.
In this article, we reveal the approach to constructing Fibonacci additive generators with modules of prime numbers. This construction method expands the capabilities of the hardware implementation of such generators and improves their output statistical characteristics, which allows them to be used effectively in cryptographic applications. A research methodology is proposed based on using abstract and hardware models of generators. Their identity is proved, which allows investigation of the statistical characteristics of such generators with the large values of arguments, which is especially important for cryptographic generators. The research results indicate that the proposed models and structures of generators can be effectively used to solve cryptographic problems of information security.
The aim of the work is to create and research the characteristics of AFGs and MAFGs with modules whose values are prime numbers. To achieve this goal, new generator structures are proposed, in which the introduction of additional structural elements allows us to ensure the operation of generators with arbitrary values of the recurrent equation modulus. This is the scientific novelty of the obtained results, which significantly improves the statistical characteristics of generators, expands their functionality, and expands the scope of their use in cryptographic means of information protection, particularly in streaming ciphers.
2. Related Works
A large number of works are devoted to the construction of AGF. In particular, analyses of the implementation of Fibonacci hardware generators on FPGA are given in [
17]. There are also similar studies of Fibonacci generator implementations on FPGA in [
18], and in [
19], true random number generators, based on Fibonacci–Galois ring oscillators for FPGA, are considered, and the possibility of using these generators in cryptographic applications is shown. The results of research that used a combination of a hybrid of two existing generators—a linear congruential method and a delayed Fibonacci technique—are presented in [
20]. The analysis of the efficiency of using a Fibonacci generator for cryptographic problems is also considered in [
21,
22]. Moreover, in [
23], Fibonacci generators are used for the key generation algorithm with the necessary randomness and low algorithmic complexity. The work in [
24] is devoted to the question of the correct choice of Fibonacci generator parameters.
AFGs operate according to the following generalized recurrent equation:
where
a >
b > … >
q > 0.
Usually, AFGs are used in which the module
m = 2
n, where
n is the number of generator structural elements binary bits, that simplifies their hardware implementation. Under certain conditions, the repetition period of such AFGs is not less than value 2
n − 1 [
25].
It is known [
26] that, if the module
m =
p is a prime number, then, according to the theory of finite fields, we can find such multipliers as
a1,
a2,…,
ak, so that the sequence can be defined by the following equation:
which will have the maximum possible period equal to
pk − 1. In this case, the following theorem holds. If the constants
a1,
a2,…,
ak are such that the polynomial
xk −
a1xk−1 − … −
ak is primitive over the field
GF(
p), and at least one of the elements
x0,
x1,…,
xk is not zero, then the generator period is equal to
pk − 1, at any initial values of the structural elements of the generator.
It is also known [
26,
27] that the search for primitive polynomials for prime number modules is a difficult task.
In [
10,
11,
12,
13,
14,
15] we proposed modified MAFGs, in which the module is determined by the equation
m = 2
n, but they include an additional logic circuit (LC), the function of which is logical addition of the module 2 of the bits values of one of the generator registers, and then the result is added to the main operation of the arithmetic addition. This allows a significant increase in the repetition periods of the output sequences and an improvement of their statistical characteristics.
However, for today, there are no reasonable developments in which the structures of AFGs and MAFGs are proposed with an arbitrary value of the module of the recurrent equation.
3. Structure Scheme and Work Principle of AFG and MAFG with Arbitrary Value of the Module of the Recurrent Equation
Figure 1 shows the structure scheme of AFG and MAFG, which can operate with any value of the recurrent equation module. The AFG consists of registers RG1–RG6, adders AD1 and AD2, multiplexer MUX, and logical element OR. The logic circuit LC is additionally introduced to the MAFG structure.
The schemes are given for generators operating according to the following equations:
where:
xi,
xi−4,
xi−5—numbers at the outputs of registers RG1, RG5, and RG6, respectively.
In Equation (4):
where:
bi (
i = 0, 1, …,
s;
s ≤
n)—values of the number
xi binary bits;
n—the total number of binary bits.
With each clock pulse, new values of numbers are formed in the registers RG1–RG6, in particular in the register RG1—the number determined by the output signal of the multiplexer MUX.
At the output of the logic circuit LC, the signal a is formed in accordance with logic Equation (5). Adding the LC output signal a, in the process of arithmetic addition, implemented by the adder AD1, can significantly improve the statistical characteristics of the output pseudorandom signals of the generator.
In the absence of carry signals at the outputs of the adders AD1 and AD2, to the information inputs of the memory register RG1, through the multiplexer MUX, arrives a number from the information outputs of the adder AD1; moreover, if at least one of them is present, the number of information outputs are those of the adder AD2.
Compared with the known AFG and MAFG [
10,
11,
12,
13,
14,
15,
28], the introduction of the second adder AD2, multiplexer MUX, and the establishment of new connections between these and other structural elements, allows changing the numbers in the registers RG1–RG6 in the range of values 0 ÷ (
p − 1). Thus, AFG and MAFG operate with arbitrary module values according to Expressions (3) and (4), which confirmed our research, as mentioned in the following sections.
4. Methods of AFG and MAFG Statistical Characteristics Research
AFG and MAFG, as with any cryptographic generators of pseudorandom sequences, are used in arguments whose values are enormous; therefore, there are some difficulties in determining their statistical characteristics.
In this regard, the following research methodology was used. Two models were created for each AFG and MAFG variant: firstly, the abstract, which is not directly related to the circuit design solution, and hardware, which corresponds to the proposed structure. For relatively small values of arguments, the identity of the models is proved. The study of statistical characteristics, with large values of arguments, is carried out using an abstract model.
The following algorithms represent different AFG and MAFG models. The hardware models are represented by equations that correspond to the structures’ processes, shown in
Figure 1. Abstract models are represented by equations that correspond to the processes that must occur in the additive Fibonacci generator when it operates with a module whose value can be arbitrary. Proving the identity of the results obtained with these models proves the correctness of the structures shown in
Figure 1, in terms of achieving the desired result.
4.1. Research of AFG Models
In AFG models, the logic circuit LC is not involved in the generator structure scheme (
Figure 1).
The AFG hardware model operates in accordance with the following algorithm:
where:
xi,
xi−1,
xi−2,
xi−3,
xi−4,
xi−5—numbers in registers RG1–RG6, respectively;
xad1 and
xad2—numbers at the sum outputs of adders AD1 i AD2;
Pad1 and
Pad2—numbers at the carry outputs of adders AD1 and AD2;
xmp—the number at the output of the multiplexer MUX;
n—the number of the generator’s structural elements binary bits (
Figure 1).
The abstract AFG model is described by the following equations:
Figure 2 shows the dependences of the current values of pseudorandom numbers
X, generated by AFG on the iteration step number,
i, for the hardware and abstract model with the same initial value,
X(0).
Numbers
X and
X(0) are defined by the following expressions:
where:
xi(0),
xi−1(0),
xi−2(0),
xi−3(0),
xi−4(0),
xi−5(0)—initial values of numbers
xi,
xi−1,
xi−2,
xi−3,
xi−4,
xi−5, respectively.
Figure 3 on a logarithmic scale shows the dependence of the repetition periods of the AFG pseudorandom sequence numbers from the initial values,
X(0).
The results (
Figure 2 and
Figure 3) indicate complete identity of hardware and abstract models for forming a pseudorandom numbers sequence. Similar results were obtained for other
p values, in particular for
p values that are primes.
4.2. Research of MAFG Models
MAFG models:
Figure 1 shows generator structure scheme with using logic circuit LC. The hardware model of the MAFG, operating according to the following algorithm:
where:
bi—values of the number xi binary bits.
Abstract model of the MAFG operating according to the following equation:
Figure 4 shows the dependences of the current values of pseudorandom numbers,
X, that were generated by the MAFG on the iteration step number,
i, for the hardware and abstract model with the same initial value,
X(0).
Figure 5 shows, on a logarithmic scale, the dependences of repetition periods of MAFG pseudorandom sequence on the initial values,
X(0).
The results (
Figure 4 and
Figure 5) indicate complete identity hardware and abstract models for forming the pseudorandom numbers sequence. Similar results were obtained for other
p values, in particular for
p values that are primes.
5. Results
5.1. Research of Repetition Periods of AFG and MAFG Pseudorandom Sequences
The following research was conducted using an abstract model considering proven identity hardware and abstract generators models. It is necessary to speed up the simulation process.
Table 1 presents the received results of AFG and MAFG repetition periods,
Tp, for a few small module
p values that determined on the whole set of possible values of the initial number,
X(0) = 0 ÷
p6 − 1.
In this case, for MAFG, the output signal value a of the logic circuit LC (
Figure 1) was determined, according to Equation (5), as the sum for the module 2 for all bits of number
xi in the register Pr1.
Table 1 shows the maximum and minimum values of the period
Tp. It should be noted that when
p = 2 and
p = 3 on the whole set,
X(0) = 0 ÷
p6 − 1 fixed only one value
Tp =
p6 − 1. It coincides with the known theoretical results presented in Ref. [
25].
Where for larger values of module p, determination of repetition period,
Tp, on the whole set of values,
X(0) = 0 ÷
p6 − 1, requires a lot of machine time, all the following research was conducted for a fixed value,
X(0) = 1.
Table 2 shows the repetition period,
Tp, for some
p values and fixed values,
X(0) = 1.
Based on the research results of the output sequences, repetition periods of the AFG and proposed MAFG, in which the modules of the recurrent equations are prime numbers, such a conclusion can be made. When p > 3 the repetition periods MAFG is significantly greater than the AFG. When p = 2 and p = 3, the repetition periods of AFG reach, theoretically, the maximum value, Tp = p6 − 1, for all possible values, X(0).
5.2. Research of Statistical Characteristics of AFG and MAFG Pseudorandom Sequences
Research the statistical characteristics of the output pseudorandom bit sequences of AFG and MAFG for some
p values were carried out with the NIST test package [
29,
30,
31]. Results shows in
Figure 6,
Figure 7,
Figure 8 and
Figure 9.
Figure 6 presents a statistical portrait of the AFG output sequence at
p = 137.
As can be seen from
Figure 6, the most tests valued at 0 and did not fall within the specified interval; meaning that the sequence does not meet the randomness requirements.
Figure 7 shows MAFG using the same initial data as AFG. The sequence also does not meet the randomness requirements, but there is a significant improvement over the AFG. In particular, most test values are above 0. So, the proposed modification demonstrates positive dynamics.
Figure 8 shows the statistical portrait of the AFG output sequence at
p = 65,537. The tests failed and did not meet the randomness requirements.
Figure 9 presented the statistical portrait of the MAFG output sequence using the same parameters as AFG. As can be seen, all tests are within the allowable range. It means that such sequence has high statistical characteristics and meet the randomness requirements.
Analysis of statistical portraits (
Figure 6,
Figure 7,
Figure 8 and
Figure 9) shows that, with the same parameters, the statistical characteristics of the output pseudorandom sequences of MAFG significantly predominated in the AFG. Thus, at
p = 65,537,
X(0) = 1, and
a =
b0 ⊕ b1 …
⊕ b16 (
Figure 9) MAFG statistical characteristics entirely pass all NIST tests.
The conducted research proves that the proposed Fibonacci additive generators can operate by recurrent equations, whose modules values can be arbitrary, including modules whose values are prime numbers. It distinguishes them from the known additive Fibonacci generators, whose value of the modules is equal to the power of two. That is, the class of proposed generators includes the known generators as a subclass. At the same time, the proposed generators have the best statistical characteristics and designs for hardware implementation primarily, in which will achieve their maximum speed when implementing the proposed structures in a modern element base, for example, in programmable logic integrated circuits (PLDs).
6. Conclusions
The present article proposes new structures of AFG and MAFG, in which adding additional structural elements allows the operation of the generator with arbitrary values of the modulus of the recurrent equation, in particular, with modules whose values are prime numbers.
In the present study, we proved the identity of hardware and abstract models, suggesting that the principles laid down in the organization of the AFG and MAFG structures with modules of prime numbers ensure their effective hardware implementation.
For the basic function xi = (xi−5 + xi−4) mod p, the MAFG selected for the research, which functions according to the equation xi = (xi−5 + xi−4 + a) mod p, significantly predominated over AFG in the repetition period and statistical characteristics for all module values p > 3.
The AFG, at p = 2 and p = 3, fixed the maximum possible repetition period, Tp = p6 − 1, for all possible initial values of generator registers settings.
In further research, an important task is to find primitive polynomials over the field GF(p) for other values, p > 3, create AFG and MAFG structures for these values, and research their characteristics.
The obtained results can be used not only in the design of information security tools but also in other technology fields, such as in simulating random processes in measuring technologies.
Author Contributions
Conceptualization, V.M., M.S., and O.H.; methodology, M.S., and D.J.; validation, V.M., M.S., and P.S.; formal analysis, M.S., O.H., and P.S.; investigation, V.M., M.S., O.H., and D.J.; data curation, V.M., M.S., and O.H.; writing—original draft preparation, V.M., M.S., and O.H.; writing—review and editing, V.M., M.S, O.H., and D.J.; funding acquisition, M.K. All authors have read and agreed to the published version of the manuscript.
Funding
The research work reported in this paper was in part supported by the National Centre for Research and Development, Poland, under the project No. POIR.04.01.04-00-0048/20.
Institutional Review Board Statement
Not applicable.
Informed Consent Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Mohamed, K.; Ali, F.H.H.M.; Ariffin, S.; Zakaria, N.H.; Pauzi, M.N.M. An Improved AES S-box Based on Fibonacci Numbers and Prime Factor. Int. J. Netw. Secur. 2018, 20, 1206–1214. [Google Scholar]
- Belov, A.A.; Kalitkin, N.N.; Tintul, M.A. Visual Verification of Pseudo-Random Number Generators. Keldysh Inst. Preprints 2019, 137, 1–28. [Google Scholar] [CrossRef]
- Stakhov, A.; Massingue, V.; Sluchenkova, A. Introduction into Fibonacci Coding and Cryptography; Publish Osnova: Kharkov, Ukraine, 1999. [Google Scholar]
- Agarwal, P.; Agarwal, N.; Saxena, R. Data Encryption through Fibonacci Sequence and Unicode Characters. MIT Int. J. Comput. Sci. Inf. Technol. 2015, 5, 79–82. [Google Scholar]
- Gosai, I. Fibonacci Sequence and It’s Applications. IJRAR 2019, 6, 241–247. [Google Scholar]
- Ahamad, M.V.; Siddiqui, U.M.; Masroor, M.; Fatima, U.A. Modified Playfair Encryption Using Fibonacci Numbers. Int. J. Adv. Technol. Eng. Sci. 2017, 5, 347–351. [Google Scholar]
- Baldoni, S.; Battisti, F.; Carli, M.; Pascucci, F. On the Use of Fibonacci Sequences for Detecting Injection Attacks in Cyber Physical Systems. IEEE Access 2021, 9, 41787–41798. [Google Scholar] [CrossRef]
- Agarwal, A.; Agarwal, S.; Singh, B.K. Algorithm for data encryption & decryption using Fibonacci primes. J. Math. Control Sci. Appl. 2020, 6, 63–71. [Google Scholar]
- Yacoab, M.; Sha, M.; Ahmed, M.M. Secured Data Aggregation Using Fibonacci Numbers and Unicode Symbols for Wsn. Int. J. Comput. Eng. Technol. 2019, 10, 218–225. [Google Scholar] [CrossRef]
- Mandrona, M.; Maksymovych, V. Investigation of the statistical characteristics of the modified Fibonacci generators. J. Autom. Inf. Sci. 2014, 46, 48–53. [Google Scholar] [CrossRef]
- Maksymovych, V.; Harasymchuk, O.; Kostiv, Y.; Mandrona, M. Implementation of modified additive lagged Fibonacci generator. Chall. Mod. Technol. 2016, 7, 3–6. [Google Scholar]
- Maksymovych, V.; Mandrona, M.; Garasimchuk, O.; Kostiv, Y. A study of the characteristics of the Fibonacci modified additive generator with a delay. J. Autom. Inf. Sci. 2016, 48, 76–82. [Google Scholar] [CrossRef]
- Maksymovych, V.N.; Harasymchuk, O.I.; Mandrona, M.N. Designing Generators of Poisson Pulse Sequences Based on the Additive Fibonacci Generators. J. Autom. Inf. Sci. 2017, 49, 1–13. [Google Scholar] [CrossRef]
- Mandrona, M.N.; Maksymovych, V.N. Comparative Analysis of Pseudorandom Bit Sequence Generators. J. Autom. Inf. Sci. 2017, 49, 78–86. [Google Scholar] [CrossRef]
- Maksymovych, V.; Harasymchuk, O.; Opirskyy, I. The Designing and Research of Generators of Poisson Pulse Sequences on Base of Fibonacci Modified Additive Generator. International Conference on Theory and Applications of Fuzzy Systems and Soft Computing. Adv. Comput. Sci. Eng. Educ. 2018, 754, 43–53. [Google Scholar] [CrossRef]
- Maksymovych, V.; Harasymchuk, O.; Karpinski, M.; Shabatura, M.; Jancarczyk, D.; Kajstura, K. A New Approach to the Development of Additive Fibonacci Generators Based on Prime Numbers. Electronics 2021, 10, 2912. [Google Scholar] [CrossRef]
- Deshmukh, P.; Sadawarte, Y. Pseudo-Random Number Generation by Fibonacci and Galois LFSR Implemented on FPGA. In Proceedings of the IJCA Proceedings on International Conference on Advancements in Engineering and Technology (ICAET 2015) ICQUEST 2015, Wardha, India, 1–3 October 2015. [Google Scholar]
- Zulfikar, Z.; Away, Y.; Rafiqa, S.N. FPGA–Based Design System for a Two-segment Fibonacci LFSR Random Number Generator. Int. J. Electr. Comput. Eng. 2017, 7, 1882–1891. [Google Scholar] [CrossRef] [Green Version]
- Nannipieri, P.; Di Matteo, S.; Baldanzi, L.; Crocetti, L.; Belli, J.; Fanucci, L.; Saponara, S. True Random Number Generator Based on Fibonacci-Galois Ring Oscillators for FPGA. Appl. Sci. 2021, 11, 3330. [Google Scholar] [CrossRef]
- Cybulski, R. Pseudo-random number generator based on linear congruence and delayed Fibonacci method: Pseudo-random number generator based on linear congruence and delayed Fibonacci method. Tech. Sci. 2021, 24, 331–349. [Google Scholar] [CrossRef]
- Opoku-Mensah, E.; Abilimi, C.A.; Boateng, F.O. Comparative Analysis of Efficiency of Fibonacci Random Number Generator Algorithm and Gaussian Random Number Generator Algorithm in a Cryptographic System. Comput. Eng. Intell. Syst. 2013, 4, 50–57. [Google Scholar]
- Mandrona, M.M.; Maksymovych, V.M.; Harasymchuk, O.I.; Kostiv, Y.M. Generator of pseudorandom bit sequence with increased cryptographic immunity. Metall. Min. Ind. 2014, 6, 24–28. [Google Scholar]
- Amiruddin, A.; Ratna, A.A.P.; Sari, R.F. Construction and Analysis of Key Generation Algorithms Based on Modified Fibonacci and Scrambling Factors for Privacy Preservation. Int. J. Netw. Secur. 2019, 21, 250–258. [Google Scholar] [CrossRef]
- Oduwole, H.K.; Shehu, S.; Adegoke, G.K.; Onubogu, J.L. Fibonacci Random Number Generator using Lehmer’s Algorithm. Math. Theory Modeling 2013, 3, 56–62. [Google Scholar]
- Schneier, B. Applied Cryptography: Protocols, Algorithms, and Source Code in C; John Wiley & Sons: Hoboken, NJ, USA, 2007; p. 675. [Google Scholar]
- Slepovichev, I. Pseudo-Random Number Generators; SSU: Saratov, Russia, 2017; p. 118. [Google Scholar]
- Beletsky, A.; Kovalchuk, A.; Novikov, K.; Poltoratsky, D. Tables of Binary Irreducible Polynomials; Monograph book; Agrar Media Group: Kyiv, Ukraine, 2021; p. 400. [Google Scholar]
- Srinivas, A. Lagged Fibonacci Random Number Generators for Distributed Memory Parallel Computers. J. Parallel Distrib. Comput. 1997, 45, 1–12. [Google Scholar]
- Faster Randomness Testing with the NIST Statistical Test Suite. Available online: https://crocs.fi.muni.cz/_media/public/crocs/sys_space_2014.pdf (accessed on 20 December 2021).
- NIST SP 800-22 Version 1a. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications; NIST: Gaithersburg, MD, USA, 2010; p. 131. Available online: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-22r1a.pdf (accessed on 20 December 2021).
- Gorbenko, I.D.; Gorbenko, Y.I. Applied Cryptology: Theory. Practice. Application; Fort Publishing House: Kharkiv, Ukraine, 2012; p. 880. [Google Scholar]
Figure 1.
Structure scheme of AFG and MAFG.
Figure 1.
Structure scheme of AFG and MAFG.
Figure 2.
Current values of pseudorandom numbers X (for AFG): (a) hardware model: p = 7, n = 3, A = 2n − p = 1, X(0) = 1; (b) abstract model: p = 7, X(0) = 1.
Figure 2.
Current values of pseudorandom numbers X (for AFG): (a) hardware model: p = 7, n = 3, A = 2n − p = 1, X(0) = 1; (b) abstract model: p = 7, X(0) = 1.
Figure 3.
Dependencies of repetition periods from X(0) (for AFG): (a) hardware model: p = 5, n = 3, A = 2n − p = 3, X(0) = 0 ÷ p6 − 1; (b) abstract model: p = 5, X(0) = 0 ÷ p6 − 1.
Figure 3.
Dependencies of repetition periods from X(0) (for AFG): (a) hardware model: p = 5, n = 3, A = 2n − p = 3, X(0) = 0 ÷ p6 − 1; (b) abstract model: p = 5, X(0) = 0 ÷ p6 − 1.
Figure 4.
Current values of pseudorandom numbers X (for MAFG): (a) hardware model: p = 7, n = 3, A = 2n − p = 1, a = b0 ⊕ b1 ⊕ b2, X(0) = 1; (b) abstract model: p = 7, a = b0 ⊕ b1 ⊕ b2, X(0) = 1.
Figure 4.
Current values of pseudorandom numbers X (for MAFG): (a) hardware model: p = 7, n = 3, A = 2n − p = 1, a = b0 ⊕ b1 ⊕ b2, X(0) = 1; (b) abstract model: p = 7, a = b0 ⊕ b1 ⊕ b2, X(0) = 1.
Figure 5.
Dependencies of repetition periods from X(0): (a) hardware model: p = 5, n = 3, A = 2n − p = 3, a = b0 ⊕ b1 ⊕ b2, X(0) = 0 ÷ p6 − 1; (b) abstract model: p = 5, a = b0 ⊕ b1 ⊕ b2, X(0) = 0 ÷ p6 − 1.
Figure 5.
Dependencies of repetition periods from X(0): (a) hardware model: p = 5, n = 3, A = 2n − p = 3, a = b0 ⊕ b1 ⊕ b2, X(0) = 0 ÷ p6 − 1; (b) abstract model: p = 5, a = b0 ⊕ b1 ⊕ b2, X(0) = 0 ÷ p6 − 1.
Figure 6.
Statistical portrait of the AFG output sequence at p = 137, X(0) = 1.
Figure 6.
Statistical portrait of the AFG output sequence at p = 137, X(0) = 1.
Figure 7.
Statistical portrait of the MAFG output sequence at p = 137, X(0) = 1, a = b0 ⊕ b1 …⊕ b7.
Figure 7.
Statistical portrait of the MAFG output sequence at p = 137, X(0) = 1, a = b0 ⊕ b1 …⊕ b7.
Figure 8.
Statistical portrait of the AFG output sequence at p = 65,537 and X(0).
Figure 8.
Statistical portrait of the AFG output sequence at p = 65,537 and X(0).
Figure 9.
Statistical portrait of the MAFG output sequence at p = 65,537, X(0) = 1, a = b0 ⊕ b1 …⊕ b16.
Figure 9.
Statistical portrait of the MAFG output sequence at p = 65,537, X(0) = 1, a = b0 ⊕ b1 …⊕ b16.
Table 1.
Repetition periods of AFG and MAFG output sequences for p value on the whole set of possible values, X(0) = 0 ÷ p6 − 1.
Table 1.
Repetition periods of AFG and MAFG output sequences for p value on the whole set of possible values, X(0) = 0 ÷ p6 − 1.
Some p Values | Max and Min Repetition Period Values |
---|
AFG (without Logic Circuit LC) | MAFG (with Logic Circuit LC) |
---|
2 | 63 | 10 |
2 |
3 | 728 | 315 |
5 |
5 | 3124 | 14,409 |
4 | 5 |
7 | 2400 | 105,833 |
24 | 11,360 |
Table 2.
Repetition periods of AFG and MAFG output sequences for some p values when X(0) = 1.
Table 2.
Repetition periods of AFG and MAFG output sequences for some p values when X(0) = 1.
Some p Values | Repetition Periods Tp |
---|
AFG (without Logic Circuit LC) | MAFG (with Logic Circuit LC) |
---|
11 | 118,103 | 1,601,719 |
13 | 371,291 | 2,636,108 |
17 | 88,415 | 9,810,767 |
19 | 2,476,097 | 26,974,957 |
37 | 845,657 | 382,733,921 |
41 | 1679 | 432,850,590 |
43 | 1,116,087 | 5,459,242,931 |
73 | 1,401,242,835 | 8,949,513,501 |
137 | 4,387,429,945 | >1010 |
| Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).