{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T03:52:10Z","timestamp":1760241130671,"version":"build-2065373602"},"reference-count":29,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2019,12,3]],"date-time":"2019-12-03T00:00:00Z","timestamp":1575331200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>Symmetric cryptography methods have an important role in security solutions design in data protection. In that context, symmetric cryptography algorithms and pseudo-random generators connected with them have strong influence on designed security solutions. In the computationally constrained environment, security efficiency is also important. In this paper we proposed the design of a new efficient pseudo-random generator parameterized by two pseudo-random sequences. By the probabilistic, information-theoretic and number theory methods we analyze characteristics of the generator. Analysis produced several results. We derived sufficient conditions, regarding parameterizing sequences, so that the output sequence has uniform distribution. Sufficient conditions under which there is no correlation between parameterizing sequences and output sequence are also derived. Moreover, it is shown that mutual information between the output sequence and parameterizing sequences tends to zero when the generated output sequence length tends to infinity. Regarding periodicity, it is shown that, with appropriately selected parameterizing sequences, the period of the generated sequence is significantly longer than the periods of the parameterizing sequences. All this characteristics are desirable regarding security applications. The efficiency of the proposed construction can be achieved by selection parameterizing sequences from the set of efficient pseudo-random number generators, for example, multiple linear feedback shift registers.<\/jats:p>","DOI":"10.3390\/s19235322","type":"journal-article","created":{"date-parts":[[2019,12,4]],"date-time":"2019-12-04T04:30:35Z","timestamp":1575433835000},"page":"5322","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["A Generic Model of the Pseudo-Random Generator Based on Permutations Suitable for Security Solutions in Computationally-Constrained Environments"],"prefix":"10.3390","volume":"19","author":[{"given":"Tomislav","family":"Unka\u0161evi\u0107","sequence":"first","affiliation":[{"name":"VLATACOM Institute, 11070 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8195-8576","authenticated-orcid":false,"given":"Zoran","family":"Banjac","sequence":"additional","affiliation":[{"name":"VLATACOM Institute, 11070 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Milan","family":"Milosavljevi\u0107","sequence":"additional","affiliation":[{"name":"Singidunum University, 11000 Belgrade, Serbia"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1968","published-online":{"date-parts":[[2019,12,3]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"2796","DOI":"10.3390\/s18092796","article-title":"IoT Elements, Layered Architectures and Security Issues: A Comprehensive Survey","volume":"18","author":"Rehman","year":"2018","journal-title":"Sensors"},{"key":"ref_2","unstructured":"Salah, K. (2019). The Era of Internet of Things, Springer. [2nd ed.]."},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Rayes, A., and Samer, S. (2019). Internet of Things from Hype to Reality, Springer. [2nd ed.].","DOI":"10.1007\/978-3-319-99516-8"},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"928","DOI":"10.20533\/ijicr.2042.4655.2018.0112","article-title":"Internet of Things: State-of-the-art, Challenges, Applications, and Open Issues","volume":"9","author":"Atlam","year":"2018","journal-title":"IJICR"},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"Costa, D.G., Figuer\u00eado, S., and Oliveira, G. (2017). Cryptography in Wireless Multimedia Sensor Networks: A Survey and Research Directions. Cryptography, 1.","DOI":"10.3390\/cryptography1010004"},{"key":"ref_6","doi-asserted-by":"crossref","unstructured":"Kambourakis, G., Marmol, F.G., and Wang, G. (2018). Security and Privacy in Wireless and Mobile Networks. Future Internet, 10.","DOI":"10.3390\/fi10020018"},{"key":"ref_7","doi-asserted-by":"crossref","unstructured":"Ziegler, S. (2019). Internet of Things Security and Data Protection, Springer. [2nd ed.].","DOI":"10.1007\/978-3-030-04984-3"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Cheruvu, S., Kumar, A., Smith, N., and Wheeler, D.M. (2019). Demystifying Internet of Things Security: Successful IoT Device\/Edge and Platform Security Deployment, Apress.","DOI":"10.1007\/978-1-4842-2896-8"},{"key":"ref_9","doi-asserted-by":"crossref","unstructured":"Mahmood, Z. (2019). Security, Privacy and Trust in the IoT Environment, Springer.","DOI":"10.1007\/978-3-030-18075-1"},{"key":"ref_10","doi-asserted-by":"crossref","unstructured":"Banday, M.T. (2019). Cryptographic Security Solutions for the Internet of Things, IGI Global.","DOI":"10.4018\/978-1-5225-5742-5"},{"key":"ref_11","unstructured":"Biryukov, A., and Perrin, L. (2019, October 28). State of the Art in Lightweight Symmetric Cryptography. IACR Cryptology ePrint Archive. Available online: https:\/\/eprint.iacr.org\/2017\/511."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"2481","DOI":"10.1007\/s11276-014-0761-7","article-title":"Security of the Internet of Things: Perspectives and challenges","volume":"20","author":"Jing","year":"2014","journal-title":"Wirel. Netw."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"2483","DOI":"10.1109\/JIOT.2017.2767291","article-title":"Evaluating Critical Security Issues of the IoT World: Present and Future Challenges","volume":"5","author":"Frustaci","year":"2017","journal-title":"IEEE Internet Things J."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MCOM.2006.1632651","article-title":"Security and Privacy in RFID and Applications in Telemedicine","volume":"44","author":"Xiao","year":"2006","journal-title":"IEEE Commun. Mag."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"55","DOI":"10.3390\/s120100055","article-title":"Security Issues in Healthcare Applications Using Wireless Medical Sensor Networks: A Survey","volume":"12","author":"Kumar","year":"2012","journal-title":"Sensors"},{"key":"ref_16","doi-asserted-by":"crossref","unstructured":"Saraiva, D.A.F., Leithardt, V.R.Q., de Paula, D., Sales Mendes, A., Gonz\u00e1lez, G.V., and Crocker, P. (2019). PRISEC: Comparison of Symmetric Key Algorithms for IoT Devices. Sensors, 19.","DOI":"10.3390\/s19194312"},{"key":"ref_17","doi-asserted-by":"crossref","unstructured":"Krishna, B.V.S., and Gnanasekaran, T. (2017, January 10\u201311). A systematic study of security issues in Internet-of-Things (IoT). Proceedings of the International Conference on I-SMAC (IoT in Social, Mobile, Analytics and Cloud) (I-SMAC), Palladam, India.","DOI":"10.1109\/I-SMAC.2017.8058318"},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"155","DOI":"10.1080\/23738871.2017.1366536","article-title":"Security and privacy in the internet of things","volume":"2","author":"Carsten","year":"2017","journal-title":"J. Cyber Policy"},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"357","DOI":"10.4103\/0256-4602.55276","article-title":"Energy-aware Security in M-Commerce and the Internet of Things","volume":"26","author":"Hamad","year":"2009","journal-title":"IETE Tech. Rev."},{"key":"ref_20","doi-asserted-by":"crossref","unstructured":"Von zur Gathen, J. (2015). CryptoSchool, Springer.","DOI":"10.1007\/978-3-662-48425-8"},{"key":"ref_21","doi-asserted-by":"crossref","unstructured":"Bilal, M., and Kang, S.G. (2017). An Authentication Protocol for Future Sensor Networks. Sensors, 17.","DOI":"10.3390\/s17050979"},{"key":"ref_22","unstructured":"Anderson, B. (2019, October 28). Thank You Bob Anderson. Cypherpunks (Mailing List). Available online: http:\/\/cypherpunks.venona.com\/date\/1994\/09\/msg00304.html."},{"key":"ref_23","unstructured":"Rrivest, R. (2008). 6.857 Computer and Network Security Lectures and Handouts, MIT."},{"key":"ref_24","unstructured":"Rivest, R., and Schuldt, J. (2019, October 28). Spritz\u2014A Spongy RC4-Like Stream Cipher and Hash Function. Available online: https:\/\/en.wikipedia.org\/wiki\/RC4#cite_note-Rivest2014-14."},{"key":"ref_25","doi-asserted-by":"crossref","unstructured":"Sen Gupta, S., Maitra, S., Paul, G., and Sarkar, S. (2019, October 28). (Non-)Random Sequences from (Non-)Random Permutations\u2014Analysis of RC4 Stream Cipher. Available online: https:\/\/eprint.iacr.org\/2011\/448.pdf.","DOI":"10.1007\/s00145-012-9138-1"},{"key":"ref_26","doi-asserted-by":"crossref","unstructured":"Popov, A. (2015). RFC 7465 Prohibiting RC4 Cipher Suites, IETF.","DOI":"10.17487\/rfc7465"},{"key":"ref_27","doi-asserted-by":"crossref","unstructured":"Stamp, M., and Low, R. (2007). Applied Cryptanalysis: Breaking Ciphers in the Real World, Wiley.","DOI":"10.1002\/9780470148778"},{"key":"ref_28","doi-asserted-by":"crossref","unstructured":"Privoult, N. (2018). Understanding Markov Chains, Springer.","DOI":"10.1007\/978-981-13-0659-4"},{"key":"ref_29","doi-asserted-by":"crossref","unstructured":"Sericola, B. (2013). Markov Chains\u2014Theory, Algorithms and Applications, Wiley.","DOI":"10.1002\/9781118731543"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/23\/5322\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T13:39:43Z","timestamp":1760189983000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/19\/23\/5322"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,3]]},"references-count":29,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2019,12]]}},"alternative-id":["s19235322"],"URL":"https:\/\/doi.org\/10.3390\/s19235322","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2019,12,3]]}}}