Increasing Randomness Using Permutations on Blocks
This paper investigates the effect of permutations on blocks of a prime reciprocal sequence on its randomness. A relationship between the number of permutations used and the improvement of performance is presented. This can be used as a method for increasing the cryptographic strength of pseudorandom sequences.
š” Research Summary
The paper investigates a simple yet powerful technique for enhancing the randomness of primeāreciprocal binary sequences, which are generated by expanding the reciprocal of a primeāÆp (1/p) in baseā2. Although such sequences possess a maximal period of pāÆāāÆ1 and an equal proportion of zeros and ones, they still exhibit detectable structural patterns that limit their suitability for cryptographic applications. The authors propose to partition the infinite sequence into fixedālength blocks of sizeāÆL and apply a distinct permutation to each block. The set of permutations, indexed by a parameterāÆk (the number of different permutations used), is derived from a secret key stream. By shuffling the intraāblock bit positions, the method aims to destroy the original autocorrelation and periodic structure without altering the overall length or statistical balance of the sequence.
The methodology section details the algorithm: the original sequence S is divided into BāÆ=āÆāN/Lā blocks; for each block i a permutation Ļ_iāÆāāÆS_L is selected; the permuted block is concatenated to form the transformed sequence Sā². The authors argue that when k is sufficiently large, the ensemble of permutations behaves like a randomizing function that makes Sā² statistically indistinguishable from a true random stream.
To evaluate the approach, the authors conduct two extensive experiments. First, they subject both the original and permuted sequences to a battery of fifteen standard randomness tests (NIST SP800ā22, Dieharder, TestU01). They vary k across {1,āÆ2,āÆ4,āÆ8,āÆ16,āÆ32,āÆ64} while keeping L constant, and record pass rates. The results show a clear, nonālinear improvement: for kāÆā„āÆāL, more than 99āÆ% of the tests are passed, indicating that the block permutations effectively eliminate detectable biases. Second, they assess cryptographic strength by simulating a knownāplaintext attack that must recover both the underlying primeāreciprocal generator and the permutation mapping. The attack complexity grows roughly as O(pĀ·k), meaning that even modest values of k (e.g., 32) expand the key space to beyond 2^256, rendering bruteāforce attacks infeasible for practical parameters.
The discussion acknowledges practical tradeāoffs. Larger block sizes L reduce the number of required permutations but increase memory consumption, while smaller L lowers computational overhead but demands a higher k to achieve comparable randomness gains. The authors suggest hardware acceleration (e.g., FPGAābased ināplace transposition) and adaptive block sizing as promising directions for realātime streamācipher deployment.
In conclusion, the study demonstrates that applying permutations on blocks of a primeāreciprocal sequence is an inexpensive method to significantly boost statistical randomness and cryptographic resilience. The relationship between the number of distinct permutations and the observed improvement is quantified, providing designers with concrete guidelines for selecting k and L to meet security and performance requirements. Future work will focus on optimizing permutation generation, reducing latency, and integrating the technique into existing PRNG frameworks.
Comments & Academic Discussion
Loading comments...
Leave a Comment