System and method for generating a symmetrically balanced output

ABSTRACT

Disclosed are a system and method for generating a symmetrically balanced output to accomplish a plurality of predefined properties. The method comprises a step of receiving a plurality of registers with B bits, an expression length, and a plurality of operators through a receiving module. The method then includes a step of generating a random expression population through a random expression population generation module. Further, the method includes the step of computing a fitness value of the random expression population through a fitness function module. The method then includes the step of providing registers with B bits if a plurality of output bits are having an equal number of 1s and 0s through a conditional module. The conditional module performs mutation in the operators if the output bits are not having an equal number of 1s and 0s.

FIELD OF INVENTION

The present invention relates to the generation of a symmetrically balanced output, in particular to system and method for producing a symmetrically balanced output to accomplish a plurality of predefined properties such as balancedness, resiliency, non-linearity, propagation, immunity, and symmetricity.

BACKGROUND

Typically, the symmetric Boolean function is a Boolean function whose value does not depend on the permutation of its input bits, i.e., it depends only on the number of ones in the input. Further, the symmetric Boolean function is a specialized function which considers the hamming weight of the input string. Hence, the existing symmetric Boolean function cannot be effectively utilized to perform Monte Carlo experimentation and performance analysis.

Chinese patent number 10,641,1499 A filed by Wu Liji et al. discloses a system and method related to RC4 hardware circuit mark protection. The method includes a step of inputting a secret key and grouping S box grouping. Then the method performs grouping with the same number of the inputted secret keys and the S boxes. Then the method introduces random numbers to the inputted secret keys and the S boxes at the same time. The inputted secret keys and the S boxes are subjected to grouping. The sum of each part is the same as the content of the inputted secret keys and the S boxes which don't have protection. The S box initial permutation step: performing an initial permutation of the grouping S boxes according to the grouping inputted secret keys. The secret keystream generation comprises a step of performing permutation once again of the grouping S boxes after the initial permutation and taking the sum of the grouping S boxes after the permutation once again as a new index. The content of the S boxes pointed by the new index is an output secret keystream. Through adoption of the algorithm level defensive measure, the RC4 hardware circuit mark protection method and system quote pseudo-random numbers to take as masks to resist to the power consumption attack, especially the template attack aiming at the RC4. However, the Wu Liji patent application utilizes a specific stream cipher algorithm, i.e. RC4 and does not provide a plurality of solutions such as to obtaining samples from various distributions (Gamma, Beta, etc.) in a machine learning (ML) environment, and generating Hash algorithm and performing a performance analysis of the cryptographic hashes.

There is a need for an efficient, elegant and effective solution for generating a symmetrically balanced output. Further, there is a need for a system and method to provide a true random system that combines input variables and traditional logic gates to provide output random bit patterns.

Thus, in view of the above, there is a long-felt need in the industry to address the aforementioned deficiencies and inadequacies.

Further limitations and disadvantages of conventional and traditional approaches will become apparent to one of skill in the art through comparison of described systems with some aspects of the present disclosure, as set forth in the remainder of the present application and with reference to the drawings.

All publications herein are incorporated by reference to the same extent as if each publication or patent application were specifically and individually indicated to be incorporated by reference. Where a definition or use of a term in an incorporated reference is inconsistent or contrary to the definition of that term provided herein, the definition of that term provided herein applies and the definition of that term in the reference does not apply.

As used in the description herein and throughout the claims that follow, the meaning of “a,” “an,” and “the” includes plural reference unless the context dictates otherwise. Also, as used in the description herein, the meaning of “in” includes “in” and “on” unless the context dictates otherwise.

SUMMARY

The present invention mainly solves the technical problems existing in the prior art. In response to these problems, the present invention provides a system and method for generating a symmetrically balanced output to accomplish a plurality of predefined properties.

An aspect of the present disclosure relates to a method for generating a symmetrically balanced output to accomplish a plurality of predefined properties. The method comprises a step of receiving a plurality of registers with B bits, an expression length, and a plurality of operators through a receiving module. The method then includes a step of generating a random expression population through a random expression population generation module. Further, the method includes the step of computing a fitness value of the random expression population through a fitness function module. The method then includes the step of providing registers with B bits if a plurality of output bits are having an equal number of 1s and 0s through a conditional module. The conditional module performs mutation in the operators if the output bits are not having an equal number of 1s and 0s.

In an aspect, the mutation in the operators is performed by changing a combination of at least one a plurality of logic gates, the registers and a plurality of variables.

In an aspect, the expression length is a number of terms in a combined function.

In an aspect, the combined function comprises the logic gates to strengthen a plurality of hash algorithms, a plurality of stream ciphers and a round function module of block ciphers.

In an aspect, the present method utilizes a hamming distance of output string to compute a distance between at least two strings of equal length.

In an aspect, the predefined properties comprise balancedness, resiliency, non-linearity, propagation, immunity, and symmetricity.

An aspect of the present disclosure relates to a device in a network. The device includes a non-transitory storage device having embodied therein one or more routines operable to generate a symmetrically balanced output to accomplish a plurality of predefined properties. The one or more routines include a receiving module, a random expression population generation module, a fitness function module, and a conditional module.

The receiving module receives a plurality of registers with B bits, an expression length, and a plurality of operators. The random expression population generation module generates a random expression population. The fitness function module computes a fitness value of the random expression population. The conditional module provides registers with B bits if a plurality of output bits are having an equal number of 1s and 0s. The conditional module performs mutation in the operators if the output bits are not having an equal number of 1s and 0s.

An aspect of the present disclosure relates to a system for generating a symmetrically balanced output to accomplish a plurality of predefined properties. The system includes a processor and a memory. The memory stores machine-readable instructions that when executed by the processor cause the processor to receive a plurality of registers with B bits, an expression length, and a plurality of operators through a receiving module. The processor is further configured to generate a random expression population through a random expression population generation module. The processor is then configured to compute a fitness value of the random expression population through a fitness function module. Further, the processor is configured to provide registers with B bits if a plurality of output bits are having an equal number of 1s and 0s through a conditional module. The conditional module performs mutation in the operators if the output bits are not having an equal number of 1s and 0s.

Accordingly, one advantage of the present invention is that it generates a hash algorithm and performance analysis of cryptographic hashes.

Accordingly, one advantage of the present invention is that it enables the Monte Carlo experimentation and provides outputs with any feasible source by integrating a function output over a large parameter space and selecting random values within that parameter space and averaging the resulting function values.

Accordingly, one advantage of the present invention is that it provides a digital display with the effect of rotation and scaling which can be analyzed using the randomization of pixel area using this concept.

Accordingly, one advantage of the present invention is that it can be used as a basis to obtain samples from more interesting distributions (Gamma, Beta, etc.) in a machine learning and statistical learning environment.

Accordingly, one advantage of the present invention is that it is applicable in CAPTCHA technology as a random selection of images or texts or even merging the text and images.

Accordingly, one advantage of the present invention is that it can be used in amortized searching and sorting algorithms.

Other features of embodiments of the present disclosure will be apparent from accompanying drawings and from the detailed description that follows.

BRIEF DESCRIPTION OF THE DRAWINGS

In the figures, similar components and/or features may have the same reference label. Further, various components of the same type may be distinguished by following the reference label with a second label that distinguishes among the similar components. If only the first reference label is used in the specification, the description applies to any one of the similar components having the same first reference label irrespective of the second reference label.

FIG. 1 illustrates a network implementation of the present system and method for generating a symmetrically balanced output to accomplish a plurality of predefined properties, in accordance with an embodiment of the present subject matter.

FIG. 2 illustrates a block diagram of the present system for generating a symmetrically balanced output to accomplish a plurality of predefined properties, in accordance with an embodiment of the present subject matter.

FIG. 3 illustrates an exemplary structure of the present system for two variables of n bits, in accordance with at least one embodiment.

FIG. 4a illustrates an exemplary diagram of the chaining of randomization, in accordance with at least one embodiment.

FIG. 4b illustrates an exemplary view of the hamming distance of output vectors, in accordance with at least one embodiment.

FIG. 4c illustrates a conceptual diagram of the lower and upper halves of the bit string, in accordance with at least one embodiment.

FIG. 5 illustrates a flowchart of the present method for generating a symmetrically balanced output to accomplish a plurality of predefined properties, in accordance with at least one embodiment.

FIG. 6 illustrates an exemplary view of a modified key expansion for 14 round AES, in accordance with at least one embodiment.

FIG. 7 illustrates an exemplary view of the proposed modification in RC4 scheme, in accordance with at least one embodiment.

DETAILED DESCRIPTION

Systems and methods are disclosed for generating a symmetrically balanced output to accomplish a plurality of predefined properties. Embodiments of the present disclosure include various steps, which will be described below. The steps may be performed by hardware components or may be embodied in machine-executable instructions, which may be used to cause a general-purpose or special-purpose processor programmed with the instructions to perform the steps. Alternatively, steps may be performed by a combination of hardware, software, and firmware.

Embodiments of the present disclosure may be provided as a computer program product, which may include a machine-readable storage medium tangibly embodying thereon instructions, which may be used to program a computer (or other electronic devices) to perform a process. The machine-readable medium may include, but is not limited to, fixed (hard) drives, magnetic tape, floppy diskettes, optical disks, compact disc read-only memories (CD-ROMs), and magneto-optical disks, semiconductor memories, such as ROMs, PROMs, random access memories (RAMs), programmable read-only memories (PROMs), erasable PROMs (EPROMs), electrically erasable PROMs (EEPROMs), flash memory, magnetic or optical cards, or other type of media/machine-readable medium suitable for storing electronic instructions (e.g., computer programming code, such as software or firmware).

Various methods described herein may be practiced by combining one or more machine-readable storage media containing the code according to the present disclosure with appropriate standard computer hardware to execute the code contained therein. An apparatus for practicing various embodiments of the present disclosure may involve one or more computers (or one or more processors within a single computer) and storage systems containing or having network access to computer program(s) coded in accordance with various methods described herein, and the method steps of the disclosure could be accomplished by modules, routines, subroutines, or subparts of a computer program product.

The present invention discloses a system and method whereby a true random system that produces the symmetric balanced output that fulfills the properties such as balancedness, resiliency, non-linearity, propagation and immunity (BaReNPI). The cryptographic functions of the computer are improved and such improvements change conventional function generators. The technical solution provided by the present invention is pertaining to the function generator can be applied for any cryptographic algorithms for more robust algorithm. The present system considers the hamming distance of output string. Further, the present system outputs a combined function comprising of logic gates which helps the hash algorithms, stream ciphers and round function module of block ciphers to be more robust. Further, the present invention provides the function generator which can be utilzied for key generators.

Typically, algorithms such as DES, AES and other block ciphers use fixed round functions. However, the present invention uses BaReNPI true random system for better avalanche effect. Moreover, stream ciphers which use pseudo random number generator are vulnerable to attack. Therefore, uses of the present BaReNPI true random system in stream ciphers makes the ciphers more robust.

Although the present disclosure has been described with the purpose for generating a symmetrically balanced output to accomplish a plurality of predefined properties, it should be appreciated that the same has been done merely to illustrate the invention in an exemplary manner and any other purpose or function for which explained structures or configurations could be used, is covered within the scope of the present disclosure.

Exemplary embodiments will now be described more fully hereinafter with reference to the accompanying drawings, in which exemplary embodiments are shown. This invention may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein. These embodiments are provided so that this disclosure will be thorough and complete and will fully convey the scope of the invention to those of ordinary skill in the art. Moreover, all statements herein reciting embodiments of the invention, as well as specific examples thereof, are intended to encompass both structural and functional equivalents thereof. Additionally, it is intended that such equivalents include both currently known equivalents as well as equivalents developed in the future (i.e., any elements developed that perform the same function, regardless of structure).

Thus, for example, it will be appreciated by those of ordinary skill in the art that the diagrams, schematics, illustrations, and the like represent conceptual views or processes illustrating systems and methods embodying this invention. The functions of the various elements shown in the figures may be provided through the use of dedicated hardware as well as hardware capable of executing associated software. Similarly, any switches shown in the figures are conceptual only. Their function may be carried out through the operation of program logic, through dedicated logic, through the interaction of program control and dedicated logic, or even manually, the particular technique being selectable by the entity implementing this invention. Those of ordinary skill in the art further understand that the exemplary hardware, software, processes, methods, and/or operating systems described herein are for illustrative purposes and, thus, are not intended to be limited to any particular name.

Specific details are given in the following description to provide a thorough understanding of the embodiments. However, it will be understood by one of ordinary skill in the art that the embodiments may be practiced without these specific details. For example, circuits, systems, networks, processes, and other components may be shown as components in block diagram form in order not to obscure the embodiments in unnecessary detail. In other instances, well-known circuits, processes, algorithms, structures, and techniques may be shown without unnecessary detail to avoid obscuring the embodiments.

The term “machine-readable storage medium” or “computer-readable storage medium” includes, but is not limited to, portable or non-portable storage devices, optical storage devices, and various other mediums capable of storing, containing, or carrying instruction(s) and/or data. A machine-readable medium may include a non-transitory medium in which data can be stored, and that does not include carrier waves and/or transitory electronic signals propagating wirelessly or over wired connections. Examples of a non-transitory medium may include but are not limited to, a magnetic disk or tape, optical storage media such as compact disk (CD) or versatile digital disk (DVD), flash memory, memory or memory devices.

FIG. 1 illustrates a network implementation 100 of the present system and method for generating a symmetrically balanced output to accomplish a plurality of predefined properties, in accordance with an embodiment of the present subject matter. Although the present subject matter is explained considering that the present system 102 is implemented on a server, it may be understood that the present system 102 may also be implemented in a variety of computing systems, such as a laptop computer, a desktop computer, a notebook, a workstation, a mainframe computer, a server, a network server, and the like. It will be understood that the present system 102 may be accessed by multiple users through one or more computing devices 104-1, 104-2 . . . 104-N, collectively referred to as computing unit 104 hereinafter, or applications residing on the computing device 104. Examples of the computing device 104 may include but are not limited to, a portable computer, a personal digital assistant, a handheld or mobile device, smart devices, and a workstation. The computing devices 104 are communicatively acccessible to the present system 102 through a network 106.

In one implementation, the network 106 may be a wireless network, a wired network or a combination thereof. The network 106 can be implemented as one of the different types of networks, such as an intranet, local area network (LAN), wide area network (WAN), the internet, and the like. The network 106 may either be a dedicated network or a shared network. The shared network represents an association of the different types of networks that use a variety of protocols, for example, Hypertext Transfer Protocol (HTTP), Transmission Control Protocol/Internet Protocol (TCP/IP), Wireless Application Protocol (WAP), and the like, to communicate with one another. Further, the network 106 may include a variety of network devices, including routers, bridges, servers, computing devices, storage devices, and the like.

FIG. 2 illustrates a block diagram of the present system 102 for generating a symmetrically balanced output to accomplish a plurality of predefined properties, in accordance with an embodiment of the present subject matter. In an embodiment, the predefined properties comprise balancedness, resiliency, non-linearity, propagation, immunity, and symmetricity. The system 102 may include at least one processor 202, and a memory 204. The processor 202 may be implemented as one or more microprocessors, microcomputers, microcontrollers, digital signal processors, central processing units, state machines, logic circuitries, and/or any devices that manipulate signals based on operational instructions. Among other capabilities, the at least one processor 202 is configured to fetch and execute computer-readable instructions stored in the memory 204.

The memory 204 may include any computer-readable medium known in the art including, for example, volatile memory, such as static random access memory (SRAM) and dynamic random access memory (DRAM), and/or non-volatile memory, such as read-only memory (ROM), erasable programmable ROM, flash memories, hard disks, optical disks, and magnetic tapes. The memory 204 may include modules 205.

The modules 205 include routines, programs, objects, components, data structures, etc., which perform particular tasks or implement particular abstract data types. In one implementation, the modules 205 may include a receiving module 206, a random expression population generation module 208, a fitness function module 210 and a conditional module 212.

In one implementation, the receiving module 206 receives a plurality of registers with B bits, an expression length, and a plurality of operators. In an embodiment, the expression length is a number of terms in a combined function. In an embodiment, the combined function comprises the logic gates to strengthen a plurality of hash algorithms, a plurality of stream ciphers and a round function module of block ciphers.

The random expression population generation module 208 generates a random expression of the population. The fitness function module 210 computes a fitness value of the random expression population. The conditional module 212 provides registers with B bits if a plurality of output bits are having an equal number of 1s and 0s. The conditional module 214 performs mutation in the operators if the output bits are not having an equal number of 1s and 0s. In an embodiment, the mutation in the operators is performed by changing a combination of at least one a plurality of logic gates, the registers and a plurality of variables. The present system 102 utilizes a hamming distance of output string to compute a distance between at least two strings of equal length.

FIG. 3 illustrates an exemplary structure 300 of the present system for two variables of n bits, in accordance with at least one embodiment. The present system outputs a combined function 310 which includes logic gates to help the hash algorithms, stream ciphers and round function module of block ciphers to be more robust. The expression for the proposed combined function generator 304 is given as:

ƒ_(c)=⊗ƒ_(i) ^(L)  (1)

where, i represents the number of logic gates; L represents the expression length 302 (Number of terms in the combined function ƒ_(c)) and ⊗ represents the random combination 308.

To emphasize the randomness in such combined function generator 304, the above equation (1) is further expressed in terms of N input variables' randomness in the selection, as shown in equation 2.

ƒ_(c)(V ₁ ,V ₂ . . . ,V _(N))=⊗ƒ_(i) ^(L)[rand(V ₁ ,V ₂ . . . ,V _(N))]  (2)

FIG. 4a illustrates an exemplary diagram 400 of the chaining of randomization, in accordance with at least one embodiment. The structure is shown in the FIG. 3 can be expanded as the function generator can be used for any N variables of n bits each as shown in FIG. 4. Let F₂ is the finite field of two elements {0,1} and ⊕ is any operation of the field F₂. N variables are used and each variable is considered to be a n bit vector v={v₁, v₂, . . . , v_(n)}. In the further discussion each variable V_(i) is considered as a binary vector v.

The Hamming Weight of such a binary vector v is given by following equation 3:

wt(v)=Σ_(i=1) ^(n) v _(i)  (3)

Proposition 1: A combined function ƒ_(c) using n bit variables and generating an output v_(o) of n bits is symmetric iff

${\sum\limits_{i = 1}^{n}v_{o_{i}}} = \frac{n}{2}$

where, v_(o) _(i) ∈{0,1}.

For any number of variables of n bits, the bit patterns follow a bell-curve of normal distribution and the standard deviation from the mean is very low. Therefore, just analysing n/2 combinations of the bit patterns the original bit information can be achieved. Therefore, if the present system constructs to randomize the operations in the function level, each iteration provides the same bitsums and therefore hard to detect the function patterns.

Proposition 2: Let n be an odd integer and v_(o) is the output of the combined function ƒ_(c), ƒ_(c) is the random symmetric function iff 0 is added in the least significant bit (LSB) of the variable.

$\begin{matrix} {{{\sum\limits_{i = 1}^{n}v_{o_{i}}} = \frac{n}{2}},{\forall{n\mspace{14mu} {is}\mspace{14mu} {even}}}} & (4) \end{matrix}$

and

$\begin{matrix} {{{{\sum\limits_{i = 1}^{n}v_{o_{i}}} + {{LSB}(0)}} = \frac{n}{2}},{\forall{n\mspace{14mu} {is}\mspace{14mu} {odd}}}} & (5) \end{matrix}$

Let

_(N) the set of all symmetric random combined Boolean functions onN variables of all the functions from F₂ ^(N) into F₂ where F₂ ^(N)={(V₁, V₂, . . . , V_(N))|V_(i)∈F₂}.

Any combined function ƒ_(c)∈

_(N) of L terms is expressed as a polynomial which is basically termed as Algebraic Normal Form (ANF) of the function and given as:

ƒ_(c)(V ₁ ,V ₂ , . . . ,V _(N))=⊕λ_(u)(Π_(i=1) ^(N) rand(V _(i))^(u) ^(i) )^(L),λ_(u) ∈F ₂ u∈F ₂ ^(N) and L∈

   (6)

with λ_(u)=⊕ƒ_(c)(v),v

u,∀V _(i) ={v _(i) ₁ ,v _(i) ₂ , . . . ,v _(i) _(n) }  (7)

where, (v _(i) ₁ ,v _(i) ₂ , . . . ,v _(i) _(n) )

(u ₁ ,u ₂ , . . . ,u _(n)) iff ∀i,j,v _(i) _(j) ≤u _(i).  (8)

For any random combined function ƒ_(c)∈

_(N) generated by the present system is expressed by a binary bit vector of length 2^(N). This vector is comprised of all the values ƒ_(c)(y), y∈F₂ ^(N)

The degree of function ƒ_(c) is denoted by deg (ƒ_(c)) and computed as the maximal value of the weights of the output vector v_(o) _(i) given as:

$\begin{matrix} {{{{wt}\left( v_{o_{i}} \right)} = \frac{n}{2}},{{{such}\mspace{14mu} {that}\mspace{20mu} \lambda_{u}} \neq 0}} & (9) \end{matrix}$

Any function e∈F₂ ^(N), φ_(e) denotes the linear function in

_(N):x

e.x, where (.) is the dot operation of two vectors. The sequence of Walsh functions W_(k): [0,1]→{−1,1}, k∈

is defined as below:

W _(k)(ƒ_(c))=(−1)^(Σ) ^(j=0) ^(∞) ^(k) ^(j) ^(v) ^(j+1)   (10)

Following the equation 10, the Walsh coefficient of ƒ_(c)∈

_(N) in point e∈F₂ ^(N) is given as:

W _(e)(ƒ_(c)+φ_(e))=(−1)^(Σ) ^(j=0) ^(∞) ^(v) ^(j+1) ^(+e.x)  (11)

The series of values for the Walsh coefficients W_(e)(ƒ_(c)+φ_(e)), e∈F₂ ^(N) forms the Walsh spectrum S of the function ƒ_(c). The Walsh spectrum S of an N-variable combinational logic function actually represents the function itself.

∀a∈F ₂ ^(N) ,W(ƒ_(c)+φ_(e))=Σ_(w=0) ^(N)(−1)^(v) ^(w) P _(w)(wt(a))  (12)

Where, P_(w) is the Krawtchouk polynomial of degree w given as:

$\begin{matrix} {{P_{w}(i)} = {\sum\limits_{k = 0}^{w}{\begin{pmatrix} i \\ k \end{pmatrix}\begin{pmatrix} {N - i} \\ {w - k} \end{pmatrix}\left( {- 1} \right)^{k}}}} & (13) \end{matrix}$

The equation 12 and equation 13 represent the symmetric feature of the Walsh transformations of ƒ_(c).

The output of ƒ_(c) depends on the weight of its input vectors. As a result, ƒ_(c) corresponds to a function g_(c): {0, 1, . . . , n}>F₂ such that ∀x∈F₂ ^(N), ƒ_(c)(x)=g_(c)(wt(x)). The sequence g_(c)(ƒ_(c))=(g_(c)(0), g_(c)(1) . . . , g_(c)(n)) for n-bit vector is considered as simplified value vector of ƒ_(c). To establish the relation between simplified value vector and arithmetic normal form the equation of 6 can be rewritten as shown in Equation 13.

ƒ_(c)(V ₁ ,V ₂ , . . . ,V _(N))=⊕λ_(ƒ)(j)Γ(Π_(i=1) ^(N) rand(V _(i))^(u) ^(i) )^(L)  (14)

=⊕λ_(ƒ)(j)

_(j,N)  (15)

where, λ_(ƒ)(j), u└F₂ ^(N) and L∈

, j={1, . . . , N}.

_(j,N) is the elementary polynomial of degree j with N variables. The coefficients of arithmetic normal form of ƒ_(c) is represented by n-bit vector, λ(ƒ_(c))={λ_(ƒ) (0), λ_(ƒ) (1), . . . , λ_(ƒ) (N)}, called as simplified vector of ANF of ƒ_(c).

Following the equation 15, for a given x of weight,

_(j,N) contains

$\quad\begin{pmatrix} j \\ k \end{pmatrix}$

nonzero monomials. The expression of binomial coefficients modulo a prime number

is given by Lucas Theorem. Given two integers, r and s and their

-adic representations, r=Σ_(i=0) ^(k)r_(i)

^(i) and, s=Σ_(i+0) ^(k)s_(i)

^(i), by Lucas theorem, following equation is obtained.

$\begin{matrix} {\begin{pmatrix} r \\ s \end{pmatrix} \equiv {{\Pi_{i = 0}^{k}\begin{pmatrix} r_{i} \\ s_{i} \end{pmatrix}}\mspace{14mu} {mod}\mspace{11mu} }} & (16) \end{matrix}$

For

=2, the present system obtains get:

$\begin{pmatrix} r \\ s \end{pmatrix} \equiv 1$

mod 2 iff supp(s)⊆supp (r) i.e. s

r which means that ∀i, s_(i)≤r_(i). Following values are obtained for g_(c) and λ_(ƒ) as below.

g _(c)(i)=⊕(_(k) ^(i)) for, k=0,1, . . . ,i  (17)

λ(k)=⊕λ_(ƒ)(k),k

i  (18)

Further, the present disclosure describes the properties of the present BaReNPI True Random System. Balanced property of the BaReNPI True Random system generates combined function ƒ_(c) exists if its simplified value vector g_(c) follows the following condition.

∀0≤i≤N,g _(c)(i)=g _(c)(N−i)

1, where

is sum over F ₂  (19)

Trivial balanced functions exactly correspond to symmetric functions. Therefore, the combined function ƒ_(c) verifies the condition D₁ƒ_(c)=1 signifying the all-one vector. Functions with D₁ƒ_(c)=1 do not really exist for even values of n because for any vectory such that wt(v)=n/2, The D₁ƒ_(c) can be calculated as:

D ₁ƒ_(c)=ƒ_(c)(v)

ƒ_(c)(v+1)=g _(c)(n/2)

g _(c)(n/2)=0  (20)

The above trivial balanced function property also corresponds to the odd case of trivial partitioning whereas the even cases represent the affine functions. Finding the patterns of the simplified value vector g_(c) of the combined function ƒ_(c) leads to the set of the n binomial coefficients for balanced symmetric function.

The resiliency of cryptographic functions is another important characteristic for designing robust and efficient algorithms in cryptography. The correlation between the output of the generated function and a small subset of its input variables leads to the correlation attack. A given symmetric balanced combined function ƒ_(c) of N variables are m-resilient if it remains balanced when any m input variables are fixed and remaining (n-m) bits are altered. There is no upper or lower bound on the order of resiliency of such functions; the function is more resilient if m is higher. The property of resiliency is related to the weights of the restrictions of the f_(c) to some subspaces.

∀f_(c)∈

_(N) and any affine any subspace

⊂F₂ ^(N), the restriction of f_(c) to

is the function given as:

:

→F₂  (21)

x

f _(c)(x),∀x∈

  (22)

where, f

can be determined by the with a function of dim (

) variables.

The subspace

is spanned by k canonical basis vectors and its supplementary subspace is

. The restrictions of f_(c) to

and to all its cosets are given by a+

where, a∈

. When f_(c) is symmetric and balanced,

is represented as:

=

s₁, s₂, . . . , s_(k)

and f_(a+)

becomes symmetric and balanced too. Moreover, for all s∈

, the following equation can be expressed.

f _(a+)

(s)=ƒ(a+s)=g _(c)(wt(a)+wt(s))  (23)

which depends upon the weight of s when a is fixed. The simplified value vector and the simplified ANF vector

can be deduced from f_(c) as given below.

$\begin{matrix} {{{_{c_{f_{a + }}}(i)} = {_{c}\left( {i + {{wt}(a)}} \right)}},{\forall i},{0 \leq i \leq k}} & (24) \end{matrix}$

(i)=⊕λ_(ƒ)(i+j),∀i,0≤i≤k and j

wt(a)  (25)

Nonlinearity is an important design characteristic for cryptographic functions used in cryptographic algorithms to prevent different types of correlation or linear attacks. In our proposed combined function generator, this feature depends on the output vectors in v_(o) _(i) ·v_(o) _(i) is also considered as the affine transformations of the functions generated from the present BaReNPI true random system.

FIG. 4b illustrates an exemplary view 401 of the hamming distance of output vectors, in accordance with at least one embodiment. The nonlinearity is calculated by the hamming distance between two affine transformations. For example, two output vectors are: v_(o) and u_(o) of 8 bits each. As shown in FIG. 1, the hamming distance between the two vectors=6. Therefore, the non linearity of the function is 6. To generalize the concept of the nonlinearity of such a function ƒ_(c) is given as:

_(ƒ) _(c) =Σ_(i,j=1) ^(n) v _(o) _(i) ≠u _(o) _(j) ,v _(o) _(i) and u _(o) _(j) are output vectors  (26a)

Moreover following the Equation 11, the non-linearity of present BaReNPI true random system is also related with the Walsh transformation as:

$\begin{matrix} {{\; l_{f_{c}}} = {2^{n - 1} - {\frac{1}{2}\max {{W_{f_{c}}(e)}}}}} & \left( {26b} \right) \end{matrix}$

Propagation characteristics are determined by the cryptographic properties of the derivatives of the functions generated by BaReNPI true random system. All derivatives of the combined functions that output from the SGFR are linearly equivalent when they have a fixed Hamming weight of n/2. Our function ƒ_(c) of N variables generated from the proposed BaReNPI True Random System satisfies the propagation criterion of degree k and order m if any affine function obtained from ƒ_(c) by keeping m input bits constant satisfies the propagation criterion of degree k.

Let ƒ_(c)∈

_(N) and let x,y∈F₂ ^(N) be such that

${{wt}(x)} = {{{wt}(y)} = {\frac{n}{2}.}}$

then, D_(x)ƒ_(c) and D_(y)ƒ_(c) are linearly equivalent. This signifies a linear permutation μ of F₂ ^(N) such that D_(x)ƒ_(c)=D_(y)ƒ_(c)∘, where ∘ is composite function. The permutation μ exists on {1, 2, . . . , N} such that y=μ(x). Since, ƒ_(c) is symmetric and balanced, the present system obtains:

$\begin{matrix} \begin{matrix} {{D_{y}{f_{c}\left( {\mu (a)} \right)}} = {{f_{c}\left( {\mu (a)} \right)}\mspace{14mu} \mspace{14mu} {f_{c}\left( {{\mu (a)} + y} \right)}}} \\ {= {{f_{c}(a)}\mspace{14mu} \mspace{14mu} {f_{c}\left( {{\mu (a)} + {\mu (x)}} \right)}}} \\ {= {{f_{c}(a)}\mspace{14mu} \mspace{14mu} {f_{c}\left( {\mu \left( {a + x} \right)} \right)}}} \\ {= {{f_{c}(a)}\mspace{14mu} \mspace{14mu} {f_{c}\left( {a + x} \right)}}} \\ {= {D_{x}{f_{c}(a)}}} \end{matrix} & (27) \end{matrix}$

Let k be an integer, 1≤k≤n−1, V _(l)=

v_(i) ₁ , v_(i) ₂ , . . . , v_(i) _(n−k)

and ε_(k)=v_(n−k+1)+ . . . +v_(n). Then the restriction of D_(ε) _(k) ƒ_(c) to all affine subspaces y+V, y∈

v_(i) ₁ , v_(i) ₂ , . . . , v_(i) _(n−k)

is given by:

g _(y) :V→F ₂  (28)

x

D _(ε) _(k) ƒ_(c)(a+y)  (29)

Equations (28) and (29) are also symmetric functions of (n−k) variables and, weight is n/2. Moreover, their simplified value vectors and ANF vectors are given for all 0≤i≤n−k by:

$\begin{matrix} {{g_{c_{g_{y}}}(i)} = {{g_{c}\left( {i + {{wt}(y)}} \right)}{g_{c}\left( {i + k - {{wt}(y)}} \right)}}} & (30) \end{matrix}$ λ_(g) _(y) (i)=

λ_(ƒ)(i+j)

λ_(ƒ)(i+j),  (31)

Let ∈V _(l). then for any z=a+y with a∈V, then the following equation is obtained.

wt(z)=wt(a)+wt(y)  (32)

wt(z+ε _(k))=wt(a)+wt(y+ε _(k))=wt(a)+k−wt(y)  (33)

Thus, ∀a∈V,

$\begin{matrix} {{D_{ɛ_{k}}{f_{c}\left( {a + y} \right)}} = {{{f_{c}\left( {a + b} \right)}\mspace{14mu} \mspace{14mu} {f_{c}\left( {a + ɛ_{k} + y} \right)}} = {{{{wt}(a)} + {{wt}\left( {y + ɛ_{k}} \right)}} = {{{{wt}(a)} + k - {{wt}(y)}} = {{_{c}\left( {{{wt}(a)} + {w(y)}} \right)}\mspace{14mu} \mspace{14mu} \left( {{{wt}(a)} + k - {w(y)}} \right)}}}}} & (34) \end{matrix}$

Equation. 18 signifies

_(c_(g_(y)))

also follows the symmetric property which means that partial derivatives of function generator outputs are also propagated with the propagation features. To calculate simplified ANF vector of

_(c_(g_(y))),

the ANF of ƒ_(c) is decomposed as given below.

ƒ_(c)(a+b)=⊕_(u∈F) ₂ _(n−k)⊕_(v∈F) ₂ _(k)λ_(u,v)Π_(i=1) ^(n−k) a _(i) u ^(i)Π_(j=n−k+1) ^(n−k) b _(j) ^(v) ^(j) ,∀(a,b)∈(V,V )   (35)

Then, for any y∈V and a∈V, the following equation is obtained,

$\begin{matrix} {{_{c_{g_{y}}}(a)} = {{D_{ɛ_{k}}{f_{c}\left( {a + y} \right)}} = {\oplus_{u \in F_{2}^{n - k}}{\oplus_{v \in F_{2}^{k}}{\lambda_{u,v}\Pi_{i = 1}^{n - k}\; a_{i}^{u_{i}} \times \left( {{\Pi_{i = 1}^{k}\left( {y_{i}\mspace{14mu} \mspace{14mu} 1} \right)}^{v_{i}}\mspace{14mu} \mspace{14mu} \Pi_{i = 1}^{k}y_{i}^{v_{i}}} \right.}}}}} & (36) \end{matrix}$

The present disclosure further discusses the correlation immunity characteristics exhibit by our proposed generator's outputs. Considering each of the N input variables V_(i) as n bit binary vector V_(i)={v₁, v₂, . . . , v_(n)j}i=1, 2, . . . , N, for the combined symmetric and balanced function ƒ_(c), ƒ_(c) is correlation immune if:

$\begin{matrix} {{{{Prob}\left( {f_{c} = v_{i}} \right)} = \frac{1}{2}},{1 \leq i \leq n}} & (37) \end{matrix}$

The set of all correlation immune functions of N variables of n bits each is denoted by CI_(N) ^(n). Further, the weight of correlation immune function ƒ of our proposed generator is given by:

$\begin{matrix} {{a = {{{wt}\left( f_{c} \right)} = \frac{n}{2}}},{f_{c} \in {CI}_{N}^{n}}} & (38) \end{matrix}$

Let, ƒ_(c) ^(u) and ƒ_(c) ^(l) be the upper and lower halves of equal length n/2 for our function generator's outputs as shown in FIG. 3. As, ƒ_(c)∈CI_(N) ^(n),

${{wt}\left( f_{c}^{u} \right)} = {{{wt}\left( f_{c}^{l} \right)} = {\frac{n}{4}.}}$

If there are k places out of n/4 1's in the ƒ_(c) ^(u) where the corresponding positions in reverse of ƒ_(c) ^(l), denoted as (ƒ_(c) ^(l))^(r), do not match. Therefore, the number of bits match with respect to 1 for the function is given as:

$\begin{matrix} {{M_{1}\left( {f_{c}^{u},\left( f_{c}^{l} \right)^{r}} \right)} = {\frac{n}{4} - k}} & (39) \end{matrix}$

Following the Equation 23, assumed that there are k places out of n/4 1's in the ƒ_(c) ^(u) where the corresponding positions in (ƒ_(c) ^(l))^(r) do not match. Therefore, the number of bits match with respect to 0 for the function is given as:

$\begin{matrix} {{M_{0}\left( {f_{c}^{u},\left( f_{c}^{l} \right)^{r}} \right)} = {\frac{n}{4} - k}} & (40) \end{matrix}$

FIG. 4c illustrates a conceptual diagram 402 of the lower and upper halves of bit string, in accordance with at least one embodiment. Hence, the following expression can be obtained:

$\begin{matrix} {{M\left( {f_{c},\left( f_{c} \right)^{r}} \right)} = {{2\; {M\left( {f_{c}^{u},\left( f_{c}^{l} \right)^{r}} \right)}} = {{2\left( {\frac{n}{4} - k + \frac{n}{4} - k} \right)} = {n - {4\; k}}}}} & (41) \end{matrix}$

The correlation immune functions with the same values of M(ƒ_(c), (ƒ_(c))^(r)) form an equivalence class.

Proposition 3: Let ƒ_(c)∈CI_(N) ^(n); and M(ƒ_(c), (ƒ_(c))^(r))=m. Then ∀M₀(ƒ_(c), (ƒ_(c))^(r)) and M₁(ƒ_(c), (ƒ_(c))^(r))

Min [M ₀(ƒ_(c),(ƒ_(c))^(r))−M ₁(ƒ_(c),(ƒ_(c))^(r))]=min [m]

0

Apart from the correlation immunity, algebraic immunity is also a requirement for cryptographic algorithms. Algebraic immunity also is related with the annihilator of a function. This property helps the algorithm to prevent algebraic attacks against the cryptographic algorithms.

Given, ƒ_(c)∈

_(N), any function of the set A(ƒ_(c))={g∈

_(N)|gf=0} is defined as the annihilator of the function ƒ_(c). The algebraic immunity of ƒ_(c) is denoted by AI(ƒ_(c)) is minimum degree of all nonzero annihilators of ƒ_(c) or ƒ_(c)+1. The value of AI(ƒ_(c)) is given as:

AI(ƒ_(c))=min[deg(g)|g≠0,g∈A(ƒ_(c))∪A(ƒ_(c)+1)  (42)

As the present BaReNPI true random system outputs the symmetric function which is balanced and therefore minimum degree is always n/2. Therefore, the algebraic immunity is always n/2 which is always optimal.

FIG. 5 illustrates a flowchart 500 of the present method for generating a symmetrically balanced output to accomplish a plurality of predefined properties, in accordance with at least one embodiment. In an embodiment, the predefined properties comprise balancedness, resiliency, non-linearity, propagation, immunity, and symmetricity. The method comprises a step 502 of receiving a plurality of registers with B bits, an expression length, and a plurality of operators through a receiving module. In an embodiment, the expression length is a number of terms in a combined function. In an embodiment, the combined function comprises the logic gates to strengthen a plurality of hash algorithms, a plurality of stream ciphers and a round function module of block ciphers.

The method then includes a step 504 of generating a random expression population through a random expression population generation module. Further, the method includes the step 506 of computing a fitness value (fitness function) of the random expression population through a fitness function module. The method then includes a step 508 of determining if the computed fitness value (F) is equal to B/2. The method then includes the step 510 of providing registers with B bits if a plurality of output bits are having an equal number of 1s and 0s through a conditional module. The conditional module performs a step 514 of mutation in the operators if the output bits are not having an equal number of 1s and 0s, i.e., no. of 1=no. of 0=B/2 (considering B is a total number of the bits). In an embodiment, the mutation in the operators is performed by changing a combination of at least one a plurality of logic gates, the registers and a plurality of variables. Further, the present method includes a step 512 of determining if the computed fitness value is not equal to B/2, the present method checks if the fitness value lies between a predefined range and then performs mutation in operators. If the fitness value does not lie in the predefined range, then the method reinitiates the overall operation. In an embodiment, the present method utilizes a hamming distance of output string to compute a distance between at least two strings of equal length.

Thus the present system provides an efficient, simpler and more elegant true random system that produces the symmetric balanced output that fulfills the properties such as balancedness, resiliency, non-linearity, propagation, and immunity (BaReNPI). Further, the present system and method output a combined function comprises logic gates to help the hash algorithms, stream ciphers and round function module of block ciphers to be more robust. The combined function can be used in different crypto-graphic modules. Additionally, the present invention randomly selects the Boolean functions and variable inputs for the functions. The input variables are not dependent on the output analysis except the variable length and expression length.

Further, the present disclosure describes the validation of the present system performed during the experiments. Following is the table 1 to describe the significance of the statistical tests for randomness.

Test Name Significance Monobit To check the frequency of 1 and 0 to be equal Frequency test Extended from the previous test for M bit block within a block Runs Test To check the oscillation of 1 and 0 is fast Test for longest run Longest ran of 1s in an M bit block Binary matrix rank To check for linear dependency among fixed length test substrings Spectral test To check repetitive patterns Nonoverlapping Whether a given pattern is present and its no. of template matching occurrences as expected. Test Overlapping Same as previous but overlapping is allowed in this template matching process. Test Maurers test No. of bits in between of two matched patterns Linear complexity To check the feedback of LFSR. Therefore NA in Test our case. Serial Tests For overlapping pattern frequencies. Extended from Overlapping pattern matching test. Therefore, not performed as per NIST recommendation. Approximate To compare the frequency of overlapping blocks for entropy test two consecutive lengths Cumulative Sum To check if any bitsum is too large or too small test Random Excursions No. of cycles having exactly k visits Random Excursions To detect deviations from the expected number of variant visits to various states in the random walk.

To perform the tests, the hypothesis has been set up for all the tests as:

H₀ (null hypothesis): The outputs of BaReNPI True Random System is random.

H₁ (alternate hypothesis): The outputs of BaReNPI True Random System is non-random.

For each of the applied tests, a decision or conclusion is taken that accepts or rejects the null hypothesis which means whether the present BaReNPI True Random System is (or is not) able to produce random values, based on the sequence that is produced. For each test, a relevant randomness statistic is chosen and used to determine the acceptance or rejection of the null hypothesis. Under an assumption of randomness, such a statistic has a distribution of possible values. A theoretical reference distribution of this statistic under the null hypothesis is determined by mathematical methods which determine a critical value. During a test, a test statistic value (p-value) is computed on the data or sequence of bits generated by the BaReNPI True Random System. This test statistic value is compared to the critical value. If the test statistic value is greater than the critical value, the null hypothesis for randomness is rejected else the null hypothesis is accepted. In practice, the reason that statistical hypothesis testing works is that the reference distribution and the critical value are dependent on and generated under a tentative assumption of randomness. If the randomness assumption is, in fact, true for the data at hand, then the resulting calculated test statistic value on the data will have a very low probability (e.g., 0.01) of exceeding the critical value. This value of 0.01 is also called the level of significance. If the p-value is greater than the level of significance, the null hypothesis can be accepted. The summarization of the p-values of the above said tests is given in Table-2.

Table 2 provides statistical tests on the present BaReNPI True Random System

Monobit Frequency test Runs Test for the longest Binary matrix test within a block test run in the block rank test Proposed 1.00  1.00  0.723  0.1933  0.5320 BARENPI Spectral test Non-overlapping Overlapping Maurer's Linear complexity TRUE template template test test RANDOM matching test matching test SYSTEM 0.300 0.300  0.280 0.777 NA Serial test Approximate Cumulative sum Random excursions Random excursions entropy test test test variant test NA 0.2770 0.433 0.777 0.777

The present true random system has been applied for two algorithms: AES (block cipher) and RC4 (stream cipher) which is further described in the present disclosure,

Application of the true random system for key expansion module in AES: the main objective of the adding the functionalities of BaReNPI true random system in AES is to enable the key expansion module with some randomness feature. The modified key expansion module has been shown in FIG. 6, the changes are highlighted by dash lines. FIG. 6 illustrates an exemplary view 600 of a modified key expansion for 14 round AES, in accordance with at least one embodiment. The randomness of the present BaReNPI true random system has been used in three parts. First, in the function of g; secondly, the recursive word generation from key spaces, and thirdly but most prominently, addition of RC_(i) and BaReNPI true random system for generating the words from w₀ to w₇.

As shown in FIG. 6, each column in the key space is considered as w_(i) word. As the key size is 256 bits, the eight words {w₀, w₁, w₂, w₃, w₄, w₅, w₆, w₇} are in the very first step. The 8^(th) word i.e. w₇ is going through a function g. This function is also using the BaReNPI functionalities just before the output of the function. The output of g is then used to generate the other words processing through a series of the present true random system. The same process is repeated till the required number of words for the 14 rounds in AES are generated. For the decryption process, the generated words are saved and used reversely with the cipher text to get back to the plaintext.

Application of the true random system for key schedule randomization in RC4: the first stage of RC4 key scheduling is modified. In this modification, the present BaReNPI true random systems are added for each byte transferred from K to T. For this, the true random system gets two inputs from two consecutive bytes of K. The bytes in K are considered to be iterative till the completion of bytes of T. For the last byte of T to be generated the last byte of K (after expanding) and the first byte of K is considered as the inputs to the random system. At this time, the key stream is stored accordingly to byte for decryption process. The modification has been summarized in following Algorithm-1. All the other modules are kept same and therefore only the modified process is shown in FIG. 7. FIG. 7 illustrates an exemplary view 700 of the proposed modification in RC4 scheme, in accordance with at least one embodiment.

Algorithm-1 for i = 0 to 255 do if (keylen==256) then for j=0 to 255 T’[j]=k[i] else for j=0 to keylen recursively copy k[j]to T’[i] end loop end loop for i=0 to 254 do  T[i] = T’[i] 

 T’[i+1] //

 represents BaReNPI true random system end loop T[255] = T’[255] 

 T’[0]

While embodiments of the present disclosure have been illustrated and described, it will be clear that the disclosure is not limited to these embodiments only. Numerous modifications, changes, variations, substitutions, and equivalents will be apparent to those skilled in the art, without departing from the scope of the disclosure, as described in the claims. 

What is claimed is:
 1. A computer-implemented method for generating a symmetrically balanced output to accomplish a plurality of predefined properties, the method comprising steps of: receiving a plurality of registers with B bits, an expression length, and a plurality of operators through a receiving module; generating a random expression population through a random expression population generation module; computing a fitness value of the random expression population through a fitness function module; and providing registers with B bits if a plurality of output bits are having an equal number of 1s and 0s through a conditional module, wherein the conditional module performs mutation in the operators if the output bits are not having an equal number of 1s and 0s.
 2. The method according to claim 1, wherein the mutation in the operators is performed by changing a combination of at least one a plurality of logic gates, the registers and a plurality of variables.
 3. The method according to claim 1, wherein the expression length is a number of terms in a combined function.
 4. The method according to claim 1, wherein the combined function comprises the logic gates to strengthen a plurality of hash algorithms, a plurality of stream ciphers and a round function module of block ciphers.
 5. The method according to claim 1, utilizes a hamming distance of output string to compute a distance between at least two strings of equal length.
 6. The method according to claim 1, wherein the predefined properties comprise balancedness, resiliency, non-linearity, propagation, immunity, and symmetricity.
 7. A system for generating a symmetrically balanced output to accomplish a plurality of predefined properties, the system comprises: a processor; and a memory to store machine-readable instructions that when executed by the processor cause the processor to: receive a plurality of registers with B bits, an expression length, and a plurality of operators through a receiving module; generate a random expression population through a random expression population generation module; compute a fitness value of the random expression population through a fitness function module; and provide registers with B bits if a plurality of output bits are having an equal number of 1s and 0s through a conditional module, wherein the conditional module performs mutation in the operators if the output bits are not having an equal number of 1s and 0s.
 8. The system according to claim 7, wherein the mutation in the operators is performed by changing a combination of at least one a plurality of logic gates, the registers and a plurality of variables.
 9. The system according to claim 7, wherein the expression length is a number of terms in a combined function.
 10. The system according to claim 7, wherein the combined function comprises the logic gates to strengthen a plurality of hash algorithms, a plurality of stream ciphers and a round function module of block ciphers.
 11. The system according to claim 7, utilizes a hamming distance of output string to compute a distance between at least two strings of equal length.
 12. The system according to claim 7, wherein the predefined properties comprise balancedness, resiliency, non-linearity, propagation, immunity, and symmetricity.
 13. A device in a network, comprising: a non-transitory storage device having embodied therein one or more routines operable to generate a symmetrically balanced output to accomplish a plurality of predefined properties; and one or more processors coupled to the non-transitory storage device and operable to execute the one or more routines, wherein the one or more routines include: a receiving module to receive a plurality of registers with B bits, an expression length, and a plurality of operators; a random expression population generation module to generate a random expression population; a fitness function module to compute a fitness value of the random expression population; and a conditional module to provide registers with B bits if a plurality of output bits are having an equal number of 1s and 0s, wherein the conditional module performs mutation in the operators if the output bits are not having an equal number of 1s and 0s.
 14. The device according to claim 13, wherein the mutation in the operators is performed by changing a combination of at least one a plurality of logic gates, the registers and a plurality of variables.
 15. The device according to claim 13, wherein the expression length is a number of terms in a combined function.
 16. The device according to claim 13, wherein the combined function comprises the logic gates to strengthen a plurality of hash algorithms, a plurality of stream ciphers and a round function module of block ciphers.
 17. The device according to claim 13, utilizes a hamming distance of output string to compute a distance between at least two strings of equal length.
 18. The device according to claim 13, wherein the predefined properties comprise balancedness, resiliency, non-linearity, propagation, immunity, and symmetricity. 