SlideShare a Scribd company logo
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012



   Design of a Pseudo-Random Binary Code Generator
           via a Developed Simulation Model
                                                  A. Ahmad and D. Al-Abri
                                       Department of Electrical and Computer Engineering
                                       College of Engineering, Sultan Qaboos University
                                   P. O. Box 33, Postal Code 123; Muscat, Sultanate of Oman
                                           Tel.: (968) 2414 1327; Fax. (968) 2441 3416
                                        E-mails afaq@squ.edu.om; alabrid@squ.edu.om


Abstract—This paper presents a developed tool for Pseudo-                        Optimized Counters
Random Binary Code generator (PRBCG). Based on extensive                   In this paper we present a developed simulated tool which
study of LFSR theory we developed the simulation model of
                                                                       is capable of generating PRBC efficiently. The developed
PRBCG. The developed model is faster and simulates the
process for very high length of Linear Feedback Shift Registers
                                                                       tool is culmination of exhaustive study of LFSR theory.
(LFSRs). We tested our model for the value n = 300 where n is          Therefore, in the ensuing section first we briefly present the
the length of the LFSR. The developed software model is also           mathematical modeling of LFSR.
capable of providing the transition states of different bits of
LFSRs. Further, the model has capability of switching to any           II. MATHEMATICAL MODEL OF LINEAR FEEDBACK SHIFT REGISTER
possible characteristic polynomial (feedback connections) of
n-bit LFSR. Also, the model is designed such that it can                    There exist many LFSR models. The classifications of
accommodate all the possible initial conditions (2n) of LFSR.          LFSR models are based on the placements of the Exclusive-
                                                                       OR circuits and the shifts of the registers. The classifications
Index Terms— Pseudo-Random Binary Code, Linear Feedback                on basis of shifts are right to left or left to right. Also, the
Shift Registers, Generating Function, Feedback Connection,             shift is considered from the first bit to last bit or from last bit
Initial Condition, m-sequence                                          to the first bit. Similarly, the classifications of LFSRs on the
                                                                       basis of Exclusive-OR circuits are recognized as External
                         I. INTRODUCTION                               Exclusive-OR (EEOR) or as Internal Exclusive-OR (IEOR).
    Pseudo-Random Binary Code (PRBC) is widely used in                 Figure 1 depicts an n-bit LFSR circuit. This structure is based
modern engineering. The generation of PRBCs and study of               on External Exclusive-OR circuits. The shift register shifts
their properties has attained the more and more attention of           the data from bit n to bit 1 while the feedback taps vector [c0,
the researchers because of its wide applications. Therefore,           c1, . . . cn]. The feedback taps c1, c2, . . cn are linked with flip-
how to design the Linear Feedback Shift Register (LFSR)                flop’s outputs Qn, Qn-1, . . Q2, Q1 respectively whereas c0 link
based hardware circuit to generate PRBCs. Moreover, the                represents the connection between the output of EEOR
PRBC sequence o the longest cycle is popularly known as                circuits and the input of the flip-flop n. The state space
Maximal Length PRBC sequence (m-sequence). The m-                      model of this LFSR can be described as follows.
sequence which is one of the basic sequences has always
been topic of current research.
    Linear Feedback Shift Registers (LFSRs) have been used
for Pseudo-Random Binary Code Sequence (PRBCS)
generation. The PRRBSs have been used for multiple uses in
digital systems design. Applications include cryptographic
applications like stream ciphers and data hiding. The concept
of LFSR theory is useful in many error correction and detection
codes. The PRRBSs have been used in Built-In Self-Testing
(BIST) for VLSI circuits [1] – [19]. Many more application of                                 Figure 1. An n-bit LFSR
LFSR and PRBCS can be listed as given below:                              The state space model of this LFSR structure can be
          Wireless Communications                                      described as given in equation (1). To explain let matrix [A]
          Data Integrity                                               represent the state transition matrix of order n × n, for an n
          Checksums                                                    stage LFSR shown in Fig. 1. Let the state at any time ‘t’ be
          Data Compression                                             represented by vector [Q(t)] = [ Qn(t), ... ,Qj(t), ... ,Q2(t), Q1(t)]
          Pseudo-random Number Generation (PN)                         (which is effectively the contents of the LFSR) where each Qj
                                                                       represents the state of the jth stage of the LFSR. Further, let
          Direct Sequence Spread Spectrum
                                                                       the LFSR feedback stages be numbered from C0 to Cn,
          Scrambler/Descrambler                                        proceeding in the same direction as the shifting occurs i.e.
© 2012 ACEEE                                                      33
DOI: 01.IJIT.02.01. 53
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012


left to right. Let the present state of the LFSR be represented                        TABLE I. THE OPERATION   OF LFSR OF EXAPLE   1
by [Q(t)] and, one clock later, the next state by [Q(t+1)]; then
the relationship between the two states is given by as
described in equation (1).




                                                             (1)


                                                                         Any binary data sequence can be represented in form of
Where, cj = 0 or 1, for 1 j n-1 and cj = 1, for j = 0, n.                polynomial in GF(2). Therefore, the tap vector for an LFSR
    In equation (1), the values of cj show the existence or              can be represented in the form of polynomial and is technically
presence of a feedback connection from the jth stage of the              known as characteristic polynomial. Equations (5) define a
LFSR. Thus the state equation for this model can be given as             general form of characteristic polynomial and let us call it as
in equation (2).                                                         P(x).
        [Q(t+1)] = [A] * [Q(t)]                           (2)
If [Q] = [Q(0)] represents a particular initial loading of the                                                                           (5)
LFSR, i.e. the content of each flip-flop is zero. Then the
sequence of states through which the LFSR will pass will all
                                                                         Let {am} = [a0 , a1 , . . , ai , . .], represent the output sequence
the time zeros; means the LFSR is locked. Otherwise, for any
                                                                         generated by the LFSR used as PRBCS, where ai = 0 or 1.
other loadings the LFSR will be governed by equation (3)
                                                                         Then this sequence can be represented as as given in
during its successive operation times.
                                                                         equation (6).
    [Q(t)], [A][Q(t)], [A]2[Q(t)], [A]3[Q(t)],..           (3)
Let the matrix ‘period’ be the smallest integer p for which [A]p                                                                         (6)
=I, where I is an identity matrix. Then [A]p[Q(t)] = [Q(t)] for
any non zero initial vector [Q(0)], indicating the ‘cycle length
                                                                         From the structure of the type of the LFSR shown in Fig. 1, it
(or period)’ of the LFSR is p. As mentioned above the cycle
                                                                         can be seen that if the current state of the ith flip-flop is am-i ,
length for [Q(0)] = 0 is always 1, independent of matrix [A].
                                                                         for i = 1, 2 , ... , n , then by the recurrence relation an equation
Thus, on the basis of this property of periodicity of LFSR
                                                                         can be given as below.
and equation (4), it follows that.
     [Q(t)] = [Q(t+p)]=[A]p[Q(t)]                            (4)
                                                                                                                                         (7)
To demonstrate equation (4) and to verify its existence let us
consider an example as below. Example 1: Consider a 3-bit
LFSR as shown in Fig. (2). The LFSR has feedback                         The generating function G(x) associated with the PRBCS can
connections as c0 = c1 = c3 = 1 and c2 = 0. It can be verified by        be mathematically defined as in equation (8).
the by using equations (1) and (4) that this LFSR structure
has period of 7.                                                                                                                         (8)


                                                                         Or,

                                                                                                                                         (9)


                                                                         Or, equation (9) can be rewritten as:

                                                                                                                                        (10)
                      Figure 2. A 3-bit LFSR
Table I demonstrates the all possible sequences of states
through which this LFSR structure passes before repeating
the initial loading. The LFSR is loaded with all 1’s content.

© 2012 ACEEE                                                        34
DOI: 01.IJIT.02.01. 53
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012


III. ABOUT THE DEVELOPMENT AND TESTING OF THE SIMULATED
                              MODEL

    To develop this simulation model we used Microsoft Visual
Basic .Net programming environment is used to create
graphical user application for the Microsoft Windows system.
The theory of LFSR discussed in the above sections are
embedded in this developed simulation model. In our
developed simulation model where the general structure of
LFSR model is programmed to target the objective of
generating PRBCS. Requesting immediate after the size of an
LFSR it generates lists of all possible polynomials for feedback
connections and initial loadings. Immediate after the initial
loading and feedback options are selected the developed
tool computes and outputs the PRBCS. Our simulation model
also has provision of controlling the length of the PRBCS.
Just to elaborate to the readers we present a model
demonstration for data of example 1. The execution of the
program outputs the first window which is shown in Fig. 3.




                                                                                              Figure 5: The output for n =3
                                                                             computed and results are available in the window. These
                                                                             results can also be stored in files.
           Figure 3: The first window of Model “LFSR”                            We tested our model for n = 300 but it is difficult to show
                                                                             the result. A partial window for n = 300 is shown in Fig. 6.
Immediate after feeding the value n = 3 it generates functional
windows for selecting P(x) and initial loadings as depicted in
Fig. 4.




                                                                                         Figure 6: Simulated Window for n = 300
   Figure 4: Selection window for the options of P(x) and initial
                     loadings of Model “LFSR”
                                                                                                     CONCLUSIONS
We can control the length of the generated sequence. As
shown in Fig. 5 that for n = 3, with desired sequence length of                  This work is based on the study of the theory of LFSR.
12, initial state loading of [1, 1, 1] and P(x) = ([1, 1, 0, 1] = 1 +        Hence this tool is developed after a comprehensive study of
x + x3) that PRBCS repeats after the period of 7. It can also be             LFSR theory and its related issues. First we tested our model
visualized that maximum 12 terms of G(x) are computed. Our                   for many values of n. We verified our models for small sizes
model provides the complete state table for the complete                     of n. We also demonstrated and executed this model for n up
operation of generating PRBCS. Also, each G(x) and N(x) are                  to 300 and it runs satisfactorily. This developed tool requires
© 2012 ACEEE                                                            35
DOI: 01.IJIT.02.01. 53
ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012


a very small memory space and execution time is also less.                    [9] Jamil, T. and Ahmad, A., “An investigation in to the application
During the test and execution of this developed model we                      of linear feedback shift registers for steganography,” Proceedings
never faced the problem of hanging of computer. Also, the                     IEEE SoutheastCon2002, Columbia, SC, USA, April 5 – 7, 2002,
output file can be exported either in EXCEL, MATLAB, C                        pp. 239 – 244, 2002
and FORTRAN 95.                                                               [10] Ahmad A., Al-Musharafi, M. J., Al-Busaidi, S., “Design and
                                                                              study of a strong stream crypto-system model for e-commerce,”
                                                                              International Council for Computer Communication Publishers,
                         ACKNOWLEDGMENT                                       Washington DC, USA (The ACM Library), vol. 1, pp. 619 – 630,
   The authors wish to thank and acknowledge the support                      2002
grant (SQU-DVC/ PSR/RAID/2010/23) provided by Sultan                          [11] Ahmad, A., Development of State Model Theory for External
                                                                              Exclusive NOR Type LFSR Structures, Enformatika, vol. 10, pp.
Qaboos University, Sultanate of Oman.
                                                                              125 – 129, 2005
                                                                              [12] Ball, J.R., Spittle, A.H., Liu, H.T., ”High-speed m sequence
                            REFERENCES                                        generation: a further note,” Electronics Letters, vol. 11, no. 5, pp.
[1] Golomb, S.W., “Shift Register Sequences. Aegean Park Press,”              107 – 108, 11 July 2007
Leguna Hills - U.S.A., 1982                                                   [13] Ahmad, A., “Investigation of Typical Properties of Some LFSR
[2] Ahmad A., Nanda N.K. and Garg K., “A critical role of primitive           Structures,” Journal of System Science and Engineering, vol. 17,
polynomials in an LFSR based testing technique,” IEE Electronics              no. 1, pp. 65 – 69, 2008
Letters (UK), vol.24, no.15, 1988, pp. 953 – 955, 1988                        [14] Ahmad, A., and Al-Maashri, A., “Investigating Some Special
[3] Ahmad, A., Nanda, N. K. and Garg, K., “The use of irreducible             Sequence Length Generated Through an External Exclusive-NOR
characteristic polynomials in an LFSR based testing of digital                Type LFSRs,” International Journal Electrical and Computer
circuits,” Proceedings of 4th IEEE international conference of region         Engineering, (PERGAMON, Elsevier Science), vol. 34, pp. 270 –
10 (TENCON-89), pp. 494 – 496 1989                                            280, 2008
[4] Ahmad A., Nanda N.K. and Garg K., “Are primitive polynomials              [15] Ahmad, A., Al-Mashari, A. and Al-Lawati, A. J., “On Locking
always best in signature analysis?” IEEE design & Test of Computers           Conditions in M-Sequence Generators for the Use in Digital
(USA), 1990, vol.7, no.4, pp. 36 – 38, 1990                                   Watermarking”, Proceedings International Conference on Methods
[5] Ahmad, A., Nanda, N. K., and Garg, K., “An efficient design of            and Models in Computer Science (ICM2CS09), pp. 111 – 115,
maximal length of pseudorandom test pattern generators,”                      2009
Proceedings of IEEE international conference on signals & systems,            [16] Fangfang Cheng, Jingyu Hua, Jiaxiang Zhu, Lei Tong and
held at Ail-Ain (UAE), Jan. 29 - 31, vol.1, pp. 27 – 34, 1990                 Liming Meng, “A Fast Generation Method of Bent Sequences and
[6] Ahmad A. and Elabdalla A. M., “An efficient method to                     Its Application in ADS Simulation,” Proceedings Wase international
determine linear feedback connections in shift registers that generate        conference on information engineering (ICIE-2010), pp. 328 –
maximal length pseudo-random up and down binary sequences,”                   331, 2010
Computer & Electrical Engineering - An Int’l Journal (USA), vol.              [17] Junying Sun and Jiaxing Chen, “Design of m sequence generator
23, no. 1, pp. 33-39, 1997                                                    based on protues,” Proceedings international conference on
[7] Ahmad, A., Al-Musharafi, M.J., and Al-Busaidi S., “A new                  computer, mechatronics, control and electronic engineering
algorithmic procedure to test m-sequences generating feedback                 (CMCE), pp. 126 – 128, 2010
connections of stream cipher’s LFSRs,” Proceedings IEEE                       [18] Ahmad, A., “A Simulation Experiment on a Built-In Self Test
conference on electrical and electronic technology (TENCON’01),               Equipped with Pseudorandom Test Pattern Generator and Multi-
vo. 1, pp. 366 – 369, 2001                                                    Input Shift Register (MISR)”, International journal of VLSI design
[8] Ahmad, A., Al-Musharafi, M.J., and Al-Busaidi S., Al-Naamany,             & Communication Systems (VLSICS), vol.1, No.4, 2010
A. M., and Jervase, A. J., “An NLFSR based sequence generator                 [19] A. Ahmad and L. Hayat, “Selection of polynomials for cyclic
for stream ciphers,” Proceedings (SETA’01) - An International                 redundancy check for the use of high speed embedded systems –
Conference on Sequences & Their Applications, pp. 11 – 13, 2001               An algorithmic procedure”, WSEAS Transactions on Computers,
                                                                              vol. 10, no. 1, pp. 16 – 20, 2011




© 2012 ACEEE                                                             36
DOI: 01.IJIT.02.01. 53
Ad

Recommended

Unit 8
Unit 8
Harish kumar Lekkala
 
The discrete fourier transform (dsp) 4
The discrete fourier transform (dsp) 4
HIMANSHU DIWAKAR
 
Dft and its applications
Dft and its applications
Agam Goel
 
Ma2520962099
Ma2520962099
IJERA Editor
 
Ch7 noise variation of different modulation scheme pg 63
Ch7 noise variation of different modulation scheme pg 63
Prateek Omer
 
TIME-ABSTRACTING BISIMULATION FOR MARKOVIAN TIMED AUTOMATA
TIME-ABSTRACTING BISIMULATION FOR MARKOVIAN TIMED AUTOMATA
ijseajournal
 
DSP_FOEHU - MATLAB 04 - The Discrete Fourier Transform (DFT)
DSP_FOEHU - MATLAB 04 - The Discrete Fourier Transform (DFT)
Amr E. Mohamed
 
DSP_2018_FOEHU - Lec 08 - The Discrete Fourier Transform
DSP_2018_FOEHU - Lec 08 - The Discrete Fourier Transform
Amr E. Mohamed
 
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
Amr E. Mohamed
 
Signals and Systems Assignment Help
Signals and Systems Assignment Help
Matlab Assignment Experts
 
Ee321s3.1
Ee321s3.1
amareyalew
 
Ff tand matlab-wanjun huang
Ff tand matlab-wanjun huang
Sagar Ahir
 
Dsp U Lec10 DFT And FFT
Dsp U Lec10 DFT And FFT
taha25
 
DSP_FOEHU - Lec 08 - The Discrete Fourier Transform
DSP_FOEHU - Lec 08 - The Discrete Fourier Transform
Amr E. Mohamed
 
Fourier Transform
Fourier Transform
Nidhi Baranwal
 
Kanal wireless dan propagasi
Kanal wireless dan propagasi
Mochamad Guntur Hady Putra
 
cr1503
cr1503
Md. Rokanuzzaman Mondol
 
Fourier supplementals
Fourier supplementals
Partha_bappa
 
Fourier series and applications of fourier transform
Fourier series and applications of fourier transform
Krishna Jangid
 
Final document
Final document
ramyasree_ssj
 
Vertex frequency
Vertex frequency
Vanessa Brischi Olivatto
 
Introduction to Fourier transform and signal analysis
Introduction to Fourier transform and signal analysis
宗翰 謝
 
DSP_FOEHU - Lec 09 - Fast Fourier Transform
DSP_FOEHU - Lec 09 - Fast Fourier Transform
Amr E. Mohamed
 
Dft,fft,windowing
Dft,fft,windowing
Abhishek Verma
 
Digital Communication
Digital Communication
Partha_bappa
 
Joint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDM
idescitation
 
Properties of fourier transform
Properties of fourier transform
Nisarg Amin
 
Fourier transform convergence
Fourier transform convergence
Jahidul Islam
 
Lfsr report
Lfsr report
Nandana Priyanka Eluri
 
Programmable PN Sequence Generators
Programmable PN Sequence Generators
Rajesh Singh
 

More Related Content

What's hot (20)

DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
Amr E. Mohamed
 
Signals and Systems Assignment Help
Signals and Systems Assignment Help
Matlab Assignment Experts
 
Ee321s3.1
Ee321s3.1
amareyalew
 
Ff tand matlab-wanjun huang
Ff tand matlab-wanjun huang
Sagar Ahir
 
Dsp U Lec10 DFT And FFT
Dsp U Lec10 DFT And FFT
taha25
 
DSP_FOEHU - Lec 08 - The Discrete Fourier Transform
DSP_FOEHU - Lec 08 - The Discrete Fourier Transform
Amr E. Mohamed
 
Fourier Transform
Fourier Transform
Nidhi Baranwal
 
Kanal wireless dan propagasi
Kanal wireless dan propagasi
Mochamad Guntur Hady Putra
 
cr1503
cr1503
Md. Rokanuzzaman Mondol
 
Fourier supplementals
Fourier supplementals
Partha_bappa
 
Fourier series and applications of fourier transform
Fourier series and applications of fourier transform
Krishna Jangid
 
Final document
Final document
ramyasree_ssj
 
Vertex frequency
Vertex frequency
Vanessa Brischi Olivatto
 
Introduction to Fourier transform and signal analysis
Introduction to Fourier transform and signal analysis
宗翰 謝
 
DSP_FOEHU - Lec 09 - Fast Fourier Transform
DSP_FOEHU - Lec 09 - Fast Fourier Transform
Amr E. Mohamed
 
Dft,fft,windowing
Dft,fft,windowing
Abhishek Verma
 
Digital Communication
Digital Communication
Partha_bappa
 
Joint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDM
idescitation
 
Properties of fourier transform
Properties of fourier transform
Nisarg Amin
 
Fourier transform convergence
Fourier transform convergence
Jahidul Islam
 
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
DSP_FOEHU - MATLAB 02 - The Discrete-time Fourier Analysis
Amr E. Mohamed
 
Ff tand matlab-wanjun huang
Ff tand matlab-wanjun huang
Sagar Ahir
 
Dsp U Lec10 DFT And FFT
Dsp U Lec10 DFT And FFT
taha25
 
DSP_FOEHU - Lec 08 - The Discrete Fourier Transform
DSP_FOEHU - Lec 08 - The Discrete Fourier Transform
Amr E. Mohamed
 
Fourier supplementals
Fourier supplementals
Partha_bappa
 
Fourier series and applications of fourier transform
Fourier series and applications of fourier transform
Krishna Jangid
 
Introduction to Fourier transform and signal analysis
Introduction to Fourier transform and signal analysis
宗翰 謝
 
DSP_FOEHU - Lec 09 - Fast Fourier Transform
DSP_FOEHU - Lec 09 - Fast Fourier Transform
Amr E. Mohamed
 
Digital Communication
Digital Communication
Partha_bappa
 
Joint Timing and Frequency Synchronization in OFDM
Joint Timing and Frequency Synchronization in OFDM
idescitation
 
Properties of fourier transform
Properties of fourier transform
Nisarg Amin
 
Fourier transform convergence
Fourier transform convergence
Jahidul Islam
 

Similar to Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model (20)

Lfsr report
Lfsr report
Nandana Priyanka Eluri
 
Programmable PN Sequence Generators
Programmable PN Sequence Generators
Rajesh Singh
 
P0460699102
P0460699102
IJERA Editor
 
Reconfigurable linear feedback shift register for wireless communication and...
Reconfigurable linear feedback shift register for wireless communication and...
International Journal of Reconfigurable and Embedded Systems
 
Module 5 Pseudo Random Sequence(SEE NOW).pptx
Module 5 Pseudo Random Sequence(SEE NOW).pptx
AdityaAnand843311
 
[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K
[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K
IJET - International Journal of Engineering and Techniques
 
208224019-20_testing_ppt[1][1][1]_1[1][1].pptx
208224019-20_testing_ppt[1][1][1]_1[1][1].pptx
monikasingh171994
 
LINEAR FEEDBACK SHIFT REGISTER GENETICALLY ADJUSTED FOR SEQUENCE COPYING
LINEAR FEEDBACK SHIFT REGISTER GENETICALLY ADJUSTED FOR SEQUENCE COPYING
AIRCC Publishing Corporation
 
Linear Feedback Shift Register Genetically Adjusted for Sequence Copying
Linear Feedback Shift Register Genetically Adjusted for Sequence Copying
AIRCC Publishing Corporation
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Implementation of maximal length sequences for
Implementation of maximal length sequences for
IAEME Publication
 
Implementation of UART with BIST Technique Using Low Power LFSR
Implementation of UART with BIST Technique Using Low Power LFSR
IJERA Editor
 
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
VLSICS Design
 
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
VLSICS Design
 
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
VLSICS Design
 
kasami spreading code example with explanation.pdf
kasami spreading code example with explanation.pdf
GeletaAman
 
LFSR
LFSR
CVR college of Engineering
 
Area efficient parallel LFSR for cyclic redundancy check
Area efficient parallel LFSR for cyclic redundancy check
IJECEIAES
 
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
IJECEIAES
 
CRYPTO Module 05.in.pdf
CRYPTO Module 05.in.pdf
AnushaS405812
 
Programmable PN Sequence Generators
Programmable PN Sequence Generators
Rajesh Singh
 
Module 5 Pseudo Random Sequence(SEE NOW).pptx
Module 5 Pseudo Random Sequence(SEE NOW).pptx
AdityaAnand843311
 
208224019-20_testing_ppt[1][1][1]_1[1][1].pptx
208224019-20_testing_ppt[1][1][1]_1[1][1].pptx
monikasingh171994
 
LINEAR FEEDBACK SHIFT REGISTER GENETICALLY ADJUSTED FOR SEQUENCE COPYING
LINEAR FEEDBACK SHIFT REGISTER GENETICALLY ADJUSTED FOR SEQUENCE COPYING
AIRCC Publishing Corporation
 
Linear Feedback Shift Register Genetically Adjusted for Sequence Copying
Linear Feedback Shift Register Genetically Adjusted for Sequence Copying
AIRCC Publishing Corporation
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
IJERD Editor
 
Implementation of maximal length sequences for
Implementation of maximal length sequences for
IAEME Publication
 
Implementation of UART with BIST Technique Using Low Power LFSR
Implementation of UART with BIST Technique Using Low Power LFSR
IJERA Editor
 
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
VLSICS Design
 
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
VLSICS Design
 
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
A Simulation Experiment on a Built-In Self Test Equipped with Pseudorandom Te...
VLSICS Design
 
kasami spreading code example with explanation.pdf
kasami spreading code example with explanation.pdf
GeletaAman
 
Area efficient parallel LFSR for cyclic redundancy check
Area efficient parallel LFSR for cyclic redundancy check
IJECEIAES
 
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
IJECEIAES
 
CRYPTO Module 05.in.pdf
CRYPTO Module 05.in.pdf
AnushaS405812
 
Ad

More from IDES Editor (20)

Power System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
Power System State Estimation - A Review
Power System State Estimation - A Review
IDES Editor
 
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
Artificial Intelligence Technique based Reactive Power Planning Incorporating...
IDES Editor
 
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
Design and Performance Analysis of Genetic based PID-PSS with SVC in a Multi-...
IDES Editor
 
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
Optimal Placement of DG for Loss Reduction and Voltage Sag Mitigation in Radi...
IDES Editor
 
Line Losses in the 14-Bus Power System Network using UPFC
Line Losses in the 14-Bus Power System Network using UPFC
IDES Editor
 
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
Study of Structural Behaviour of Gravity Dam with Various Features of Gallery...
IDES Editor
 
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
Assessing Uncertainty of Pushover Analysis to Geometric Modeling
IDES Editor
 
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
Secure Multi-Party Negotiation: An Analysis for Electronic Payments in Mobile...
IDES Editor
 
Selfish Node Isolation & Incentivation using Progressive Thresholds
Selfish Node Isolation & Incentivation using Progressive Thresholds
IDES Editor
 
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
Various OSI Layer Attacks and Countermeasure to Enhance the Performance of WS...
IDES Editor
 
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
Responsive Parameter based an AntiWorm Approach to Prevent Wormhole Attack in...
IDES Editor
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
IDES Editor
 
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
Genetic Algorithm based Layered Detection and Defense of HTTP Botnet
IDES Editor
 
Enhancing Data Storage Security in Cloud Computing Through Steganography
Enhancing Data Storage Security in Cloud Computing Through Steganography
IDES Editor
 
Low Energy Routing for WSN’s
Low Energy Routing for WSN’s
IDES Editor
 
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
Permutation of Pixels within the Shares of Visual Cryptography using KBRP for...
IDES Editor
 
Rotman Lens Performance Analysis
Rotman Lens Performance Analysis
IDES Editor
 
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
Band Clustering for the Lossless Compression of AVIRIS Hyperspectral Images
IDES Editor
 
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
Microelectronic Circuit Analogous to Hydrogen Bonding Network in Active Site ...
IDES Editor
 
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
Texture Unit based Monocular Real-world Scene Classification using SOM and KN...
IDES Editor
 
Ad

Recently uploaded (20)

UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
The Future of Technology: 2025-2125 by Saikat Basu.pdf
The Future of Technology: 2025-2125 by Saikat Basu.pdf
Saikat Basu
 
UserCon Belgium: Honey, VMware increased my bill
UserCon Belgium: Honey, VMware increased my bill
stijn40
 
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Priyanka Aash
 
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Priyanka Aash
 
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Wenn alles versagt - IBM Tape schützt, was zählt! Und besonders mit dem neust...
Josef Weingand
 
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
ReSTIR [DI]: Spatiotemporal reservoir resampling for real-time ray tracing ...
revolcs10
 
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
AI Agents and FME: A How-to Guide on Generating Synthetic Metadata
Safe Software
 
Python Conference Singapore - 19 Jun 2025
Python Conference Singapore - 19 Jun 2025
ninefyi
 
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Smarter Aviation Data Management: Lessons from Swedavia Airports and Sweco
Safe Software
 
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
Salesforce Summer '25 Release Frenchgathering.pptx.pdf
yosra Saidani
 
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Priyanka Aash
 
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Enhance GitHub Copilot using MCP - Enterprise version.pdf
Nilesh Gule
 
9-1-1 Addressing: End-to-End Automation Using FME
9-1-1 Addressing: End-to-End Automation Using FME
Safe Software
 
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC and Open Hackathons Monthly Highlights June 2025
OpenACC
 
Connecting Data and Intelligence: The Role of FME in Machine Learning
Connecting Data and Intelligence: The Role of FME in Machine Learning
Safe Software
 
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
“MPU+: A Transformative Solution for Next-Gen AI at the Edge,” a Presentation...
Edge AI and Vision Alliance
 
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
EIS-Webinar-Engineering-Retail-Infrastructure-06-16-2025.pdf
Earley Information Science
 
10 Key Challenges for AI within the EU Data Protection Framework.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Priyanka Aash
 
AI VIDEO MAGAZINE - June 2025 - r/aivideo
AI VIDEO MAGAZINE - June 2025 - r/aivideo
1pcity Studios, Inc
 
Security Tips for Enterprise Azure Solutions
Security Tips for Enterprise Azure Solutions
Michele Leroux Bustamante
 
The Future of Technology: 2025-2125 by Saikat Basu.pdf
The Future of Technology: 2025-2125 by Saikat Basu.pdf
Saikat Basu
 

Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model

  • 1. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 Design of a Pseudo-Random Binary Code Generator via a Developed Simulation Model A. Ahmad and D. Al-Abri Department of Electrical and Computer Engineering College of Engineering, Sultan Qaboos University P. O. Box 33, Postal Code 123; Muscat, Sultanate of Oman Tel.: (968) 2414 1327; Fax. (968) 2441 3416 E-mails [email protected]; [email protected] Abstract—This paper presents a developed tool for Pseudo- Optimized Counters Random Binary Code generator (PRBCG). Based on extensive In this paper we present a developed simulated tool which study of LFSR theory we developed the simulation model of is capable of generating PRBC efficiently. The developed PRBCG. The developed model is faster and simulates the process for very high length of Linear Feedback Shift Registers tool is culmination of exhaustive study of LFSR theory. (LFSRs). We tested our model for the value n = 300 where n is Therefore, in the ensuing section first we briefly present the the length of the LFSR. The developed software model is also mathematical modeling of LFSR. capable of providing the transition states of different bits of LFSRs. Further, the model has capability of switching to any II. MATHEMATICAL MODEL OF LINEAR FEEDBACK SHIFT REGISTER possible characteristic polynomial (feedback connections) of n-bit LFSR. Also, the model is designed such that it can There exist many LFSR models. The classifications of accommodate all the possible initial conditions (2n) of LFSR. LFSR models are based on the placements of the Exclusive- OR circuits and the shifts of the registers. The classifications Index Terms— Pseudo-Random Binary Code, Linear Feedback on basis of shifts are right to left or left to right. Also, the Shift Registers, Generating Function, Feedback Connection, shift is considered from the first bit to last bit or from last bit Initial Condition, m-sequence to the first bit. Similarly, the classifications of LFSRs on the basis of Exclusive-OR circuits are recognized as External I. INTRODUCTION Exclusive-OR (EEOR) or as Internal Exclusive-OR (IEOR). Pseudo-Random Binary Code (PRBC) is widely used in Figure 1 depicts an n-bit LFSR circuit. This structure is based modern engineering. The generation of PRBCs and study of on External Exclusive-OR circuits. The shift register shifts their properties has attained the more and more attention of the data from bit n to bit 1 while the feedback taps vector [c0, the researchers because of its wide applications. Therefore, c1, . . . cn]. The feedback taps c1, c2, . . cn are linked with flip- how to design the Linear Feedback Shift Register (LFSR) flop’s outputs Qn, Qn-1, . . Q2, Q1 respectively whereas c0 link based hardware circuit to generate PRBCs. Moreover, the represents the connection between the output of EEOR PRBC sequence o the longest cycle is popularly known as circuits and the input of the flip-flop n. The state space Maximal Length PRBC sequence (m-sequence). The m- model of this LFSR can be described as follows. sequence which is one of the basic sequences has always been topic of current research. Linear Feedback Shift Registers (LFSRs) have been used for Pseudo-Random Binary Code Sequence (PRBCS) generation. The PRRBSs have been used for multiple uses in digital systems design. Applications include cryptographic applications like stream ciphers and data hiding. The concept of LFSR theory is useful in many error correction and detection codes. The PRRBSs have been used in Built-In Self-Testing (BIST) for VLSI circuits [1] – [19]. Many more application of Figure 1. An n-bit LFSR LFSR and PRBCS can be listed as given below: The state space model of this LFSR structure can be Wireless Communications described as given in equation (1). To explain let matrix [A] Data Integrity represent the state transition matrix of order n × n, for an n Checksums stage LFSR shown in Fig. 1. Let the state at any time ‘t’ be Data Compression represented by vector [Q(t)] = [ Qn(t), ... ,Qj(t), ... ,Q2(t), Q1(t)] Pseudo-random Number Generation (PN) (which is effectively the contents of the LFSR) where each Qj represents the state of the jth stage of the LFSR. Further, let Direct Sequence Spread Spectrum the LFSR feedback stages be numbered from C0 to Cn, Scrambler/Descrambler proceeding in the same direction as the shifting occurs i.e. © 2012 ACEEE 33 DOI: 01.IJIT.02.01. 53
  • 2. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 left to right. Let the present state of the LFSR be represented TABLE I. THE OPERATION OF LFSR OF EXAPLE 1 by [Q(t)] and, one clock later, the next state by [Q(t+1)]; then the relationship between the two states is given by as described in equation (1). (1) Any binary data sequence can be represented in form of Where, cj = 0 or 1, for 1 j n-1 and cj = 1, for j = 0, n. polynomial in GF(2). Therefore, the tap vector for an LFSR In equation (1), the values of cj show the existence or can be represented in the form of polynomial and is technically presence of a feedback connection from the jth stage of the known as characteristic polynomial. Equations (5) define a LFSR. Thus the state equation for this model can be given as general form of characteristic polynomial and let us call it as in equation (2). P(x). [Q(t+1)] = [A] * [Q(t)] (2) If [Q] = [Q(0)] represents a particular initial loading of the (5) LFSR, i.e. the content of each flip-flop is zero. Then the sequence of states through which the LFSR will pass will all Let {am} = [a0 , a1 , . . , ai , . .], represent the output sequence the time zeros; means the LFSR is locked. Otherwise, for any generated by the LFSR used as PRBCS, where ai = 0 or 1. other loadings the LFSR will be governed by equation (3) Then this sequence can be represented as as given in during its successive operation times. equation (6). [Q(t)], [A][Q(t)], [A]2[Q(t)], [A]3[Q(t)],.. (3) Let the matrix ‘period’ be the smallest integer p for which [A]p (6) =I, where I is an identity matrix. Then [A]p[Q(t)] = [Q(t)] for any non zero initial vector [Q(0)], indicating the ‘cycle length From the structure of the type of the LFSR shown in Fig. 1, it (or period)’ of the LFSR is p. As mentioned above the cycle can be seen that if the current state of the ith flip-flop is am-i , length for [Q(0)] = 0 is always 1, independent of matrix [A]. for i = 1, 2 , ... , n , then by the recurrence relation an equation Thus, on the basis of this property of periodicity of LFSR can be given as below. and equation (4), it follows that. [Q(t)] = [Q(t+p)]=[A]p[Q(t)] (4) (7) To demonstrate equation (4) and to verify its existence let us consider an example as below. Example 1: Consider a 3-bit LFSR as shown in Fig. (2). The LFSR has feedback The generating function G(x) associated with the PRBCS can connections as c0 = c1 = c3 = 1 and c2 = 0. It can be verified by be mathematically defined as in equation (8). the by using equations (1) and (4) that this LFSR structure has period of 7. (8) Or, (9) Or, equation (9) can be rewritten as: (10) Figure 2. A 3-bit LFSR Table I demonstrates the all possible sequences of states through which this LFSR structure passes before repeating the initial loading. The LFSR is loaded with all 1’s content. © 2012 ACEEE 34 DOI: 01.IJIT.02.01. 53
  • 3. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 III. ABOUT THE DEVELOPMENT AND TESTING OF THE SIMULATED MODEL To develop this simulation model we used Microsoft Visual Basic .Net programming environment is used to create graphical user application for the Microsoft Windows system. The theory of LFSR discussed in the above sections are embedded in this developed simulation model. In our developed simulation model where the general structure of LFSR model is programmed to target the objective of generating PRBCS. Requesting immediate after the size of an LFSR it generates lists of all possible polynomials for feedback connections and initial loadings. Immediate after the initial loading and feedback options are selected the developed tool computes and outputs the PRBCS. Our simulation model also has provision of controlling the length of the PRBCS. Just to elaborate to the readers we present a model demonstration for data of example 1. The execution of the program outputs the first window which is shown in Fig. 3. Figure 5: The output for n =3 computed and results are available in the window. These results can also be stored in files. Figure 3: The first window of Model “LFSR” We tested our model for n = 300 but it is difficult to show the result. A partial window for n = 300 is shown in Fig. 6. Immediate after feeding the value n = 3 it generates functional windows for selecting P(x) and initial loadings as depicted in Fig. 4. Figure 6: Simulated Window for n = 300 Figure 4: Selection window for the options of P(x) and initial loadings of Model “LFSR” CONCLUSIONS We can control the length of the generated sequence. As shown in Fig. 5 that for n = 3, with desired sequence length of This work is based on the study of the theory of LFSR. 12, initial state loading of [1, 1, 1] and P(x) = ([1, 1, 0, 1] = 1 + Hence this tool is developed after a comprehensive study of x + x3) that PRBCS repeats after the period of 7. It can also be LFSR theory and its related issues. First we tested our model visualized that maximum 12 terms of G(x) are computed. Our for many values of n. We verified our models for small sizes model provides the complete state table for the complete of n. We also demonstrated and executed this model for n up operation of generating PRBCS. Also, each G(x) and N(x) are to 300 and it runs satisfactorily. This developed tool requires © 2012 ACEEE 35 DOI: 01.IJIT.02.01. 53
  • 4. ACEEE Int. J. on Information Technology, Vol. 02, No. 01, March 2012 a very small memory space and execution time is also less. [9] Jamil, T. and Ahmad, A., “An investigation in to the application During the test and execution of this developed model we of linear feedback shift registers for steganography,” Proceedings never faced the problem of hanging of computer. Also, the IEEE SoutheastCon2002, Columbia, SC, USA, April 5 – 7, 2002, output file can be exported either in EXCEL, MATLAB, C pp. 239 – 244, 2002 and FORTRAN 95. [10] Ahmad A., Al-Musharafi, M. J., Al-Busaidi, S., “Design and study of a strong stream crypto-system model for e-commerce,” International Council for Computer Communication Publishers, ACKNOWLEDGMENT Washington DC, USA (The ACM Library), vol. 1, pp. 619 – 630, The authors wish to thank and acknowledge the support 2002 grant (SQU-DVC/ PSR/RAID/2010/23) provided by Sultan [11] Ahmad, A., Development of State Model Theory for External Exclusive NOR Type LFSR Structures, Enformatika, vol. 10, pp. Qaboos University, Sultanate of Oman. 125 – 129, 2005 [12] Ball, J.R., Spittle, A.H., Liu, H.T., ”High-speed m sequence REFERENCES generation: a further note,” Electronics Letters, vol. 11, no. 5, pp. [1] Golomb, S.W., “Shift Register Sequences. Aegean Park Press,” 107 – 108, 11 July 2007 Leguna Hills - U.S.A., 1982 [13] Ahmad, A., “Investigation of Typical Properties of Some LFSR [2] Ahmad A., Nanda N.K. and Garg K., “A critical role of primitive Structures,” Journal of System Science and Engineering, vol. 17, polynomials in an LFSR based testing technique,” IEE Electronics no. 1, pp. 65 – 69, 2008 Letters (UK), vol.24, no.15, 1988, pp. 953 – 955, 1988 [14] Ahmad, A., and Al-Maashri, A., “Investigating Some Special [3] Ahmad, A., Nanda, N. K. and Garg, K., “The use of irreducible Sequence Length Generated Through an External Exclusive-NOR characteristic polynomials in an LFSR based testing of digital Type LFSRs,” International Journal Electrical and Computer circuits,” Proceedings of 4th IEEE international conference of region Engineering, (PERGAMON, Elsevier Science), vol. 34, pp. 270 – 10 (TENCON-89), pp. 494 – 496 1989 280, 2008 [4] Ahmad A., Nanda N.K. and Garg K., “Are primitive polynomials [15] Ahmad, A., Al-Mashari, A. and Al-Lawati, A. J., “On Locking always best in signature analysis?” IEEE design & Test of Computers Conditions in M-Sequence Generators for the Use in Digital (USA), 1990, vol.7, no.4, pp. 36 – 38, 1990 Watermarking”, Proceedings International Conference on Methods [5] Ahmad, A., Nanda, N. K., and Garg, K., “An efficient design of and Models in Computer Science (ICM2CS09), pp. 111 – 115, maximal length of pseudorandom test pattern generators,” 2009 Proceedings of IEEE international conference on signals & systems, [16] Fangfang Cheng, Jingyu Hua, Jiaxiang Zhu, Lei Tong and held at Ail-Ain (UAE), Jan. 29 - 31, vol.1, pp. 27 – 34, 1990 Liming Meng, “A Fast Generation Method of Bent Sequences and [6] Ahmad A. and Elabdalla A. M., “An efficient method to Its Application in ADS Simulation,” Proceedings Wase international determine linear feedback connections in shift registers that generate conference on information engineering (ICIE-2010), pp. 328 – maximal length pseudo-random up and down binary sequences,” 331, 2010 Computer & Electrical Engineering - An Int’l Journal (USA), vol. [17] Junying Sun and Jiaxing Chen, “Design of m sequence generator 23, no. 1, pp. 33-39, 1997 based on protues,” Proceedings international conference on [7] Ahmad, A., Al-Musharafi, M.J., and Al-Busaidi S., “A new computer, mechatronics, control and electronic engineering algorithmic procedure to test m-sequences generating feedback (CMCE), pp. 126 – 128, 2010 connections of stream cipher’s LFSRs,” Proceedings IEEE [18] Ahmad, A., “A Simulation Experiment on a Built-In Self Test conference on electrical and electronic technology (TENCON’01), Equipped with Pseudorandom Test Pattern Generator and Multi- vo. 1, pp. 366 – 369, 2001 Input Shift Register (MISR)”, International journal of VLSI design [8] Ahmad, A., Al-Musharafi, M.J., and Al-Busaidi S., Al-Naamany, & Communication Systems (VLSICS), vol.1, No.4, 2010 A. M., and Jervase, A. J., “An NLFSR based sequence generator [19] A. Ahmad and L. Hayat, “Selection of polynomials for cyclic for stream ciphers,” Proceedings (SETA’01) - An International redundancy check for the use of high speed embedded systems – Conference on Sequences & Their Applications, pp. 11 – 13, 2001 An algorithmic procedure”, WSEAS Transactions on Computers, vol. 10, no. 1, pp. 16 – 20, 2011 © 2012 ACEEE 36 DOI: 01.IJIT.02.01. 53