**5. Conclusions**

As a result of this research we executed the modeling of bit templates for informationprocessing electronic device authentication on the basis of the pulse Poisson sequences generator. For the purposes of the study, the Poisson pulse sequence generator was developed based on a modified additive Fibonacci generator. The developed generator had improved statistical characteristics for the output pulse sequence and expanded capabilities for solving specific practical problems.

The proposed simulator scheme contained two generators. The generator for the value of the control code *G* = 10,000 formed a bit sequence *A*, fragments of which had properties of the real-time templates of each device. The generator for the value of the control code *G* = 100,000 formed a bit sequence *B*, fragments of which reflected the difference between the series of real-time templates of different devices. In the bit template of the device, these properties were preserved by applying the action of the direct sum of fragments of sequences *A* and *B*.

An imitation experiment to generate templates for two devices confirmed the effectiveness of the proposed simulator. The properties of the generated bit templates allowed them to be used for the purpose of unambiguous authentication of information-processing electronic devices.

Further research will focus on protecting such bit templates from a variety of attacks. From the authors' point of view, the direction of detecting acoustic traps in speech recognition systems is also promising for the application of Poisson pulse sequence generators [36,37].

**Author Contributions:** Conceptualization, V.M. and E.N.; methodology, V.M. and C.J.; software, O.H.; validation, Y.L., M.R. and E.N.; formal analysis, C.J., M.S. and O.H.; investigation, V.M, E.N., C.J., M.S., O.H., Y.L. and M.R.; writing—original draft preparation, V.M., E.N. and M.S.; writing—review and editing, Y.L., C.J. and M.R.; supervision, E.N.; project administration, Y.L.; funding acquisition, E.N. and C.J. All authors have read and agreed to the published version of the manuscript.

**Funding:** This research was funded by CRDF Global, Grant Agreement G-202102-67366 "Developing software and hardware complex for dynamical authentication of information processing devices in a corporate network for cybersecurity purposes", supported by the U.S. Department of State, the Bureau of European and Eurasian Affairs.

**Institutional Review Board Statement:** Not applicable.

**Informed Consent Statement:** Not applicable.

**Data Availability Statement:** Not applicable.

**Conflicts of Interest:** The authors declare no conflict of interest.
