Filters








427 Hits in 7.0 sec

Randomness Analysis for the Generalized Self-Shrinking Sequences

Sara D. Cardell, Verónica Requena, Amparo Fúster-Sabater, Amalia B. Orúe
2019 Symmetry  
In cryptography, the property of randomness in pseudo-random generators is very important to avoid any pattern in output sequences, to provide security against attacks, privacy and anonymity.  ...  Then, an in-depth analysis of randomness focused on the generalized sequences by means of complete and powerful batteries of statistical tests and graphical tools is done, providing a useful vision of  ...  Fausto Montoya for his help with the analysis of the sequences. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/sym11121460 fatcat:hpgtuutw4nbgzjeqoqwjln4t54

A Comparative Statistical Analysis of Pseudorandom Bit Sequences

Rashidah Kadir, Mohd Aizaini Maarof
2009 2009 Fifth International Conference on Information Assurance and Security  
However, the randomness of generated pseudorandom numbers (PRNs) is under questioned whether it can support the reliable security in secure communication.  ...  Many users applied built-in random generator for their cryptography applications which is simple and fast.  ...  A novel pseudo random bit generator for cryptography applications. Proc  ... 
doi:10.1109/ias.2009.242 dblp:conf/IEEEias/KadirM09 fatcat:x5trjdwwizhq3kno63rsjrwpne

Random Number Generators in Secure Disk Drives

Laszlo Hars
2009 EURASIP Journal on Embedded Systems  
These coefficients, affected by many kinds of physical noise, are used in the reseeding process of a cryptographic pseudorandom number generator in a family of self encrypting disk drives currently in  ...  Cryptographic random number generators seeded by physical entropy sources are employed in many embedded security systems, including self-encrypting disk drives, being manufactured by the millions every  ...  Security of Hashed Seeding of Pseudorandom Number Generators.  ... 
doi:10.1155/2009/598246 fatcat:w2usvoq6mvevpbnc6c4tkjobhu

An Efficient Noise Generator for Validation of Channels Equalizers

Nihar Panda, Siba P. Panigrahi, Sasmita Kumari Padhy
2011 Journal of Signal and Information Processing  
Simulation results validates the effectiveness of the random number generator.  ...  This paper develops an efficient pseudo-random number generator for validation of digital communication channels and secure disc. Drives.  ...  Security of Hashed Seeding of Pseudorandom Number Generator When the analyzed sequence is used for seeding generators for (cryptographic) pseudorandom number, one don't need uniform randomness of the seed  ... 
doi:10.4236/jsip.2011.21001 fatcat:2zcbqskdtjcdpd47fuj7zslqq4

An Improved Pseudorandom Sequence Generator and its Application to Image Encryption

2022 KSII Transactions on Internet and Information Systems  
This paper proposes an improved Pseudorandom Sequence Generator (PRSG) based on the concept of modular arithmetic systems with non-integral numbers.  ...  The generated random sequence use in various cryptographic applications due to its unpredictability.  ...  The PRNGs depend on the period that decides the length of the sequence before reaching the same vector.  ... 
doi:10.3837/tiis.2022.04.012 fatcat:cukfgmxrgng63etyjp6dbac7de

A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags

Joan Melià-Seguí, Joaquin Garcia-Alfaro, Jordi Herrera-Joancomartí
2010 Wireless personal communications  
In this paper, we present a practical implementation attack on a weak pseudorandom number generator (PRNG) designed specifically for EPC Gen2 tags.  ...  The Electronic Product Code Generation 2 (EPC Gen2) is an international standard that proposes the use of Radio Frequency Identification (RFID) in the supply chain.  ...  Acknowledgements This work has been supported by the Spanish Ministry of Science and Innovation, the FEDER funds under the grants TSI2007-65406-C03-03 E-AEGIS, CONSOLIDER CSD2007-00004 ARES, an IN3-UOC  ... 
doi:10.1007/s11277-010-0187-1 fatcat:zwemxpphvjeydcg35oyk5t35hq

Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator [chapter]

John Kelsey, Bruce Schneier, Niels Ferguson
2000 Lecture Notes in Computer Science  
We describe the design of Yarrow, a family of cryptographic pseudo-random number generators (PRNG).  ...  We then discuss the ways that PRNGs can fail in practice, which motivates our discussion of the components of Yarrow and how they make Yarrow secure.  ...  Benbasat for implementing the preliminary Windows version of Yarrow.  ... 
doi:10.1007/3-540-46513-8_2 fatcat:vu5wzhaz6bd6nmhf2hnqwfpzey

Security system for surveillance radar network communication using chaos algorithm

Nova Hadi Lestriandoko, Tutun Juhana, Rinaldi Munir
2014 2014 8th International Conference on Telecommunication Systems Services and Applications (TSSA)  
The system is designed to protect the radar data against unauthorized parties. From the previous work, there was a weakness in the pseudorandom number generator.  ...  The generated number could not satisfy the randomness, it might be raise a security problem.  ...  ACKNOWLEDGMENT We thank Research Center for Informatics -Indonesian Institute of Sciences(LIPI) and School of Electrical Engineering and Informatics-Institut Teknologi Bandung (ITB) for the facilities,  ... 
doi:10.1109/tssa.2014.7065947 fatcat:xlkrcu75kndlzi73k6dpnmpetm

Physical layer secret key generation for fiber-optical networks

Konstantin Kravtsov, Zhenxing Wang, Wade Trappe, Paul R. Prucnal
2013 Optics Express  
The security of our approach is based on a fundamental asymmetry associated with the optical physical layer: the sophistication of tools needed by an eavesdropping adversary to subvert the key establishment  ...  We propose and experimentally demonstrate a method for generating and sharing a secret key using phase fluctuations in fiber optical links.  ...  Acknowledgments This work was supported in part by the Russian Ministry of Education and Science under the state contract 11.519.11.4009.  ... 
doi:10.1364/oe.21.023756 pmid:24104288 fatcat:kl2b4taatna2jfy7xlplap46vq

A Novel True Random Number Generator in Near Field Communication as Memristive Wireless Power Transmission

Colin Sokol Kuka, Yihua Hu, Quan Xu, James Chandler, Mohammed Alkahtani
2021 J — Multidisciplinary Scientific Journal  
The results of simulations indicate the functioning of the Memristor-based WPT (M-WPT) and its ability to generate random numbers.  ...  This circuit may be used in Near Field Communication (NFC), where chaotic true random numbers (TRNG) can be generated to increase security.  ...  Conflicts of Interest: The authors declare no conflict of interest. J 2021, 4  ... 
doi:10.3390/j4040052 fatcat:qn4w7cjl2vbw3nhlambuq6ot3u

3D Visualization Applied to PRBGs and Cryptography- Long Version

Michel Dubois, Eric Filiol
2016 Computer Science and Information Technology  
In this paper, we present a new approach, to visualize, in a two and three dimensions environment at the same time, a sequence issued from a pseudo random bit generator or from cryptographic algorithms  ...  So we can then ask whether is it possible to quickly determine the algorithm used to construct a random sequence of numbers and in a second time, distinguish between a PRBG or a cryptographic algorithm  ...  A.1 PRBG generating and viewing in 3D Available at the link https://github.com/archoad/PRBG-3D. To run this suite of programs requires a C compiler and OpenSSL and OpenGL libraries.  ... 
doi:10.13189/csit.2016.040502 fatcat:ysppgfe5wzhi5ox24tjodnjtme

Enumeration of Maximal Cycles Generated by Orthogonal Cellular Automata [article]

Luca Mariot
2022 arXiv   pre-print
Cellular Automata (CA) are an interesting computational model for designing Pseudorandom Number Generators (PRNG), due to the complex dynamical behavior they can exhibit depending on the underlying local  ...  In this paper, we consider an alternative approach to generate pseudorandom sequences through orthogonal CA (OCA), which guarantees a better amount of diffusion.  ...  Pseudorandom sequences with very large periods are usually sought in cryptography especially in the context of stream ciphers [35] .  ... 
arXiv:2203.02726v1 fatcat:55h3cdgwpvaunbbqixq3difzsa

Direct generation of all-optical random numbers from optical pulse amplitude chaos

Pu Li, Yun-Cai Wang, An-Bang Wang, Ling-Zhen Yang, Ming-Jiang Zhang, Jian-Zhong Zhang
2012 Optics Express  
Thus, in theory, the obtained random number sequence without post-processing has a high-quality randomness verified by industry-standard statistical tests.  ...  In this method, we do not require sampling procedure and external triggered clocks but directly quantize the chaotic pulses stream into random number sequence via an all-optical flipflop.  ...  Acknowledgments We acknowledge Koen Huybrechts from Ghent University for providing the data about the all-optical flip-flop.  ... 
doi:10.1364/oe.20.004297 pmid:22418189 fatcat:w5w3qfr2gndb5d7zb5ywlnhqru

A New Chaotic Encryption Algorithm to Enhance the Security of ZigBee and Wi-Fi networks

Bassem Bakhache, Kassem Ahmad, Safwan el Assad
2012 International Journal of Intelligent Computing Research  
The security protocols used in these wireless networks rely on stream cipher to encrypt data before being transmitted.  ...  In this paper, we will explain briefly the design of our proposed generator and show its efficiency through encryption tests.  ...  The RC4 works on an array of 256 bytes to generate a pseudo random number sequence, and both encryption and decryption is performed using bits output R from the generator.  ... 
doi:10.20533/ijicr.2042.4655.2012.0027 fatcat:k6hfbpxzt5fkhj4qw4i5abk4iy

Challenges in teaching a graduate course in applied cryptography

Sujata Garera, Jorge Vasconcelos
2009 ACM SIGCSE Bulletin  
We emphasize on the importance of such a course for a graduate student in an information security program.  ...  We describe our experience in creating and teaching a graduate course in cryptography at the Johns Hopkins University.  ...  The website we maintained throughout the semester can be found at http://www.cs.jhu.edu/~sdoshi/crypto/crypto.html.  ... 
doi:10.1145/1595453.1595485 fatcat:67pdqlvnlnc4znarpthn4g55la
« Previous Showing results 1 — 15 out of 427 results