Expanding the Length of a Pseudo-Random Number Generator

ثبت نشده
چکیده

Expanding the Length of a Pseudo-Random Number Generator We now want to show how a pseudo-random number generator that only does a little bit of expansion, can be used to construct a pseudo-random generator that does a lot of expansion. The idea is that we view G(s) as consisting of “stuff” that we can spit out, together with a new seed that we feed back into the generator, etc., a polynomial number of times. This construction is often used in practice to form a generator that is continually spitting out stuff (such as floating point numbers) virtually forever; for our purposes, we view “forever” as being polynomial in the security parameter n. Let G be a number generator with length function l(n), where l(n) = e(n)+n. For every natural number i and every bit string s, define G0(s) = λ =the empty string; Gi+1(s) = αGi(β) where G(s) = αβ and |α| = e(n) and |β| = n. Let t(n) be a function computable in time polynomial in n, such that is t(n) is polynomial in the value of n. Define G′(s) = Gt(|s|)(s); note that G ′ is a number generator with length function l′(n) = e(n)t(n). (We will assume l′(n) > n.) (See Construction 3.3.2 of Goldreich.)

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Expanding the Length of a Pseudo-Random Number Generator

Expanding the Length of a Pseudo-Random Number Generator We now want to show how a pseudo-random number generator that only does a little bit of expansion, can be used to construct a pseudo-random generator that does a lot of expansion. The idea is that we view G(s) as consisting of “stuff” that we can spit out, together with a new seed that we feed back into the generator, etc., a polynomial n...

متن کامل

An Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation

We present a pseudo-random bit generator expanding a uniformly random bitstring r of length k/2, where k is the security parameter, into a pseudo-random bit-string of length 2k − log(k) using one modular exponentiation. In contrast to all previous high expansion-rate pseudo-random bit generators, no hashing is necessary. The security of the generator is proved relative to Paillier’s composite d...

متن کامل

Design and Implementation of Pseudo Random Number Generator Used in Aes Algorithm

We present a new Design for the generation of Advanced encryption of (bit) data. The Design opted to obtain this encrypted data is RM-PRNG. This design also enhances the statistical properties of a chaos-based logistic map pseudo random number generator (PRNG) and extends the system period length. The reseeding method removes the short periods of the digitized logistic map and the mixing method...

متن کامل

Limits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators

The standard approach for constructing a large-stretch pseudorandom generator given a one-way permutation or given a smaller-stretch pseudo-random generator involves repeatedly composing the given primitive with itself. In this paper, we consider whether this approach is necessary, that is, whether there are constructions that do not involve composition. More formally, we consider black-box con...

متن کامل

A New Design for High Throughput Linear PRNG

As we know that pseudo random number generator is used to generate a long period random number sequence but the output random numbers of such generators are predictable due to their linear structure. When we want to design the fast circuit or fast system naturally we have to go for some solutions. To overcome this problem here presenting a new method for reseeding-mixing to extend the system pe...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014