Expanding the Length of a Pseudo-Random Number Generator
ثبت نشده
چکیده
Expanding the Length of a Pseudo-Random Number Generator We now want to show how a pseudo-random number generator that only does a little bit of expansion, can be used to construct a pseudo-random generator that does a lot of expansion. The idea is that we view G(s) as consisting of “stuff” that we can spit out, together with a new seed that we feed back into the generator, etc., a polynomial number of times. This construction is often used in practice to form a generator that is continually spitting out stuff (such as floating point numbers) virtually forever; for our purposes, we view “forever” as being polynomial in the security parameter n. Let G be a number generator with length function l(n), where l(n) = e(n)+n. For every natural number i and every bit string s, define G0(s) = λ =the empty string; Gi+1(s) = αGi(β) where G(s) = αβ and |α| = e(n) and |β| = n. Let t(n) be a function computable in time polynomial in n, such that is t(n) is polynomial in the value of n. Define G′(s) = Gt(|s|)(s); note that G ′ is a number generator with length function l′(n) = e(n)t(n). (We will assume l′(n) > n.) (See Construction 3.3.2 of Goldreich.)
منابع مشابه
Expanding the Length of a Pseudo-Random Number Generator
Expanding the Length of a Pseudo-Random Number Generator We now want to show how a pseudo-random number generator that only does a little bit of expansion, can be used to construct a pseudo-random generator that does a lot of expansion. The idea is that we view G(s) as consisting of “stuff” that we can spit out, together with a new seed that we feed back into the generator, etc., a polynomial n...
متن کاملAn Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
We present a pseudo-random bit generator expanding a uniformly random bitstring r of length k/2, where k is the security parameter, into a pseudo-random bit-string of length 2k − log(k) using one modular exponentiation. In contrast to all previous high expansion-rate pseudo-random bit generators, no hashing is necessary. The security of the generator is proved relative to Paillier’s composite d...
متن کاملDesign and Implementation of Pseudo Random Number Generator Used in Aes Algorithm
We present a new Design for the generation of Advanced encryption of (bit) data. The Design opted to obtain this encrypted data is RM-PRNG. This design also enhances the statistical properties of a chaos-based logistic map pseudo random number generator (PRNG) and extends the system period length. The reseeding method removes the short periods of the digitized logistic map and the mixing method...
متن کاملLimits on the Stretch of Non-adaptive Constructions of Pseudo-Random Generators
The standard approach for constructing a large-stretch pseudorandom generator given a one-way permutation or given a smaller-stretch pseudo-random generator involves repeatedly composing the given primitive with itself. In this paper, we consider whether this approach is necessary, that is, whether there are constructions that do not involve composition. More formally, we consider black-box con...
متن کاملA New Design for High Throughput Linear PRNG
As we know that pseudo random number generator is used to generate a long period random number sequence but the output random numbers of such generators are predictable due to their linear structure. When we want to design the fast circuit or fast system naturally we have to go for some solutions. To overcome this problem here presenting a new method for reseeding-mixing to extend the system pe...
متن کامل