Software Generation of Practically Strong Random Numbers

نویسنده

  • Peter Gutmann
چکیده

Although much thought usually goes into the design of encryption algorithms and protocols, less consideration is often given to equally important issues such as the selection of cryptographically strong random numbers, so that an attacker may find it easier to break the random number generator than the security system it is used with. This paper provides a comprehensive guide to designing and implementing a practically strong random data accumulator and generator which requires no specialised hardware or access to privileged system services. The performance of the generator on a variety of systems is analysed, and measures which can make recovery of the accumulator/generator state information more difficult for an attacker are presented. The result is an easy-to-use random number generator which should be suitable even for demanding cryptographic applications.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

نقش اعداد تصادفی در شبیه سازی و بررسی تحلیلی الگوریتم‌های تولید اعداد تصادفی و ارائه روش تلفیقی جدید

  Abstract: Analyzing different issues of most systems, particularly their design, implementation, and development, requires some sort of techniques which are capable of studying their special conditions in stochastic states. Simulation is regarded as one of the most efficient methods for this purpose in the area of engineering, systems, and management. Studying and analyzing a system under spe...

متن کامل

MARCINKIEWICZ-TYPE STRONG LAW OF LARGE NUMBERS FOR DOUBLE ARRAYS OF NEGATIVELY DEPENDENT RANDOM VARIABLES

In the following work we present a proof for the strong law of large numbers for pairwise negatively dependent random variables which relaxes the usual assumption of pairwise independence. Let be a double sequence of pairwise negatively dependent random variables. If for all non-negative real numbers t and , for 1 < p < 2, then we prove that (1). In addition, it also converges to 0 in ....

متن کامل

Strong laws of large numbers for random forests

Random forests are studied. A moment inequality and a strong law of large numbers are obtained for the number of trees having a fixed number of nonroot vertices.

متن کامل

INTERNET DRAFT Randomness Requirements for Security June 2004

Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudosecurity. The sophisticated attacker of these security systems may fin...

متن کامل

INTERNET DRAFT Randomness Requirements for Security April

Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudosecurity. The sophisticated attacker of these security systems may fin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1998