Cryptographic Hardening of d-Sequences

نویسنده

  • Sandhya Rangineni
چکیده

This paper shows how a one-way mapping using majority information on adjacent bits will improve the randomness of d-sequences. Introduction In a recent article, Anthes [1] summarizes recent results in generating true random numbers. In particular, it mentions the work at Intel Corp. to use thermal noise on the central processing unit of the computer as random number generator (RNG) [2]. This is not unlike the RNGs based on quantum processes that have been proposed elsewhere [3]. Quantum processes come with their own uncertainty [4]-[7]. Randomness is generally measured in terms of probability or of complexity. From the lens of probability, all binary sequences of length n are equivalent. From the point of view of complexity, randomness will depend on the algorithm that has been used to generate the sequence. Ritter provides a summary of several measures of algorithmic complexity [8] and, therefore, also of randomness. In this article, we will investigate results of a method of cryptographic strengthening of RNGs. Basically, the idea is to apply a many–to-one mapping to the binary output of the RNG, increasing the complexity of reverse process. We show that by using a 3-to-1 mapping where each group of three 0s and 1s is replaced by whatever the majority improves the autocorrelation function of the resultant sequence in some cases. This will be tried both for the Windows based RNGs as well as d-sequences [9-17], that are “decimal sequences” in an arbitrary base, although binary (base-2) sequences are the ones considered here. D-sequences have found several applications in cryptography and they are of particular interest since any random sequence can be represented as a d-sequence (Figure 1). Randomness measured by Autocorrelation Function For simplicity, we consider only the autocorrelation function as measure of randomness. The value of the autocorrelation is defined as in the equation below:

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptographic Path Hardening: Hiding Vulnerabilities in Software through Cryptography

We propose a novel approach to improving software security called Cryptographic Path Hardening, which is aimed at hiding security vulnerabilities in software from attackers through the use of provably secure and obfuscated cryptographic devices [5] to harden paths in programs. By “harden” we mean that certain error-checking if-conditionals in a given program P are replaced by equivalent obfusca...

متن کامل

Hardening & FIPS 140

FIPS 140-2 does not presently have security requirements that cover software-hardening techniques. Software hardening is a method of transforming an executable and associated data into a form that does not easily permit reverse engineering or reconstruction, but that has the identical execution properties of the original software. With software hardening it is possible to embed secret data such...

متن کامل

The binary primes sequence for computational hardening of pseudorandom sequences

This paper proposes the use of the binary primes sequence to strengthen pseudorandom (PN) decimal sequences for cryptography applications. The binary primes sequence is added to the PN decimal sequence (where one can choose from many arbitrary shift values) and it is shown that the sum sequence has improved autocorrelation properties besides being computationally hard. Also, an analysis on the ...

متن کامل

U-Bending Analysis with an Emphasis on Influence of Hardening Models

In this paper the effect of different hardening models in simulating the U-bending process for AA5754-O and DP-Steel, taking a benchmark of NUMISHEET 93 2-D draw bending, has been discussed. The hardening models considered in simulations are: isotropic hardening, pure (linear) kinematic hardening and combined (nonlinear kinematic) hardening. The influence of hardening models on predicting sprin...

متن کامل

Towards a Secure and Reliable System

In this article we describe a system based on a 32-bit processor, Leon, complete with security features offered by a specific cryptographic AES IP. Hardening is done not only on the principal hardware components but on the operating system as well, with attention for possible interaction between the different levels. The cryptographic IP is protected too to offer good resistance against, for ex...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • CoRR

دوره abs/1106.3574  شماره 

صفحات  -

تاریخ انتشار 2011