Some considerations about Java implementation of two provably secure pseudorandom bit generators
نویسندگان
چکیده
The quest for a cryptographically secure pseudorandom bit generator (PRBG) was initiated long ago [13] [14], and for a long time the proposed pseudorandom generators were very slow [?]. (INSERIRLO IN BIBLIOGRAFIA). More recently some ”provably secure” PRBG capable to achieve a throughput rate greater than 1Mbit/sec has been proposed in [1] [2]. We noticed, anyway, the absence of Java implementations of such PRBGs, provably due to poor expected values for throughput rate. In the present paer we show that it is quite easy to write down Java implementations for them, achieving a throughput rae into range 0, 5 ÷ 7 Mbit/sec on very common mobile low-end devices. If moreover a modification we proposed in [3] is applied, the throughput rate is in the range 5 ÷ 80 Mbit/sec and can be clearly sufficient for many applications.
منابع مشابه
Security Frameworks for Pseudorandom Number Generators
In the cryptographic system a pseudorandom number generator is one of the basic primitives. We survey theoretically secure pseudorandom bit generators which are provably secure under certain reasonable number theoretic assumptions and some practical pseudorandom number generators based on assumptions about symmetric crypto-primitives. Recently, there was a noticeable result for the concrete sec...
متن کاملTurbo PMC V3 – 1024 Bit Block Cipher for Storage Device Block Level Encryption
A fast and provably secure Polymorphic Block Cipher consisting of a three-round Luby Rackoff Pseudorandom Permutation Generator with a Decorrelation Stage employing a large number of interdependent pseudo-random number generators, combiner routines and permutation functions is proposed. Data-dependent selection of cryptographic primitives with a shared internal state at runtime provides a novel...
متن کاملPseudorandom bit Generators for Secure Broadcasting Systems
Pseudorandom bit generators play an essential role in high-security audio/video scrambling and addressing systems which allow pay-TV programs to be viewed only by authorized subscribers. This paper evaluated cryptographic strength of the bit generators proposed by the European Broadcast Unit and the Japan's Ministry of Posts and Telecommunications and some security weakness was found on the gen...
متن کاملOn Stochastic Security of Java Crypto and NIST DRBG Pseudorandom Sequences
Cryptographic primitives such as secure hash functions (e.g., SHA1, SHA2, and SHA3) and symmetric key block ciphers (e.g., AES and TDES) have been commonly used to design pseudorandom generators with counter modes (e.g., in Java Crypto Library and in NIST SP800-90A standards). It is assumed that if these primitives are secure then the pseudorandom generators based on these primitives are also s...
متن کاملMore efficient DDH pseudorandom generators
In this paper, we first show a DDH Lemma, which states that a multi-variable version of the decisional Diffie-Hellman problem is hard under the standard DDH assumption, where the group size is not necessarily known. Our proof, based on a self-reducibility technique, has a small reduction complexity. Using DDH Lemma, we extend the FSS pseudorandom generator of Farashahi et al. to a new one. The ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1312.6549 شماره
صفحات -
تاریخ انتشار 2013