Sustainable Pseudo-random Number Generator
نویسندگان
چکیده
Barak and Halevi (BH) have proposed an efficient architecture for robust pseudorandom generators that ensure resilience in the presence of attackers with partial knowledge or partial controls of the generators’ entropy resources. The BH scheme is constructed from the Barak, Shaltiel and Tromer’s randomness extractor and its security is formalized in the simulation-based framework. The BH model however, does not address the scenario where an attacker completely controls the generators’ entropy resources with no knowledge of the internal state. Namely, the BH security model does not consider the security of bad-refresh conditioned on compromised = false. The security of such a case is interesting since if the output of the protocol conditioned on compromised = false looks random to the attacker, then the proposed scheme is secure even if the attacker completely controls entropy resources (recall that attackers with partial knowledge or partial controls of the generators’ entropy resources in the BH model). The BH scheme is called sustainable if the above mentioned security requirement is guaranteed. This paper studies the sustainability of the BH pseudorandom generator and makes the following two contributions: in the first fold, a new notion which we call sustainable pseudorandom generator which extends the security definition of the BH’s robust scheme is introduced and formalized in the simulation paradigm; in the second fold, we show that the BH’s robust scheme achieves the sustainability under the joint assumptions that the underlying stateless function G is a cryptographic pseudorandom number generator and the output of the underlying randomness extractor extract() is statistically close to the uniform distribution.
منابع مشابه
New Design of Crypto-Based Pseudo random number generator (CBPRNG) using BLOW FISH cipher
Random Number Generators (RNGs) are an important building block for algorithms and protocols in cryptography. Random number generation is used in a wide variety of cryptographic operations, such as key generation and challenge/response protocols. A random number generator outputs a sequence of 0s and 1s such that at any position, the next bit cannot be expected on the previous bits. However, tr...
متن کاملA Pseudo Random Number Generator using Permutation Matrices
Pseudo random numbers are used in a number of areas such as cryptography and scientific and statistical simulation. Random numbers are crucial in statistics to obtain a uniform distribution for the prior knowledge and integration of Monte Carlo methods in statistical signal processing. In this paper, we propose a new random number generator using permutation matrices. This algorithm has three m...
متن کاملAn Efficient Pseudo-Random Generator with Applications to Public-Key Encryption and Constant-Round Multiparty Computation
We present a pseudo-random bit generator expanding a uniformly random bitstring r of length k/2, where k is the security parameter, into a pseudo-random bit-string of length 2k − log(k) using one modular exponentiation. In contrast to all previous high expansion-rate pseudo-random bit generators, no hashing is necessary. The security of the generator is proved relative to Paillier’s composite d...
متن کاملExpanding the Length of a Pseudo-Random Number Generator
Expanding the Length of a Pseudo-Random Number Generator We now want to show how a pseudo-random number generator that only does a little bit of expansion, can be used to construct a pseudo-random generator that does a lot of expansion. The idea is that we view G(s) as consisting of “stuff” that we can spit out, together with a new seed that we feed back into the generator, etc., a polynomial n...
متن کاملExpanding the Length of a Pseudo-Random Number Generator
Expanding the Length of a Pseudo-Random Number Generator We now want to show how a pseudo-random number generator that only does a little bit of expansion, can be used to construct a pseudo-random generator that does a lot of expansion. The idea is that we view G(s) as consisting of “stuff” that we can spit out, together with a new seed that we feed back into the generator, etc., a polynomial n...
متن کامل