New Design of Crypto-Based Pseudo random number generator (CBPRNG) using BLOW FISH cipher
نویسنده
چکیده
Random Number Generators (RNGs) are an important building block for algorithms and protocols in cryptography. Random number generation is used in a wide variety of cryptographic operations, such as key generation and challenge/response protocols. A random number generator outputs a sequence of 0s and 1s such that at any position, the next bit cannot be expected on the previous bits. However, true random number produces nondeterministic output since if the same random generator is run twice, identical results are not received. Thus we go for pseudo random number generator that is deterministic device because if this random number generator is run twice or more, it gives same results. Our paper presents new crypto based pseudo random number generator. It uses BLOW FISH ciphers and the Cipher-Block chaining (CBC) mode that uses three stages of the block chaining. The plain text for each stage comes from the output of the first BLOW FISH, which uses the 64-Bit date and time as the plain text. CBPRNG creates three 64-bit random numbers, the first and the second are concatenated to create a 128-random number and the third is used as next initial vector (IV) for CBPRNG. Our Crypto-Based Pseudo-random Number Generator produces a sequence of bits that has a random looking distribution. This new generator helps to develop huge range cryptographic applications to increase the system security. A number of applications such as financial security applications and Pretty Good Privacy (PGP) use this technique.
منابع مشابه
Design of crypto primitives based on quasigroups
Today, the security of the modern world is undoubtedly dependent on the cryptographic primitives built into the various protocols used for secure communication. Let us mention here the most important, like block ciphers, stream ciphers, digital signatures and encryption schemes, hash functions, pseudo random number generators, ... The design of these, and many other crypto primitives, uses di e...
متن کاملGenerating Chaotic Stream Ciphers Using Chaotic Systems
A new scheme for generating good pseudo-random numbers, based on the composition of chaotic maps, is studied. In this method, hereafter called the chaotic stream cipher, one first uses a known chaotic dynamical system to generate a sequence of pseudo-random bytes, then applies certain permutations to them, using the discretized version of another two-dimensional chaotic map. Standard statistica...
متن کاملA Novel Approach for Pseudo-Random Seed Generation
Random sequences play an important role in all aspects of Cryptography. All cryptographic systems and protocols are based on secrets and can only be as strong as the random sequence generators they use to generate those secrets. The best cryptographic scheme becomes insecure once its secrets can be predicted or determined. In modern cryptography random sequences are used (1) to generate session...
متن کاملAn Improved Pseudo-random Generator Based on Discrete Log
Under the assumption that solving the discrete logarithm problem modulo an n-bit prime p is hard even when the exponent is a small c-bit number, we construct a new and improved pseudo-random bit generator. This new generator outputs n− c− 1 bits per exponentiation with a c-bit exponent. Using typical parameters, n = 1024 and c = 160, this yields roughly 860 pseudo-random bits per small exponent...
متن کاملChaos-based Pseudo-Random Number Generators and Chip Implementation
Cryptography as an ancient subject is endowed with new vigor by chaos theory. Cryptography protects the security of today’s ubiquitous Internet communication, which as an open network is vulnerable to attack. In this paper, chaos-based cryptography is surveyed with focus on designing chaotic pseudo-random number generators (CPRNGs) for stream cipher and their chip implementation. The properties...
متن کامل