Abstract:In this article, we have investigated the statistical nature of popular pseudorandom number generators (PRNGs) present in the literature and have analyzed their performance against the battery of tests prescribed in NIST SP800‐22rev1a. Different tests performed in this article provide an insight into the PRNGs and have revealed if they are statistically random or not, which is the first criteria in being cryptographically secure. In our study, we have considered the following PRNGs: (a) Linear Congruential Gen… Show more
“…In such use cases, the stream ciphers [16] will also not prove efficient due to the length of the payload. Moreover, a pseudorandom number generator (PRNG) [17] will be required to ensure their correct operation. The PRNG provides necessary random values on an ongoing basis.…”
Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very short messages commonly used for example in ultra-low-power and resource-constrained wireless network sensor nodes based on microcontrollers (MCUs). In such cases, the data payload can be as short as a few bits of data while the typical length of the key is several hundred bits or more. The article proposes an idea of employing a complex of two algorithms, initially applied for data compression, acting as a standard-length encryption key algorithm to increase the transmission security of very short data sequences, even as short as one or a few bytes. In this article, we present and evaluate an approach that uses LZW and Huffman coding to achieve data transmission obfuscation and a basic level of security.
“…In such use cases, the stream ciphers [16] will also not prove efficient due to the length of the payload. Moreover, a pseudorandom number generator (PRNG) [17] will be required to ensure their correct operation. The PRNG provides necessary random values on an ongoing basis.…”
Modern, commonly used cryptosystems based on encryption keys require that the length of the stream of encrypted data is approximately the length of the key or longer. In practice, this approach unnecessarily complicates strong encryption of very short messages commonly used for example in ultra-low-power and resource-constrained wireless network sensor nodes based on microcontrollers (MCUs). In such cases, the data payload can be as short as a few bits of data while the typical length of the key is several hundred bits or more. The article proposes an idea of employing a complex of two algorithms, initially applied for data compression, acting as a standard-length encryption key algorithm to increase the transmission security of very short data sequences, even as short as one or a few bytes. In this article, we present and evaluate an approach that uses LZW and Huffman coding to achieve data transmission obfuscation and a basic level of security.
“…It is impossible to consider true randomness in PRNG-generated [5] sequences as they are implemented by software, based on mathematical algorithms and determined by an initial (seed) value. In contrast, the TRNG and QRNG, based on unpredictable physical means, generate the true randomness in the sequence of random numbers.…”
Section: Category Iii: Research Objectives Of Quantum Rngs For Crypto...mentioning
confidence: 99%
“…Pseudorandom number generators (PRNGs) [3,4] are based on algorithms for generating seemingly random numbers, which are determined by their seed, or initial value to enhance security. Shobhit Sinha et al [5] compared various PRNGs based on their statistical randomness and cryptographic security, concluding that some PRNGs performed RNGs' randomness critically depends on the type of RNG.…”
Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic algorithms are public and their strength depends on the keys, cryptoanalysis of encrypted ciphers can significantly contribute to the unveiling of the cipher’s key. Therefore, to ensure high data security over a network, researchers need to improve the randomness of keys as they develop cryptosystems. Quantum particles have a leading edge in advancing RNG technology as they can provide true randomness, unlike pseudo-random numbers generators (PRNGs). In order to increase the level of the security of cryptographic systems based on random numbers, this survey focuses on three objectives: Cryptosystems with related cryptographic attacks, RNG-based cryptosystems, and the design of quantum random number generators (QRNGs). This survey aims to provide researchers with information about the importance of RNG-based ciphers and various research techniques for QRNGs that can incorporate quantum-based true randomness in cryptosystems.
“…In [27], different LCG PRNGS algorithms presented different results in the NIST test. Results showed that compared with PRNGs, all LCGs exhibited a poor performance.…”
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.