2002
DOI: 10.1007/3-540-46035-7_24
|View full text |Cite
|
Sign up to set email alerts
|

A Practice-Oriented Treatment of Pseudorandom Number Generators

Abstract: Abstract. We study Pseudorandom Number Generators (PRNGs) as used in practice. We first give a general security framework for PRNGs, incorporating the attacks that users are typically concerned about. We then analyze the most popular ones, including the ANSI X9.17 PRNG and the FIPS 186 PRNG. Our results also suggest ways in which these PRNGs can be made more efficient and more secure.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

2
30
0

Year Published

2002
2002
2023
2023

Publication Types

Select...
9

Relationship

0
9

Authors

Journals

citations
Cited by 34 publications
(32 citation statements)
references
References 20 publications
2
30
0
Order By: Relevance
“…These algorithms consume random coins which are typically generated by pseudo-random number generators (PRNGs). Practical PRNGs, such as ANSI X9.17 PRNG and FIPS 186 PRNG, can generate bit-strings which are computationally indistinguishable from truly random strings provided that the seeds of the PRNGs are fresh and truly random [17]. In practice (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…These algorithms consume random coins which are typically generated by pseudo-random number generators (PRNGs). Practical PRNGs, such as ANSI X9.17 PRNG and FIPS 186 PRNG, can generate bit-strings which are computationally indistinguishable from truly random strings provided that the seeds of the PRNGs are fresh and truly random [17]. In practice (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…It is worth noticing that the construction of the above modified OFB mode operation is identical to the one of the ANSI X9.17 PRG mode of operation introduced by Desai et al in [DHY02], so that the pseudorandomness proof (related the associated expansion function) provided in Section 5 is to some extent complementary to the pseudorandomness proof (related to the the associated state transition function) established in [DHY02]. The modified OFB mode of operation is also similar to the keystream generation mode of operation of the KASUMI blockcipher used in the UMTS encryption function f8 [Ka00], up to the fact that in the f8 mode, two additional precautions are taken: the key used in the prewhitening computation differs from the one in the rest of the computations, and in order to prevent collisions between two output blocks from resulting in short cycles in the produced keystream sequence, a mixture of the OFB and counter techniques is applied.…”
Section: Modified Ofb Constructionmentioning
confidence: 96%
“…However, the security model considered in [DHY02] is quite distinct (and somewhat complementary): we consider the pseudorandomness properties of the one to t blocks expansion function resulting from the considered mode of operation, whereas [DHY02] models a PRG mode of operation as the iteration a "smaller" keyed state transition and keystream output function, and consider the pseudorandomness properties of such state transition functions. -in [HN00], Hastad and Näslund propose a pseudorandom numbers generator named BMGL.…”
Section: Introductionmentioning
confidence: 99%
“…BMY-PRG is the most efficient known construction, whose security relies on a reasonable assumption. Practical standardized PRGs based on block-ciphers and hash functions (a hash function is a function whose range is smaller than the domain, also referred to as a compression function) [FIPS94], though much more efficient, rely on a rather strong and not well-studied assumption (in the theoretical cryptography community) that the underlying function is a PRF [DHY02], and thus are not a focus of this work. In this paper, we investigate a question of finding an efficient hash-function-based PRG, whose security relies on collision-resistance, a very well-studied and widely-used property of a hash function.…”
Section: Introduction 1motivationmentioning
confidence: 99%