International Journal of Communications, Network and System Sciences

Volume 4, Issue 10 (October 2011)

ISSN Print: 1913-3715   ISSN Online: 1913-3723

Google-based Impact Factor: 0.66  Citations  h5-index & Ranking

Introduction to Secure PRNGs

HTML  Download Download as PDF (Size: 356KB)  PP. 616-621  
DOI: 10.4236/ijcns.2011.410074    6,065 Downloads   10,398 Views  Citations

Affiliation(s)

.

ABSTRACT

Pseudo-Random Number Generators (PRNGs) are required for generating secret keys in cryptographic algorithms, generating sequences of packet in Network simulations (workload generators) and other applications in various fields. In this paper we will discuss a list of some requirements for generating a reliable random sequence and then will present some PRNG methods which are based on combinational chaotic logistic map. In the final section after a brief introduction to two statistical test packets, TestU01 and NIST suite tests, the PRNG methods which are presented in the fourth section will be appraised under these test packets and the results will be reported.

Share and Cite:

M. Babaei and M. Farhadi, "Introduction to Secure PRNGs," International Journal of Communications, Network and System Sciences, Vol. 4 No. 10, 2011, pp. 616-621. doi: 10.4236/ijcns.2011.410074.

Cited by

[1] Investigation of Strength and Security of Pseudo Random Number Generators
2021
[2] Performance of Finite Precision on Discrete Chaotic Map Based on a Feedback Shift Register
2020
[3] Self-generated encryption model of acoustics
2020
[4] A New Bit Plane Specific Longest Repeating Pattern Test for Statistical Analysis of Bit Sequences
2020
[5] Trustworthy image security via involving binary and chaotic gravitational searching within PRNG selections
2020
[6] Study for Randomness of Diverse Pseudo-Random Bit Generators Oriented to Telecommunication Applications
2019
[7] Biometric signcryption using hyperelliptic curve and cryptographically secure random number
2016
[8] Hyperelliptic Based Signcryption with Sensor-Seeded Random Number
INTERNATIONAL JOURNAL OF COMPUTERS AND COMMUNICATIONS, 2016
[9] Secure signcryption on hyperelliptic curve with sensor based random number
Recent Advances on Computer Engineering, 2015
[10] PUFKEY: A High-Security and High-Throughput Hardware True Random Number Generator for Sensor Networks
Sensors, 2015
[11] Secure Signcryption on Hyper Elliptic Curve with Sensor-Based Random Number
Recent Advances in Computer Engineering, 2015
[12] A General Evaluation Pattern for Pseudo Random Number Generators
Trends in Applied Sciences Research, 2015
[13] Random number generation based on sensor with decimation method
2015
[14] A novel text and image encryption method based on chaos theory and DNA computing
Natural Computing, 2013
[15] Secure PRNG seeding on commercial off-the-shelf microcontrollers
Proceedings of the 3rd international workshop on Trustworthy embedded devices, 2013

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.