2016
DOI: 10.5815/ijitcs.2016.09.04
|View full text |Cite
|
Sign up to set email alerts
|

Comparing Some Pseudo-Random Number Generators and Cryptography Algorithms Using a General Evaluation Pattern

Abstract: Since various pseudo-random algorith ms and sequences are used for cryptography of data or as init ial values for starting a secure communicat ion, how these algorith ms are analyzed and selected is very important. In fact, given the g rowingly extensive types of pseudorandom sequences and block and stream cipher algorith ms, selection of an appropriate algorith m needs an accurate and thorough investigation. Also, in order to generate a pseudo-random sequence and generalize it to a cryptographer algorith m, a… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 23 publications
0
5
0
Order By: Relevance
“…Ahmad.G.et.al. in [25] generated pseudorandom numbers and employed them with a variety of encryption methods, including Salsa20. The findings of NIST measures were used to assess different encryption algorithms that used pseudorandom numbers, and the results showed that utilizing random numbers with the Salsa20 stream cipher algorithm obtained faster implementation and more diffusion than the original Salsa20 algorithm.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…Ahmad.G.et.al. in [25] generated pseudorandom numbers and employed them with a variety of encryption methods, including Salsa20. The findings of NIST measures were used to assess different encryption algorithms that used pseudorandom numbers, and the results showed that utilizing random numbers with the Salsa20 stream cipher algorithm obtained faster implementation and more diffusion than the original Salsa20 algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…A chaotic system or computational intelligence (CI) is therefore the ideal answer. Several techniques for chaotic systems have been devised [12]- [16]. The application of chaos theory, a kind of nonlinear system, in cryptography has recently been made to address issues with existing encryption techniques, which are losing their ability to provide quick and secure encryption for large amounts of data simultaneously [15].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Another research [9] discussed how one can solve the issue of finding a proper framework that will allow generation of a pseudorandom sequester to be generalized into the cryptographic algorithm. This condition is necessary to ensure that the algorithm can be evaluated as swiftly as possible.…”
Section: Related Workmentioning
confidence: 99%
“…Block ciphers process a fixed-size plaintext block to output a ciphertext block of the same size while stream ciphers encrypts each plaintext bit or character independently, using a cipher and an encryption key. These output are considered to be randomized, given an encryption and/or decryption algorithm and the key [85] [62]. One of the oldest techniques of PRNGs is the Mid-Square method [48] [23].…”
Section: Pseudo-random Number Generatorsmentioning
confidence: 99%