2022
DOI: 10.1038/s41598-022-11613-x
|View full text |Cite
|
Sign up to set email alerts
|

Design of a cryptographically secure pseudo random number generator with grammatical evolution

Abstract: This work investigates the potential for using Grammatical Evolution (GE) to generate an initial seed for the construction of a pseudo-random number generator (PRNG) and cryptographically secure (CS) PRNG. We demonstrate the suitability of GE as an entropy source and show that the initial seeds exhibit an average entropy value of 7.940560934 for 8-bit entropy, which is close to the ideal value of 8. We then construct two random number generators, GE-PRNG and GE-CSPRNG, both of which employ these initial seeds.… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
12
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
1
1

Relationship

1
8

Authors

Journals

citations
Cited by 27 publications
(12 citation statements)
references
References 24 publications
0
12
0
Order By: Relevance
“…This mapping separates the genotype (binary string) from the phenotype (executable program or expression tree), making it possible to incorporate grammar constraints in the search procedure. GE has been used in various applications, such as parameter optimisation for time series modeling [34], cryptography [35], etc., due to its flexibility in defining search spaces using BNF grammar.…”
Section: Grammatical Evolutionmentioning
confidence: 99%
“…This mapping separates the genotype (binary string) from the phenotype (executable program or expression tree), making it possible to incorporate grammar constraints in the search procedure. GE has been used in various applications, such as parameter optimisation for time series modeling [34], cryptography [35], etc., due to its flexibility in defining search spaces using BNF grammar.…”
Section: Grammatical Evolutionmentioning
confidence: 99%
“…Most of the works have either used blockchain for EHRs or KGs, but no work has used both for EHRs and data‐sharing to the best of our knowledge. All the works such as in References 36,37 have focused on reducing the chances of data tampering while increasing the data security and efficiency of the system through the use of blockchain and cryptographic algorithms. With this objective, the data storage is either private servers or secured clouds, or a combination of off‐chain and on‐chain storage.…”
Section: Related Workmentioning
confidence: 99%
“…Most of the works have either used blockchain for EHRs or KGs, but no work has used both for EHRs and data-sharing to the best of our knowledge. All the works such as in [36,37] have focused on reducing the chances of data tampering while increasing the data security and efficiency of the system through the use of blockchain and cryptographic algorithms. With this objective, the data storage is either private servers or secured clouds, or a combination of off-chain and on-chain storage.…”
Section: Related Workmentioning
confidence: 99%