2021
DOI: 10.1088/1757-899x/1055/1/012076
|View full text |Cite
|
Sign up to set email alerts
|

Investigation of Strength and Security of Pseudo Random Number Generators

Abstract: Security is a key factor in today’s fast communicating world. Many cryptographic algorithms are tested and put into use efficiently. Random numbers are used in diverse forms like nonces, secret key, initialization vector, etc. They find place in encryption, digital signature, hashing algorithms. A deterministic algorithms takes an intial seed value as input and produces pseudo random numbers with falsely induced randomness. This research work extensively surveys large set of state-of-the-art PRNGs and categori… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0
1

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 78 publications
0
4
0
1
Order By: Relevance
“…In the designed PoC, the KDF, Secure Random Generator (SRG) [45][46][47], and HMAC are assumed to be secure, and the channel's password and salt are assumed to be previously exchanged in a secure manner, preferably in-person, and generated using a SRG. Moreover, it is also assumed that the UUID is securely generated and that the used images are either chosen randomly from online galleries or from the user's gallery accordingly to user preference.…”
Section: Discussionmentioning
confidence: 99%
“…In the designed PoC, the KDF, Secure Random Generator (SRG) [45][46][47], and HMAC are assumed to be secure, and the channel's password and salt are assumed to be previously exchanged in a secure manner, preferably in-person, and generated using a SRG. Moreover, it is also assumed that the UUID is securely generated and that the used images are either chosen randomly from online galleries or from the user's gallery accordingly to user preference.…”
Section: Discussionmentioning
confidence: 99%
“…[ 437,438 ] Traditional approaches create seed‐dependent pseudo‐random numbers using software and hardware strategies. [ 439,440 ] A physical entropy source, e.g., variability or noise in memory elements, is required to construct a true random number generator (TRNG). Additionally, for many domains, e.g., deep learning, machine learning, stochastic computing, and data encryption, random number generation using the MM system is important.…”
Section: Mm‐based In‐memory Computingmentioning
confidence: 99%
“…When a seed value is provided to a PRNG, it uses this value as the initial state, the PRNG applies a mathematical operation to this seed value to produce a new number, which then becomes the input for the next iteration and so on. Seeding a PRNG with a specific number makes its output reproducible [15], if not seeded the PRNG will usually use a value derived from the system clock called timestamp as a seed, (see Fig. 3).…”
Section: B Seed-based Synchronization and Prng Phasementioning
confidence: 99%