2004
DOI: 10.1090/s0025-5718-04-01698-9
|View full text |Cite
|
Sign up to set email alerts
|

Predicting nonlinear pseudorandom number generators

Abstract: Abstract. Let p be a prime and let a and b be elements of the finite field Fp of p elements. The inversive congruential generator (ICG) is a sequence (un) of pseudorandom numbers defined by the relation u n+1 ≡ au −1 n +b mod p. We show that if sufficiently many of the most significant bits of several consecutive values un of the ICG are given, one can recover the initial value u 0 (even in the case where the coefficients a and b are not known). We also obtain similar results for the quadratic congruential gen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
39
3

Year Published

2004
2004
2012
2012

Publication Types

Select...
6
1

Relationship

3
4

Authors

Journals

citations
Cited by 42 publications
(45 citation statements)
references
References 33 publications
3
39
3
Order By: Relevance
“…We note that our results resemble those about predictability of various recursive pseudorandom number generators; see [2,3,4,5,8,9,10] and references therein.…”
Section: Introductionsupporting
confidence: 78%
“…We note that our results resemble those about predictability of various recursive pseudorandom number generators; see [2,3,4,5,8,9,10] and references therein.…”
Section: Introductionsupporting
confidence: 78%
“…These attacks show that the RSA PRG is insecure when the number of bits output per iteration r is larger than about 2 3 n [5] for e = 2, and about (1 − 1 e(e+1)/2+2 )n [4] in the general case (these results are obtained for r MS bits output per iteration and prime moduli, but we believe that with appropriate modifications they hold also for r LS bits and RSA moduli). We remark that the general case attacks in [4] use low-dimension lattices and are rigorously proven.…”
Section: Additional Related Workmentioning
confidence: 74%
“…Finally, we also wish to mention the lattice-based attacks of Blackburn et al [5,4] on a class of PRGs having the same iterative structure as our RSA PRG. These attacks show that the RSA PRG is insecure when the number of bits output per iteration r is larger than about 2 3 n [5] for e = 2, and about (1 − 1 e(e+1)/2+2 )n [4] in the general case (these results are obtained for r MS bits output per iteration and prime moduli, but we believe that with appropriate modifications they hold also for r LS bits and RSA moduli).…”
Section: Additional Related Workmentioning
confidence: 99%
“…Jao, D. Jetchev and R. Venkatesan [13, Conjecture 4.1] have conjectured that there exists a positive constant δ > 0 such that for any N ≥ (log q) 2 and any points P = Q the bound…”
Section: Resultsmentioning
confidence: 99%
“…Many standard pseudorandom number generators based on finite fields and residue rings have proved to be insecure, see [1,2,3,4,5,7,8,9,10,14,15,16]. Partially motivated by this and partially because this is of intrinsic interest for elliptic curve cryptography, several constructions of pseudorandom generators from elliptic curves have been proposed, see [18] for a survey of such constructions and results.…”
Section: Motivationmentioning
confidence: 99%