SlideShare une entreprise Scribd logo
1  sur  12
Télécharger pour lire hors ligne
Two Pseudo-random Number Generators, an
               Overview

                By Kato Mivule

              Bowie State University
         Computer Science Department
   Wireless Security Presentation - Spring 2012

                Dr. Claude Turner
Two Pseudo-random Number Generators, an Overview


Overview

   • Introduction

   • A Pseudorandom Bit Generator

   • Linear Congruential Generator (LCG)

   • Blum-Blum-Shub Pseudorandom Bit Generators

   • BBS Algorithm

   • Conclusion and Suggestions
Two Pseudo-random Number Generators, an Overview


Introduction

      • Random number generation is a critical part of any cryptographic and
        spread spectrum systems in terms of strength and security.

      • A weak random number generation in a cryptographic or spread
        spectrum system could results in a compromised system.

      • As such a number of cryptographic and spread spectrum systems
        depend on the generation random and pseudorandom bits for
        enhanced security.
Two Pseudo-random Number Generators, an Overview


A pseudorandom bit generator (PRBG)

      • This is an algorithm that utilizes deterministic procedures when given
        a seed, to produce a sequence of random bits based on the seed value
        that appear to be random and will pass the random number tests.

      • The input to the PRBG is known as the seed, while the output of the
        PRBG is referred to as a pseudorandom bit sequence
Two Pseudo-random Number Generators, an Overview


Linear Congruential Generator (LCG)

      • This type of algorithm generates long random strings of numbers with
        the sequence repeating at some point.

      • The random string of values generated is determined by a fixed
        number called a seed.

      •     𝑥 𝑛+1 = (𝑎𝑥 𝑛 + 𝑏) 𝑚𝑜𝑑 𝑚
Two Pseudo-random Number Generators, an Overview


Linear Congruential Generator (LCG)

      • One of the popular techniques for the production of pseudorandom
        numbers is the utilization of Linear Congruential Generators (LCG).

      •    LCGs produce pseudorandom sequences of numbers 𝑥1 , 𝑥2 , 𝑥3 ...
           according to the linear recurrence:

      •     𝑥 𝑛+1 = (𝑎𝑥 𝑛 + 𝑏) 𝑚𝑜𝑑 𝑚

      • Where 𝑛 ≥ 1
Two Pseudo-random Number Generators, an Overview


Linear Congruential Generator (LCG)

In a Linear Congruential Generator, the next pseudorandom number is generated from
the current one such that:

                                𝑥 𝑛+1 = (𝑎𝑥 𝑛 + 𝑏) 𝑚𝑜𝑑 𝑚

         Where 𝑎 and 𝑏, are relatively prime numbers
              𝑚 = modulus and 𝑚 > 0
             𝑎 = the multiplier and 0 < 𝑎 < 𝑚
             𝑏 = the increment and 0 < 𝑏 < 𝑚
             𝑥0 = the starting seed value and 0 ≤ 𝑥0 < 𝑚

The scope of random numbers generated is less than the range of the integer used in the
calculation .

The generated random numbers 𝑥 𝑖 are said to be periodic where the period is always less
≤ 𝑚 and all 𝑥 𝑖 are in the interval 0 ≤ 𝑥 𝑖 < 𝑚.
Two Pseudo-random Number Generators, an Overview


Linear Congruential Generator (LCG)

Example of LCG
m = 16; a = 3; b = 1
                                  𝑥 𝑛+1 = (3𝑥 𝑛 + 1) 𝑚𝑜𝑑 16

                       𝑥0 = (3*0 + 1) mod 16 = 1
                       𝑥1 = (3*1 + 1) mod 16 = 4
                       𝑥2 = (3*4 + 1) mod 16 = 13
                       𝑥3 = (3*13 + 1) mod 16 = 8
                       𝑥4 = (3*8 +1) mod 16 = 9
                       𝑥5 = (3*9 +1) mod 16 = 12
                       𝑥6 = (3*12 +1) mod 16 = 5
                       𝑥7 = (3*5 +1) mod 16 = 0
                       𝑥8 = (3*0 +1) mod 16 = 1

Therefore generated sequence = {1, 4, 13, 8, 9, 12, 5, 0, 1}
Two Pseudo-random Number Generators, an Overview


Blum-Blum-Shub (BBS) Pseudorandom Bit Generators

• Blum Shub (BBS) is a pseudorandom number generator suggested in 1986 by
  Lenore Blum, Manuel Blum and Michael Shub (Blum et al., 1986).

• BBS is said to be a cryptographically secure pseudorandom bit generator
  (CSPRBG). A CSPRBG is defined as one that passes the next-bit test.

• A pseudorandom bit generator is said to pass the next-bit test, if given the
  first k bits of the sequence, there is no practical algorithm that can predict
  that the next bit will be a 1 or 0 with probability greater than ½ therefore the
  sequence is unpredictable.

           • Blum Blum Shub is in the form:

           •   𝑥 𝑛+1 = 𝑥 2 𝑚𝑜𝑑 𝑚
                         𝑛
Two Pseudo-random Number Generators, an Overview


BBS Algorithm

• Generate two large secret random prime numbers 𝑝 and 𝑞
• Let each of the chosen primes 𝑝 and 𝑞 be harmonious

        1.   Compute 𝑛 = 𝑝𝑞
        2.   Select a random integer 𝑠 (the seed) in the interval [1, 𝑛 − 1] such
             that gcd 𝑠, 𝑛 = 1
        3.   Let 𝑥0 = 𝑠 2 𝑚𝑜𝑑 𝑛
        4.   For 𝑖 = 1 𝑡𝑜 ∞ 𝑑𝑜
        5.   Compute 𝑥 𝑖 = 𝑠 2 𝑚𝑜𝑑 𝑛
        6.   Compute 𝑥 𝑖 = 𝑥 𝑖 𝑚𝑜𝑑 2
        7.    𝑧 𝑖 = 𝑡ℎ𝑒 𝑙𝑒𝑎𝑠𝑡 𝑠𝑖𝑔𝑛𝑖𝑓𝑖𝑐𝑎𝑛𝑡 𝑏𝑖𝑡 𝑜𝑓 𝑥 𝑖
        8.   Output the sequence as𝑧1 , 𝑧2 , 𝑧3 , … , 𝑧 𝑙
Two Pseudo-random Number Generators, an Overview


Thank You!
             Comments, Questions, and Suggestions.
Two Pseudo-random Number Generators, an Overview

Sources and Bibliography

[1] Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone "Handbook of Applied Cryptography" ISBN 0849385237, 9780849385230, Pages 169-190, CRC
Press, 1997

[2] X. Wang, W. Yu, X. Fu, D. Xuan, and W. Zhao, “iloc: An invisible localization attack to internet threat monitoring systems,” IEEE INFOCOM 2008. The 27th
Conference on Computer Communications, 2008, pp. 1930–1938.

[3] William Stallings, "Cryptography and Network Security: Principles and Practice", Prentice Hall, 2010, ISBN 0136097049, 9780136097044

[4] Bob Bockholt, "linear congruential generator", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards
and Technology. 17 December 2004. (accessed June 20th, 2010) Available from: http://www.itl.nist.gov/div897/sqg/dads/HTML/linearCongruentGen.html

[5] Samuel S. Wagstaff, Jr, "Cyptanalysis of Number Theoretic Ciphers", Chapman & Hall/CRC, ISBN 1-58488-153-4, page 211

[6] M.E. Yalcin, J.A.K. Suykens, J. Vandewalle "True random bit generation from a double-scroll attractor", IEEE Transactions on Circuits and Systems, 2004

[7] Anders Andersen, Finn Jensen, Morten Kristensen "TrueRandom", 2009,
http://www.daimi.au.dk/~ivan/reports2009/TrueRandom.pdf

[8] Henk C. A. van Tilborg, "Encyclopedia of cryptography and security", Springer, 2005,
ISBN 038723473X, 9780387234731

[9] Richard A. Mollin, "RSA and public-key cryptography", Volume 21 of Discrete mathematics and its applications, CRC Press, 2003, ISBN 1584883383,
9781584883388

Contenu connexe

Tendances

Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbers
Mshari Alabdulkarim
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
Rasheed Karuvally
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
anas_elf
 

Tendances (20)

Finite automata-for-lexical-analysis
Finite automata-for-lexical-analysisFinite automata-for-lexical-analysis
Finite automata-for-lexical-analysis
 
Pgp
PgpPgp
Pgp
 
Data Encryption Standard (DES)
Data Encryption Standard (DES)Data Encryption Standard (DES)
Data Encryption Standard (DES)
 
Generate and test random numbers
Generate and test random numbersGenerate and test random numbers
Generate and test random numbers
 
Hash Function
Hash FunctionHash Function
Hash Function
 
Midsquare method- simulation system
Midsquare method- simulation systemMidsquare method- simulation system
Midsquare method- simulation system
 
Fermat and euler theorem
Fermat and euler theoremFermat and euler theorem
Fermat and euler theorem
 
Email security
Email securityEmail security
Email security
 
Elliptic curve cryptography
Elliptic curve cryptographyElliptic curve cryptography
Elliptic curve cryptography
 
Computer Security Lecture 7: RSA
Computer Security Lecture 7: RSAComputer Security Lecture 7: RSA
Computer Security Lecture 7: RSA
 
Secure Socket Layer (SSL)
Secure Socket Layer (SSL)Secure Socket Layer (SSL)
Secure Socket Layer (SSL)
 
DNA based Cryptography_Final_Review
DNA based Cryptography_Final_ReviewDNA based Cryptography_Final_Review
DNA based Cryptography_Final_Review
 
Key management
Key managementKey management
Key management
 
Hash Function
Hash Function Hash Function
Hash Function
 
Genetic Algorithms
Genetic AlgorithmsGenetic Algorithms
Genetic Algorithms
 
Elliptical curve cryptography
Elliptical curve cryptographyElliptical curve cryptography
Elliptical curve cryptography
 
RSA algorithm
RSA algorithmRSA algorithm
RSA algorithm
 
Elgamal &amp; schnorr digital signature scheme copy
Elgamal &amp; schnorr digital signature scheme   copyElgamal &amp; schnorr digital signature scheme   copy
Elgamal &amp; schnorr digital signature scheme copy
 
Block cipher modes of operation
Block cipher modes of operation Block cipher modes of operation
Block cipher modes of operation
 
MAC-Message Authentication Codes
MAC-Message Authentication CodesMAC-Message Authentication Codes
MAC-Message Authentication Codes
 

En vedette

Pseudorandom number generators powerpoint
Pseudorandom number generators powerpointPseudorandom number generators powerpoint
Pseudorandom number generators powerpoint
David Roodman
 
Presentazione Peopleware Marcom
Presentazione Peopleware MarcomPresentazione Peopleware Marcom
Presentazione Peopleware Marcom
robertoiacobino
 
OUMH1103: TOPIK 3: READING FOR INFORMATION
OUMH1103: TOPIK 3: READING FOR INFORMATIONOUMH1103: TOPIK 3: READING FOR INFORMATION
OUMH1103: TOPIK 3: READING FOR INFORMATION
Rasidah Sukor
 
Book Design by Jason Gonzales
Book Design by Jason GonzalesBook Design by Jason Gonzales
Book Design by Jason Gonzales
Jason Gonzales
 
17.mengadministrasi server dalam_jaringan
17.mengadministrasi server dalam_jaringan17.mengadministrasi server dalam_jaringan
17.mengadministrasi server dalam_jaringan
An Atsa
 
Lesson 7 world_history_medieval_period_new_
Lesson 7 world_history_medieval_period_new_Lesson 7 world_history_medieval_period_new_
Lesson 7 world_history_medieval_period_new_
Anna Romana
 

En vedette (20)

Random number generator
Random number generatorRandom number generator
Random number generator
 
Pseudo Random Bit Sequence Generator
Pseudo Random Bit Sequence Generator Pseudo Random Bit Sequence Generator
Pseudo Random Bit Sequence Generator
 
Pseudorandom number generators powerpoint
Pseudorandom number generators powerpointPseudorandom number generators powerpoint
Pseudorandom number generators powerpoint
 
Random Number Generation
Random Number GenerationRandom Number Generation
Random Number Generation
 
Random Number Generators
Random Number GeneratorsRandom Number Generators
Random Number Generators
 
Carta mordiscon
Carta mordisconCarta mordiscon
Carta mordiscon
 
Mechanical engineering
Mechanical engineeringMechanical engineering
Mechanical engineering
 
Presentazione Peopleware Marcom
Presentazione Peopleware MarcomPresentazione Peopleware Marcom
Presentazione Peopleware Marcom
 
Presentt
PresenttPresentt
Presentt
 
OUMH1103: TOPIK 3: READING FOR INFORMATION
OUMH1103: TOPIK 3: READING FOR INFORMATIONOUMH1103: TOPIK 3: READING FOR INFORMATION
OUMH1103: TOPIK 3: READING FOR INFORMATION
 
Iltabloidmotori
IltabloidmotoriIltabloidmotori
Iltabloidmotori
 
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an OverviewKato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
Kato Mivule - Utilizing Noise Addition for Data Privacy, an Overview
 
Oumh1103 bab 4
Oumh1103 bab 4Oumh1103 bab 4
Oumh1103 bab 4
 
Book Design by Jason Gonzales
Book Design by Jason GonzalesBook Design by Jason Gonzales
Book Design by Jason Gonzales
 
Baker Business Bootcamp
Baker Business BootcampBaker Business Bootcamp
Baker Business Bootcamp
 
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data PrivacyA Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
A Codon Frequency Obfuscation Heuristic for Raw Genomic Data Privacy
 
17.mengadministrasi server dalam_jaringan
17.mengadministrasi server dalam_jaringan17.mengadministrasi server dalam_jaringan
17.mengadministrasi server dalam_jaringan
 
Lesson 7 world_history_medieval_period_new_
Lesson 7 world_history_medieval_period_new_Lesson 7 world_history_medieval_period_new_
Lesson 7 world_history_medieval_period_new_
 
HumanCloud - Trace
HumanCloud - TraceHumanCloud - Trace
HumanCloud - Trace
 
AM01PRO
AM01PROAM01PRO
AM01PRO
 

Similaire à Two Pseudo-random Number Generators, an Overview

hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdhhddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
zoobiarana76
 

Similaire à Two Pseudo-random Number Generators, an Overview (20)

Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
 
TMPA-2017: Evolutionary Algorithms in Test Generation for digital systems
TMPA-2017: Evolutionary Algorithms in Test Generation for digital systemsTMPA-2017: Evolutionary Algorithms in Test Generation for digital systems
TMPA-2017: Evolutionary Algorithms in Test Generation for digital systems
 
4,encoder & decoder MUX and DEMUX EEng - Copy.pdf
4,encoder & decoder MUX and DEMUX EEng - Copy.pdf4,encoder & decoder MUX and DEMUX EEng - Copy.pdf
4,encoder & decoder MUX and DEMUX EEng - Copy.pdf
 
4. random number and it's generating techniques
4. random number and it's generating techniques 4. random number and it's generating techniques
4. random number and it's generating techniques
 
STEGANOGRAPHY BASED ASYMMETRIC KEY CRYPTOSYSTEM USING TRELLIS CODED GENETIC A...
STEGANOGRAPHY BASED ASYMMETRIC KEY CRYPTOSYSTEM USING TRELLIS CODED GENETIC A...STEGANOGRAPHY BASED ASYMMETRIC KEY CRYPTOSYSTEM USING TRELLIS CODED GENETIC A...
STEGANOGRAPHY BASED ASYMMETRIC KEY CRYPTOSYSTEM USING TRELLIS CODED GENETIC A...
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers (1).ppt
quantumComputers (1).pptquantumComputers (1).ppt
quantumComputers (1).ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.pptICICI-An HR perspective
quantumComputers.pptICICI-An HR perspectivequantumComputers.pptICICI-An HR perspective
quantumComputers.pptICICI-An HR perspective
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdhhddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
 
07 Statistical approaches to randomization
07 Statistical approaches to randomization07 Statistical approaches to randomization
07 Statistical approaches to randomization
 
07 Statistical approaches to randomization (2016)
07 Statistical approaches to randomization (2016)07 Statistical approaches to randomization (2016)
07 Statistical approaches to randomization (2016)
 
Random thoughts on IoT
Random thoughts on IoTRandom thoughts on IoT
Random thoughts on IoT
 

Plus de Kato Mivule

An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
Kato Mivule
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Kato Mivule
 

Plus de Kato Mivule (20)

A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization A Study of Usability-aware Network Trace Anonymization
A Study of Usability-aware Network Trace Anonymization
 
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A TutorialCancer Diagnostic Prediction with Amazon ML – A Tutorial
Cancer Diagnostic Prediction with Amazon ML – A Tutorial
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
Towards A Differential Privacy and Utility Preserving Machine Learning Classi...
 
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
An Investigation of Data Privacy and Utility Preservation Using KNN Classific...
 
Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...Implementation of Data Privacy and Security in an Online Student Health Recor...
Implementation of Data Privacy and Security in an Online Student Health Recor...
 
Applying Data Privacy Techniques on Published Data in Uganda
 Applying Data Privacy Techniques on Published Data in Uganda Applying Data Privacy Techniques on Published Data in Uganda
Applying Data Privacy Techniques on Published Data in Uganda
 
Kato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy EngineeringKato Mivule - Towards Agent-based Data Privacy Engineering
Kato Mivule - Towards Agent-based Data Privacy Engineering
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic AlgorithmsLit Review Talk by Kato Mivule: A Review of Genetic Algorithms
Lit Review Talk by Kato Mivule: A Review of Genetic Algorithms
 
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
Lit Review Talk by Kato Mivule: Protecting DNA Sequence Anonymity with Genera...
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a GaugeAn Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
An Investigation of Data Privacy and Utility Using Machine Learning as a Gauge
 
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
Lit Review Talk - Signal Processing and Machine Learning with Differential Pr...
 
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
A Comparative Analysis of Data Privacy and Utility Parameter Adjustment, Usin...
 
Kato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance ComputingKato Mivule: An Overview of CUDA for High Performance Computing
Kato Mivule: An Overview of CUDA for High Performance Computing
 
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
Literature Review: The Role of Signal Processing in Meeting Privacy Challenge...
 
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of  Adaptive Boosting – AdaBoostKato Mivule: An Overview of  Adaptive Boosting – AdaBoost
Kato Mivule: An Overview of Adaptive Boosting – AdaBoost
 
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
Kato Mivule: COGNITIVE 2013 - An Overview of Data Privacy in Multi-Agent Lear...
 
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
Kato Mivule: An Investigation of Data Privacy and Utility Preservation Using ...
 

Dernier

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Dernier (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

Two Pseudo-random Number Generators, an Overview

  • 1. Two Pseudo-random Number Generators, an Overview By Kato Mivule Bowie State University Computer Science Department Wireless Security Presentation - Spring 2012 Dr. Claude Turner
  • 2. Two Pseudo-random Number Generators, an Overview Overview • Introduction • A Pseudorandom Bit Generator • Linear Congruential Generator (LCG) • Blum-Blum-Shub Pseudorandom Bit Generators • BBS Algorithm • Conclusion and Suggestions
  • 3. Two Pseudo-random Number Generators, an Overview Introduction • Random number generation is a critical part of any cryptographic and spread spectrum systems in terms of strength and security. • A weak random number generation in a cryptographic or spread spectrum system could results in a compromised system. • As such a number of cryptographic and spread spectrum systems depend on the generation random and pseudorandom bits for enhanced security.
  • 4. Two Pseudo-random Number Generators, an Overview A pseudorandom bit generator (PRBG) • This is an algorithm that utilizes deterministic procedures when given a seed, to produce a sequence of random bits based on the seed value that appear to be random and will pass the random number tests. • The input to the PRBG is known as the seed, while the output of the PRBG is referred to as a pseudorandom bit sequence
  • 5. Two Pseudo-random Number Generators, an Overview Linear Congruential Generator (LCG) • This type of algorithm generates long random strings of numbers with the sequence repeating at some point. • The random string of values generated is determined by a fixed number called a seed. • 𝑥 𝑛+1 = (𝑎𝑥 𝑛 + 𝑏) 𝑚𝑜𝑑 𝑚
  • 6. Two Pseudo-random Number Generators, an Overview Linear Congruential Generator (LCG) • One of the popular techniques for the production of pseudorandom numbers is the utilization of Linear Congruential Generators (LCG). • LCGs produce pseudorandom sequences of numbers 𝑥1 , 𝑥2 , 𝑥3 ... according to the linear recurrence: • 𝑥 𝑛+1 = (𝑎𝑥 𝑛 + 𝑏) 𝑚𝑜𝑑 𝑚 • Where 𝑛 ≥ 1
  • 7. Two Pseudo-random Number Generators, an Overview Linear Congruential Generator (LCG) In a Linear Congruential Generator, the next pseudorandom number is generated from the current one such that: 𝑥 𝑛+1 = (𝑎𝑥 𝑛 + 𝑏) 𝑚𝑜𝑑 𝑚 Where 𝑎 and 𝑏, are relatively prime numbers 𝑚 = modulus and 𝑚 > 0 𝑎 = the multiplier and 0 < 𝑎 < 𝑚 𝑏 = the increment and 0 < 𝑏 < 𝑚 𝑥0 = the starting seed value and 0 ≤ 𝑥0 < 𝑚 The scope of random numbers generated is less than the range of the integer used in the calculation . The generated random numbers 𝑥 𝑖 are said to be periodic where the period is always less ≤ 𝑚 and all 𝑥 𝑖 are in the interval 0 ≤ 𝑥 𝑖 < 𝑚.
  • 8. Two Pseudo-random Number Generators, an Overview Linear Congruential Generator (LCG) Example of LCG m = 16; a = 3; b = 1 𝑥 𝑛+1 = (3𝑥 𝑛 + 1) 𝑚𝑜𝑑 16 𝑥0 = (3*0 + 1) mod 16 = 1 𝑥1 = (3*1 + 1) mod 16 = 4 𝑥2 = (3*4 + 1) mod 16 = 13 𝑥3 = (3*13 + 1) mod 16 = 8 𝑥4 = (3*8 +1) mod 16 = 9 𝑥5 = (3*9 +1) mod 16 = 12 𝑥6 = (3*12 +1) mod 16 = 5 𝑥7 = (3*5 +1) mod 16 = 0 𝑥8 = (3*0 +1) mod 16 = 1 Therefore generated sequence = {1, 4, 13, 8, 9, 12, 5, 0, 1}
  • 9. Two Pseudo-random Number Generators, an Overview Blum-Blum-Shub (BBS) Pseudorandom Bit Generators • Blum Shub (BBS) is a pseudorandom number generator suggested in 1986 by Lenore Blum, Manuel Blum and Michael Shub (Blum et al., 1986). • BBS is said to be a cryptographically secure pseudorandom bit generator (CSPRBG). A CSPRBG is defined as one that passes the next-bit test. • A pseudorandom bit generator is said to pass the next-bit test, if given the first k bits of the sequence, there is no practical algorithm that can predict that the next bit will be a 1 or 0 with probability greater than ½ therefore the sequence is unpredictable. • Blum Blum Shub is in the form: • 𝑥 𝑛+1 = 𝑥 2 𝑚𝑜𝑑 𝑚 𝑛
  • 10. Two Pseudo-random Number Generators, an Overview BBS Algorithm • Generate two large secret random prime numbers 𝑝 and 𝑞 • Let each of the chosen primes 𝑝 and 𝑞 be harmonious 1. Compute 𝑛 = 𝑝𝑞 2. Select a random integer 𝑠 (the seed) in the interval [1, 𝑛 − 1] such that gcd 𝑠, 𝑛 = 1 3. Let 𝑥0 = 𝑠 2 𝑚𝑜𝑑 𝑛 4. For 𝑖 = 1 𝑡𝑜 ∞ 𝑑𝑜 5. Compute 𝑥 𝑖 = 𝑠 2 𝑚𝑜𝑑 𝑛 6. Compute 𝑥 𝑖 = 𝑥 𝑖 𝑚𝑜𝑑 2 7. 𝑧 𝑖 = 𝑡ℎ𝑒 𝑙𝑒𝑎𝑠𝑡 𝑠𝑖𝑔𝑛𝑖𝑓𝑖𝑐𝑎𝑛𝑡 𝑏𝑖𝑡 𝑜𝑓 𝑥 𝑖 8. Output the sequence as𝑧1 , 𝑧2 , 𝑧3 , … , 𝑧 𝑙
  • 11. Two Pseudo-random Number Generators, an Overview Thank You! Comments, Questions, and Suggestions.
  • 12. Two Pseudo-random Number Generators, an Overview Sources and Bibliography [1] Alfred J. Menezes, Paul C. Van Oorschot, Scott A. Vanstone "Handbook of Applied Cryptography" ISBN 0849385237, 9780849385230, Pages 169-190, CRC Press, 1997 [2] X. Wang, W. Yu, X. Fu, D. Xuan, and W. Zhao, “iloc: An invisible localization attack to internet threat monitoring systems,” IEEE INFOCOM 2008. The 27th Conference on Computer Communications, 2008, pp. 1930–1938. [3] William Stallings, "Cryptography and Network Security: Principles and Practice", Prentice Hall, 2010, ISBN 0136097049, 9780136097044 [4] Bob Bockholt, "linear congruential generator", in Dictionary of Algorithms and Data Structures [online], Paul E. Black, ed., U.S. National Institute of Standards and Technology. 17 December 2004. (accessed June 20th, 2010) Available from: http://www.itl.nist.gov/div897/sqg/dads/HTML/linearCongruentGen.html [5] Samuel S. Wagstaff, Jr, "Cyptanalysis of Number Theoretic Ciphers", Chapman & Hall/CRC, ISBN 1-58488-153-4, page 211 [6] M.E. Yalcin, J.A.K. Suykens, J. Vandewalle "True random bit generation from a double-scroll attractor", IEEE Transactions on Circuits and Systems, 2004 [7] Anders Andersen, Finn Jensen, Morten Kristensen "TrueRandom", 2009, http://www.daimi.au.dk/~ivan/reports2009/TrueRandom.pdf [8] Henk C. A. van Tilborg, "Encyclopedia of cryptography and security", Springer, 2005, ISBN 038723473X, 9780387234731 [9] Richard A. Mollin, "RSA and public-key cryptography", Volume 21 of Discrete mathematics and its applications, CRC Press, 2003, ISBN 1584883383, 9781584883388