Get Custom homework writing help and achieve A+ grades!
Custom writing help for your homework, Academic Paper and Assignments from Academic writers all over the world at Tutorsonspot round the clock.
In this article, HENKOS, a new algorithm that is cryptographic is proposed along with a new number generator that is pseudorandom on the basis of which, the algorithm is created which appears quite fast and secure. The designing of this algorithm was carried out for fulfilling goals like the absence of short cycles, and cryptographically security etc. The cryptosystem actually uses two keys a DK or data key and MK or master key. It has been described that the results included ease of implementation, an algorithm that was cryptographically secure, an algorithm that was quite fast, and a generator of the pseudorandom number which was quite fast. In the article, the technologies include HENKOS algorithm and PRNG. The merits in the articles discussed include the Diehard battery test, NIST statistical test, ENT tests, and swiftness of the algorithm. The limitation concerned the adjusting of PRNG: SHA1 for comparison.
Pseudo Random Number Generation Applied to Robust Modern Cryptography A New Technique for Block Ciphers
The article discusses the vulnerability of the encryption systems and why it is the need of time to evolve towards better and dependable systems that not only are protected in terms of hardware but international hacking attacks. The paper has proposed the method to protect hardware of the cryptosystems but the integration of embedded systems of two functions that work on two key elements of online error detection and misleading corrupt results. Next-bit statistical test is applied in the research study. The authors have in detailed explained the development of reliable cryptosystems. Not only the development and key features are discussed but the implementation process and the proposed strategy has been comprehensively explained. Advanced optimization of pseudo-random number generator algorithms can help achieve a secure cryptosystem as the inclusion of complete randomness can assure full protection against international attacks. In the article, the limitations include Round-replica and PRNG properties. The new methods of round-based block ciphers are discussed in the article making it knowledgeable and helpful in understanding the protection of cryptosystems.
New Design of Crypto-Based Pseudorandom number generator (CBPRNG) using BLOWFISH cipher
The role of Random Number Generators is discussed in the paper that how they produce the sequence of zero and one bits to be formed and combined into subsets of the random number. Random Number Generators are a core to the working algorithms and protocols in the cryptography. The paper elaborates how repetitive results are obtained from running the same random generator twice. Some of the basic statistical tests like NITS, NET, TUTU, and Di hard can be used in the research. The paper proposes a system that uses the BLOW FISH ciphers technology that along with Cipher-block chaining used three stages of the block chaining. The overall use of this method increases the efficiency of the system and the security of the system. The proposed generator uses three IDES with a combination of two keys. BLOW FISH ciphers are faster. The limitation although concerned the CBC’s excessive process timing. The final result by the CBPRNG shows no repletion of results showing the efficiency of the system and how it is the right approach in developing new and secure cryptograms.
On Pseudo-random Number, Generation Using Elliptic Curve Cryptography
The paper tells us about the algorithm of using Elliptic curve cryptography for Pseudo-random number generation algorithms. It distinguishes the proposed method and its advantages over the other methods. One advantage of ECC schemes include the basis of it on the public key mechanism. This mechanism ensures encryption and other added benefits such as key exchange algorithms. The numbers generated are totally random and require a key. The paper tells us that Elliptic curves are famous for their best performances and the algorithms they use. Though the method is not a new one but refining it with new algorithms can help achieve a different level of efficiency. NIST statistical test is also used in this paper to analyze the algorithm working. The article compares the results of existing and proposed algorithm where the final results reveal the using the proposed algorithm provides better security in comparison with the existing one. The article is concluded by informing that random numbers are securely generated by the proposed algorithm. The limitation of this study concern the whole sequence’s identification.
Pseudo-random number generator based on the mixing of three chaotic maps
The 9-page article serves to be a knowledgeable piece on a different approach of secure pseudo-random number generator. It tells us about using a mixture of three chaotic maps generated from the input initial vector. The paper uses different terms that make us understand the concept and its implementation which helps to analyze and differentiate from the existing and other proposed generators. Random evaluation sequences are appraised via NIST statistical tests. The system is based on touch points from the relevant data and generation of possibilities to design a more secure and viable system that is not vulnerable to global and international attacks. As the algorithm is based on three chaotic maps input it is more complex and the numbers generated are totally random and secure. The authors have discussed the different tiers of the system and how the system is more secure against several attacks and despite the complexity, it is easy to implement and understand. The limitations of this research revolve around the fact that the only algorithm was focused upon and other technologies were not paid attention to.
A True Random-Number Encryption Method Employing Block Cipher and PRNG
The article discusses the fact that how the older systems have been obsolete and not secure which is why it is needed to innovate and introduce new systems based on the available knowledge and understanding of the dynamics. As the world is more online and using the internet it is making the networks and users more vulnerable to the attacks by the hackers which are making the data security a growing concern. The older methods are not helping and a new method is proposed which is more random and tier based security which ensures network-wide security in cloud and hardware. The True Random Number Encryption algorithm employing Block Cipher and PRNG is proposed in this paper. NIST and ENT test can be used in the Random Number Encryption algorithm It explains the working and implementation with the analysis of the result given showing how incorporation of different layers make the networks more secure and make the proposed method favorable due to its reliability. This study has limitations and they concern the first secret parameter’s setting on microprocessors in a secure way.
Pseudo Random Number Generator and Hash Function for Embedded Microprocessors
Internet of things is the main concern in the article and it compares different technologies focusing on the algorithms needed for microprocessors. The paper focuses on the development of Pseudo Random Number generators for the microprocessors in use of internet of things as the microprocessors have limited computing powers which require better and new innovative ways to accommodate the Internet of things. The authors have proposed the use of Hash function and Pseudo Random Number Generator algorithm for embedded microprocessors. The proposed method is evaluated using different criteria to gauge the efficiency of the new systems. It is concluded that the method requires minimal ROM and RAM storages as is most viable for the Internet of Things application. The random sequence is evaluated on the NIST test suite. There is a lot of potential in the method to be used for sensor networks and RFID. It uses a simple algorithm that is able to perform complex operations without using much of computing power. The limitations of this study concern the fact that keys were not paid enough attention to that the encryption method generated.
Pseudorandom Bit Generator with Parallel Implementation
This article by Stoyanov and Kordov technology focuses on different aspects of using pseudo-random bit generator coupled with parallel implementation. It lays emphasis on the algorithm that works to address the issue of low memory availability and distributes the processes by the division of dynamic date blocks for encryption over different cores of the processors. The shrinking of the data block is inevitable due to less available memory. The generated bit streams security is proven by using DIEHARD, NIST and ENT statistical testing. The proposed method is backed with statistical data and its analysis to support the argument of the authors. Also, the data helps us analyze the performance and time difference which serves as a benchmark when comparing the other methods. The proposed method combines the single feedback with the carrying shift register and the Editing bit search rule. In the research, only advantages are discussed and The limitation of using these algorithms is that attacks beside the editing bit-search rule functional on LFSR can turn to be unrealistic in the new mutual system. The algorithm follows the integers that define the feedback taps. Regularity check is the last check of the follow up to ensure consistency in the generated random numbers.
A novel method for producing pseudo-random numbers from differential equation-based chaotic systems
The Journal article discusses the possibility of using an algorithm of the hybrid system to generate pseudo-random numbers algorithms based on two different and distinct approaches. The method is based on different parameters value by switching to produce pseudo-random numbers from chaotic systems. It ponders over the transition of different chaotic equations by using the linear feedback shift registers. The pseudo-random numbers formed are tested by using TestU01and NIST SP 800-22 test suites that are passed. The article elaborates the mechanism and different algorithms that will be used and not only this it provides in-depth analysis of the results obtained due to the implementation of the proposed system. It is concluded that the shifting method based number generators are efficient and its throughput rate is higher. The distribution of data is uniform which refers to the consistency of the data provided and results from the implementation. The limitations are that in these algorithms the chaotic maps undergo from partial keyspace, and low dimensions offer weak safety measures. The authors discuss the different possibilities of using the proposed methods in different applications such as image encryption which may require pseudo-randomness.
Fast Implementation of Block Ciphers and PRNGs for Kepler GPU architecture
The article discusses the role of GPU in modern day technology and how the overall inflow of data has increased with the Internet of things and cloud computing. The article tells the importance and needs for a more secure online environment. The papers propose the method to make the operations of GPU more secure and hack free to ensure security. The paper shares the result of the implementation of different methods and techniques on NVIDIA GT X 600 GPU with Kepler technology to serve as a benchmark to draw a conclusion for further research and implementation. The Blow-fish and IDEA pass NIST and TestU01 Statistical Test apart from stringent tests in TestU01. The three-block cipher methods used as stated in the paper are BLOWFISH, Three Fish and IDEA. The article concludes by comparing the results and establishing that block ciphers are used for fast implementation of secure encryption. The limitation of algorithms is that execution rounds are limited to eight performance rounds. However, it is also discovered by the analysis of speed and benchmarks obtained that bandwidth is an important variable in it.
High Speed and Secure Variable Probability Pseudo True Random Number Generator using FPGA
This article focuses on different aspects and applications of the random numbers generators and where and how they are used. Pseudo and True Random Number generators algorithm work on two different distinct principles based on mathematical properties. The article discusses the probability of different outputs and how they may not be equal depending on the algorithm that alters the probability and output produced. The application with respect to banks and game development is discussed. For randomness testing, it uses the NIST Statistical Test Suite. It is an informative piece discussing having a diverse and different approach when dealing with different sorts of conditions. PRNG is less secure than TRNG but the throughput speed is superior than it is discussed in the article. The paper has presented different ideas and how generators have been used on the proposed lines to display secure characteristics by permitting trustful logging. The limitations of the PRNG are that it is less protected than second. A personalized Pseudo Random Number Generator based on linear feedback shift register cascade is proposed.
Pseudo-random number generator based on the generalized Lorenz chaotic system
This paper discusses the growing phenomena of adapting the chaos in different fields of science and proposes to use the method of pseudo-random number sequences from a single generalized Lorenz system. The article proposes a new algorithm that encompasses different variables based on the Lorenz chaotic system differential equation. The new proposed system is more secure based on the analysis of comparison of different pseudo-random number generators and the benchmarks. In this paper, NIST SP800-22 tests are used. The article sheds light on the two new proposed algorithms and includes statistical analysis of the test implementation of the proposed systems. To conclude the article the two algorithms are used to generate the binary sequence where one uses the sum of three coordinates whereas the other one uses the chaotic orbit of the three coordinates based on the GLS. The limitations concern the personalized cascade of LFSR. The proposed PRNG can be used as a source to generate pseudo-random numbers being used in cryptography.
Comparison of some cryptography algorithms and generations of Pseudo-Random number by using a pattern of general evaluation
Pseudo-random algorithms are used in several areas such as designing games, modeling, stimulation, communication channels especially cryptography which is highly versatile. There has been great research on pseudo number generation whereas some focus upon chaotic maps which are used for cryptography. Despite research, not all pseudo number generators can be used as a cryptography algorithm. The CAST-256 is algorithm is introduced which has 128 as the block length as well as 128, 160, 192, 224 & 256 as the variable keys. One of the drawbacks of cryptography is its lowest speed. SALSA algorithm is one of the types of the steam algorithm, which has 256 bits as key length and ARX is the basis of its structure and is of quality with regards to security & speed.
Algorithms are important therefore its investigation, accuracy and values should be properly analyzed. NIST statistical test is employed in this paper for the Removal of an investigation stage can lead to cause errors. This paper includes investigation of block and stream ciphers which suggest that AES256, MT19937and Salsa is blocked, cryptographer. The limitation of the algorithm is the concern with limited information and LFSR’s limited iterations. A stream cryptographer and pseudo number generator have passed all tests and are able to get privacy certificate.
Pseudorandom Number Generation: Efficient deterministic as well as non-deterministic
A pseudorandom number is one of the generators (PRNG) algorithm helps to generate pseudo numbers in a pattern of deterministic and valuable way. The high performance, as well as high-quality pseudo number generated, is generated and brought under discussion. Generation of one pseudorandom byte requires one cycle of the clock on Intel core i3 processor and pass through 6TestU01 batteries of the test. These generators have the capacity to work in two functional modes. 1) Deterministic mode 2) Non- deterministic mode
The deterministic model is useful for data encryption with high speed and several another kind of applications which utilize reproducible pseudorandom sequences and deterministic mode. When the non-deterministic mode is used the generator begins to act like true random number generator. But this mode has several advantages such as high performance, lower cost, and availability. The non-determinant mode is good and which depend upon true random generators.
The pseudo number generator based on the word can be used in software, and they can be effective in a 64-bit processor. TestU01suite can be utilized as a most statistical test suite to understand random sequences. Apart from deterministic, the non-deterministic number generation MaD1 also has the capacity to work in this given mode. The limitations concern the fact that TRNGs are not adopted as they are slow and expensive as well. It can be used as a random number generator in several applications.
Evolving cryptographic pseudorandom number generations
In real-world random number, generators play a very important role. Apart from a hardware random number generators, the most important class is deterministic random number generators algorithm. These generators lack predictability of RNGs. Deterministic RNG should be used in cryptography as it fulfills all the requirements related to security, speed, and ease of implementation. DIEHARD and NIST test suites are mainly implemented in this study. The results which are obtained suggest that Cartesian Genetic Program (CGP) can be used as a suitable choice for the evolution of Pseudo Random Number Generations (PRNG). In order to understand a real-world example of such generators, the limitations of PRNGs should be known and understood so there can be a better understanding of what properties are needed. Moreover, it presents a function which is appropriate in several matters as per presented before. Emphasis is upon the development and evolution of PRNGs which are extremely fast and small and do not depend upon expensive operations of addition or multiplication. The limitations concern the fact that PRNG’s inner working is not mimicked by fitness functions.
Key requirements for the design of robust chaotic PRNG
With the growing usage of the electronic medium, there should be more innovative schemes of security so the information can be transferred in a more secure way and transmission and storage are secured. The method of encryption is required to specify for each transaction, therefore, new generator keys are required and for the purpose, chaotic keys look like perfection in such a moment of need. Ring coupling algorithm is used for the generation and robust of a generator. The chaotic keys pass all the statistical and analytical tests which are NIST, autocorrelation, cross-correlation, Lyapunov exponent and uniform distribution. For precise uniform distribution approximate density function is applied to it and if there are any errors these are identified by the software. The resultant chaotic system ensures designed robust implementation on cryptosystem. Chaotic maps suggest that if there are any weak cryptographic features, these will cause performing chaotic pseudo-random numbers generator which in turn produces excellent cryptographic properties. The major limitation of the research is that there is only 2D system are describe and other methods are not discussed in comparison with the 2D systems.
Comparative analysis of SLA-LFSR with traditional pseudo-random number generators
Production of the random number generated is an important tool for the generation of cryptographic keys but security is also necessary for it and for algorithm steps game theory, stimulation, and the statistic is very important in cryptography. Random number generator is an algorithm which is used to produce unpredictable and random keys. Different security aspects and performance are compared to LCG, LFSR, BBS, and SLA-LFSR. It is found that pseudo-random number generators are very important and require it for cryptography and if it is compromised the entire system of cryptosystem is destroyed. Security systems are supported by the design of PRNG. NIST statistical test is employed in this study of LCG, LFSR, BBS, and SLA-LFSR. The starting time should be less and frequent initialization is required for effective functioning of PRNG. Among all the generators SLA-LFSR is the optimal PRNG because of optimal memory, long period of time and usage of CPU in order to provide effective and efficient security system. The limitations concern the repeatability and unpredictability of pseudo-random generator of numbers.
(Pseudo) Random number generation on the basis of Source of Computer
Random numbers play the analytical role in cryptographic fields. This can be utilized in seed, cryptographic key, nonce etc. Random numbers are used for the initialization of generation of a pseudo number and then generate arbitrary keys. The statistical test suite such as NIST is used for the checking of generated pseudo-random numbers. The hardest part of the cryptography is its key management. On the basis of random sources of PC, RNG and PRNG algorithm are suggested. RNG generates the random key of 128-256 bit from random sources of PC. The statistical analysis is used to check the generated random keys. All of the keys are checked in cumulative, clock frequency as well as frequency test. And all of these keys gave 88% result upon checking. On the other hand, PRNG, pass all the tests with distinction and give 100% result in the test. The results suggest that random keys are reliable and useful for generation of results while PRNG algorithms are reliable and give security of transferred information. The limitations concern the generation of imbalance sequences by BBS.
Methods for Implementation of pseudo-random number generator on the basis of GOST R 34.12-2015 in hybrid CPU/ GPU/ FPGA high-performance systems
The design, management, and working of high-performance data storage and processing systems have changed noticeably. The cloud computing systems are not only hybrids but are capable of supporting hardware acceleration as well. The work of this article provides knowledge of implementation in the hybrid system of GOST R 34.12-2015 based pseudo-random number generator. PRNG solve the great variety of tasks greatly depending upon the features. The basic statistical method can be used in the case for the testing the debugging program, the NIST and DIEHARD can be the most preferred statistical test to be used. In recent time, the high-performance processing systems as well as data storage, both have changed to a greater extent. The stochastic conversion's multidimensional algorithms are used for GPGPU systems with high performance. The higher degree of parallelism allows Grasshopper algorithm to offer multithreaded systems. For any special purpose which is used in EUC, the hardware approach of implementing Grasshopper GOST R 34.12-2015 is one of the approaches of choice still being used. The limitations of this research concern reduced key spaces, nonrandom numbers, and poor choices of keys.
The generators of the new pseudorandom number from the block ciphers
Several cryptographic applications and protocols are used for security which is related to randomness. The pseudo-random number generators from ciphers possess HBC and HTR algorithms. These are secured in PRG-CIA sense with the thought of underlying block cipher is secured. HTR is considered to be a parallel structure and cascade structure is considered for HBC. HTR is highly efficient than HBC. Both HBC and HTR provoke the use of block cipher that comes with efficient performance results of ANSI X9.17 PRNG algorithms in implementing the software as well as hardware. Randomness is checked with the help of NIST test which gives out a perfect result and passes all the tests of statistics. PRNGs have a lot of applications. They are capable of using and securing cryptographic protocols, protect computations of several parties, ensure the end to end encryption and many other settings. In this study, the limitations are imposed critical necessities by cryptographic algorithms and intractability assumptions as well.
Random number generation of LFSR based stream cipher algorithms
This has several uses such as sampling, games of chances, simulation, computer science and function like cryptography, game programming and transmission of data. There are 3 basic requirements which should be fulfilled for using the random system in computer science.
1) The generated numbers should be unpredictable.
2) The generated numbers should have great statistical purposes.
3) And the numbers which are produced must not have the quality to reproduce.
The random numbers which are followed using above stated properties are categorized into two classes, Pseudo Random Numbers Generator (PRNG) and True Random Number Generators (TRNG). The kind of PRNG is utilized for the production of Stream Encryption Algorithms. Random numbers are generated with the help of stream cipher based methods then these methods are implied on FPGA hardware. For obtaining numbers test such as NIST is performed. Random numbers possess excellent statistical properties only non- linear combination generator method could not test and failed Frequency Block test. The limitations concern the passing of NIST statistical tests and FPGA based 60nm.
The comparative analysis as well as the study of some algorithms of the pseudo-random number generator
Different LCG PRNGS algorithms present different results in the NIST test. It is observed that over PRNGs, the performance of all the LCGs was poor. Somehow, LCG's Linear combination that can be defined as Wichmann-Hill PRNG, it has done well against the given NIST test. Few implementations such as WELL44497b, and WELL512a failed their serial test, on the other hand, MIXMAX PRNG performed well and passed the serial test.
All the other tests such as non-overlapping test, random excursion variant test, and random excursion tests were failed by the considered generators present in the article. The PR value of Non-overlapping template matching test was low with high chances of failure. Therefore, test results taken in this paper about none of the generators are liable to be used for applications of cryptographic. The limitations of this algorithms concern performance against tests’ battery prescribed in the NIST SP800-22rev.
The generation of Acoustic lightweight pseudo random number on the basis of cryptographically secure LFSR
An acoustic lightweight pseudo-random number generator algorithms like one is called SLA-LFSR-PRNG, it should be used which consume CPU capacity, less memory as well as adopts the strategies that are parallelization with multi-thread in order to the generation of huge random numbers by taking benefits of the gigantic parallel design of GPU and multi-core CPU. The cryptographically based generator has the ability to (LFSR) and all the entropy from given sound sources are driven out. One main thing of suggested PRNG is the protection to major attacks, which are being done on the pseudo-random number generators. A secure pseudo-random number generator (cryptographically) is immune to PRNG threats as well as utilized low capacity and memory. The generator is tested in statistical test suite of NIST SP 800-22 and then all the tests are passed and have significantly improved performance. The limitations include NIST SP 800-22 statistical test for the proposed generator's comparison on various system suite to comparison of the proposed generator on different systems.
Enhanced pseudorandom number generator based on Blum-Blum-Shub and elliptic curves
Blum-Blum-Shub (BBS) is not considered a complex PRNG and needs a squaring operation and large modulus for the generation or production of each bit making it slow computationally or heavy. The elliptic curve (EC) point towards point operations that have been extracted to the given PRNGS algorithm and hence prove that reduced latency and good randomness properties and show dependence upon the secrecy of P. The strength of BBS lies in IFP and PRNGs strength lies in DLP. Big modulus modulo requirement for BBS should be secure and slower in performance. NIST standard statistical test suite is adopted in this article. Dependence on P is high, which shows loopholes for PRNGs are present. The performance test showed that the confidence level is above 99.7% but randomness tests were all right and passed. The test results of the article show that BBS-ECPRNG is certainly a secure one, and statically produces some randomness, that is required for various practical application. In this study, the limitations of the algorithms surround the observation of performance sequences at a minimum confidence level.
The Performance of Blum-Blum-Shub Elliptic Curve Pseudorandom number generator as Wi-Fi protected access 2 with security key generator
The Wi-Fi Protected Access 2 (WPA2) is thought to be more secure security protocol for networks, which exists in routers that are wireless, although partial key vulnerability is exposed. The strength of BBS lies in IFP and PRNGs strength lies in DLP. This BBS-ECPRNG algorithm is used instead of algorithms in embedded routers. In order to prove the validity of such use validity was checked and tested by the help of NIST statistical test which proved that the generator is secured and generate randomness as required and this quality is essentially required in several cryptographic applications. The article showed that WPA2 passwords in routers were distributed in the Philippines. The research and suggestion show that BBS-ECPRNG is much more efficient and recommendable against WPA2 as it is random, secured and fast. The limitation of BBS-ECPRNG is that it’s generating unpredictable and random WPA2 composition passwords that are likely to decrease the success of password-cracking.
We have more than 1500 academic writers and we promise 0% plagiarism in your paper.
|Category||Arts & Education|
|Paper Type||Report Writing|
We have over 1500 academic writers ready and waiting to help you achieve academic success
Yours all information is private and confidential; it is not shared with any other party. So, no one will know that you have taken help for your Academic paper from us.