Skip to main content

Questions tagged [pseudo-random-generator]

In cryptography, a pseudo-random generator (PRG) is a deterministic procedure that maps a random seed to a longer pseudo-random string such that no statistical test can distinguish between the output of the generator and the uniform distribution. Pseudo-random generators have numerous applications in cryptography. For instance, pseudo-random generators provide an efficient analog of one-time pads.

1 vote
1 answer
99 views

My understanding is that we can formally prove that PRGs can generate a polynomial length pseudorandom expansion of the seed. But don't the FSRs with non linear feedback like Trivium claim to generate ...
Zoey's user avatar
  • 273
2 votes
3 answers
272 views

I have read the Keccak team document about PRNG. When you hash with Keccak SHAKE the amount of random bytes you wish to return is unlimited, i.e. I can fetch() as ...
ojacomarket's user avatar
4 votes
2 answers
128 views

The security strength of Hash based DRBG (Hash_DRBG and HMAC_DRBG) confuses me. Which property of Hash determines the security strength of DRBG? For example, which SHA2 algorithms can be used to ...
Citrus Poon's user avatar
2 votes
2 answers
180 views

What is the exact application or True Randomness in Cryptography, either symmetric or public key? It is well known that the symmetric keys of encryption algorithms are supposed to be chosen randomly ...
Viren Sule's user avatar
2 votes
0 answers
49 views

Could explain in an accessible way why the maximum period of the Multiply Lagged Fibonacci Generator (MLFG) is $ (2^k - 1) \times 2^{M-3} $? My understanding is that $ (2^k - 1) $  represents the ...
DSTBP's user avatar
  • 321
0 votes
1 answer
108 views

In the Hull-Dobell theorem for Linear Congruential Generators (LCGs), the third condition states that if 4 divides m (i.e., $ 4 \mid m $), then 4 must divide $ a-1 $ (i.e., $ 4 \mid (a-1) $). Why is ...
DSTBP's user avatar
  • 321
1 vote
1 answer
186 views

I have one hundred integers inside an array that are consecutive outputs from rand() which are modulo'd by a magic number such as 41, inside an array like so: ...
hexesandohs's user avatar
0 votes
1 answer
127 views

I'm writing an application that encrypts data with a shared key using AES in ECB mode. The level of security for this application isn't extremely high. But I do want to scramble the blocks before ...
P. Pascal's user avatar
1 vote
7 answers
2k views

While reading about PRNG theory, I'm always seeing "it is hard to determine whether the stream is really random". Do we really need a random stream? Maybe a better option is just an ...
Jakub Juszczakiewicz's user avatar
4 votes
2 answers
275 views

The state lotteries in Arizona, Oregon, and Washington State have abandoned ball machines in favor of computer generated combinations using Hardware RNG. Do these computer generated systems follow a ...
steveK's user avatar
  • 91
1 vote
1 answer
281 views

I've been interested in studying information content in the context of algorithms, especially PRNGs. Originally inspired by the entropy extracting properties of the XOR gate, I wanted to simulate ...
Doddy's user avatar
  • 195
-1 votes
3 answers
235 views

It is invariably stated that the human mind cannot produce random passwords, numbers etc. because patterns and preferences emerge. I propose that this is wrong, and that with practise it is possible. ...
Zonnkq Shad's user avatar
3 votes
2 answers
897 views

Supposing that one has reliably random data of uniform distribution to use as an input, how can an integer in the range $[0, k-1]$ be selected at random without bias and in constant-time with respect ...
Melab's user avatar
  • 4,328
0 votes
0 answers
81 views

This question is related to these: 1 2 But the answers do not state clearly on how and no example code is given which makes harder for a beginner to understand lattice attack on TLCG. I have an ...
diviserbyzero's user avatar
1 vote
0 answers
92 views

As you know, elliptic curve key generation involve picking a random scalar and multiply it by the Generator point. A strong characteristic of secure random number generation is each of the bits has ½ ...
user2284570's user avatar

15 30 50 per page
1
2 3 4 5
41