Performance Evaluation of a Pseudo-Random Number Generator Against Various Attacks

被引:0
|
作者
Shah, Trishla [1 ]
Sampalli, Srinivas [1 ]
Upadhyay, Darshana [1 ]
Sharma, Priyanka [1 ]
机构
[1] Dalhousie Univ, Fac Comp Sci, Halifax, NS, Canada
关键词
LFSR; CSPRNG; Key; Local; Network; Attacks; Cipher; CIPHER;
D O I
10.1007/978-3-030-02683-7_21
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Every user agrees upon a key-exchange protocol before initiating a communication over the Internet. These keys at the root level are a combination of highly unpredictable sequences of random numbers. It is crucial that the numbers generated are strong and secured. Ciphers are developed to generate these strong sets of keys. We conducted a thorough research on the existing hardware and software ciphers. Flaws were identified in the design complexity, platform dependency, application dimensions, and resource consumption. This led to the development of a generic n-bit LFSR based Cryptographically Secured Pseudo Random Number Generator (hardware-software co-simulation). As the generator forms the foundation for the security of the entire network, it has to be resistant to most attacks. The current ciphers which are used in real time applications like communication devices, online shopping and payments, group chats on social media, etc. are prone to attacks. This paper focuses on identifying those attacks and conducting the same on our cipher to evaluate its performance. To the best of our knowledge, we are the first to summarize these attacks from a wide domain of applications and prove it all experimentally in a single paper. Since a CSPRNG works at different layers of the communication cycle, attacks have been bifurcated into Cryptanalysis, LFSR, and Real-time attacks. Various test cases and results are discussed in order to ensure the effectiveness of the CSPRNG.
引用
收藏
页码:291 / 304
页数:14
相关论文
共 50 条
  • [21] Accelerating Pseudo-Random Number Generator for MCNP on GPU
    Gong, Chunye
    Liu, Jie
    Chi, Lihua
    Hu, Qingfeng
    Deng, Li
    Gong, Zhenghu
    NUMERICAL ANALYSIS AND APPLIED MATHEMATICS, VOLS I-III, 2010, 1281 : 1335 - +
  • [22] Pseudo-Random Number Generator Verification: A Case Study
    Doerre, Felix
    Klebanov, Vladimir
    VERIFIED SOFTWARE: THEORIES, TOOLS, AND EXPERIMENTS, 2016, 9593 : 61 - 72
  • [23] MULTI-CHANNEL PSEUDO-RANDOM NUMBER GENERATOR
    KIRYANOV, BF
    ENGINEERING CYBERNETICS, 1970, 8 (04): : 714 - &
  • [24] Hybrid pseudo-random number generator for cryptographic systems
    Erdinç Avaroğlu
    İsmail Koyuncu
    A. Bedri Özer
    Mustafa Türk
    Nonlinear Dynamics, 2015, 82 : 239 - 248
  • [25] A Horadam-based Pseudo-random Number Generator
    Bagdasar, Ovidiu D.
    Chen, Minsi
    2014 UKSIM-AMSS 16TH INTERNATIONAL CONFERENCE ON COMPUTER MODELLING AND SIMULATION (UKSIM), 2014, : 227 - 231
  • [26] A 48-BIT PSEUDO-RANDOM NUMBER GENERATOR
    KUEHN, HG
    COMMUNICATIONS OF THE ACM, 1961, 4 (08) : 350 - 352
  • [27] A Forkcipher-Based Pseudo-Random Number Generator
    Andreeva, Elena
    Weninger, Andreas
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY, PT II, ACNS 2023, 2023, 13906 : 3 - 31
  • [28] Hybrid pseudo-random number generator for cryptographic systems
    Avaroglu, Erdinc
    Koyuncu, Ismail
    Ozer, A. Bedri
    Turk, Mustafa
    NONLINEAR DYNAMICS, 2015, 82 (1-2) : 239 - 248
  • [29] Design and evaluation of hardware pseudo-random number generator MT19937
    Konuma, S
    Ichikawa, S
    IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2005, E88D (12): : 2876 - 2879
  • [30] Evaluation and Improvement of Pseudo-Random Number Generator for EPC Gen2
    Nomaguchi, Hiroshi
    Miyaji, Atsuko
    Su, Chunhua
    2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 721 - 728