Random numbers generators are used in many applications e.g. statistical sampling, cryptography, computer
simulation. In this paper our focus will be on random number generators used in cryptography. This paper presents and
discusses the analysis methods applied in symmetric cryptography, especially on stream ciphers. In modern digital
cryptography Random numbers play a very crucial role. Due to unpredictable, unknown, un-guessable and irreproducible
properties of Random numbers, they play a significant role in cryptography in securing the secret information. Many
cryptographic systems are compromised due to the lack of thorough analysis of Random number generator and of the
quality of sequences produced.
Published In:IJCSN Journal Volume 7, Issue 2
Date of Publication : April 2018
Pages : 79-82
Figures :--
Tables : --
Nusrat Mohi Ud Din : M.Tech IT, Central University Of Kashmir
Srinagar, India.
Although there are various stream ciphers used in
cryptography, because of their speed. But unlike block
ciphers there is no standard for stream ciphers. The
security of the cryptographic system depends on the
keystream generator. The flaws in keystream generator
can led to the compromise of the whole cryptographic
system. Cryptography requires the high quality and
high performance random number generator. Various
statistical are available that can be applied on the
pseudorandom number generators to increase the
confidence in the generator before being used for any
cryptographic application. In future Statistical Test
suites can be performed on NLFSR based stream
ciphers to ensure the security of these Stream Ciphers
and to measure the quality of random sequences
produced.
[1] M. U. Bokhari, Faheem Massodi, “Comparative
Analysis of Structures and Attacks on various Stream
Ciphers”, proceedings of the 4th National conference,
Computing for National Development, 2010.
[2] Rafal Stepien, Janusz Walczak, “Statistical Analysis of the
LFSR generators in the NIST STS Test Suite”,
Computer Applications in Electrical Engineering,
2011.
[3] Robertas Smaliukas, “Block Cipher And Non-Linear
Shift Register Based Random Number Generator
Quality Analysis”, Technical Report”, October 2015.
[4] Julio Hernandez-Castro, David F. Barrer
“Evolutionary Generation and degeneration of
Randomness to assess the Independence of the ENT
Test Battery”, Evolutionary Computation, IEEE,
2017.
[5] Faheem Massodi,Shadab Alam ,M U Bokhari ,"An
analysis of Linear Feedback Shift registers in Stream
ciphers", International Journal of Computer
Applications,Vol.46, May 2012.
[6] Kinga Marton, Alin SUCI , Christian SACAREA ,
Octavian CRET, “Generation And Testing Of Random
Numbers For Cryptographic Applications”,
Proceedings Of The Romanian Academy, Series
A,vol.13,pp. 368–377, 2012.
[7] E. Dawson, A. Clark, G. Gustafson, and L. May,
CRYPT-X’98 User Manual, 1999.
[8] Rashidah Kadir, Mohd Aizaini Maarof, “A
Comparative Statistical Analysis of Pseudorandom Bit
Sequences”, Fifth International Conference on
Information Assurance and Security, 2009.
[9] Chen, Kevin, et al. "Dragon: A Fast Word Based
Stream Cipher", International conference on
Information Security and Cryptology, Springer,
Berlin, 2004.
[10] A. RUKHIN, et al., “A Statistical Test Suite for
Random and Pseudorandom Number Generators for
Cryptographic Applications”, NIST Special
Publication 800–22, National Institute of Standards
and Technology, revised May 2001.
[11] Hell, Martin, Thomas Johansson, and Willi Meier,
"Grain: a Stream Cipher for Constrained
Environments”, International Journal of Wireless and
Mobile Computing, 2007.
[12] Zawawi, Seman, Mohd Zaizi,” Randomness Analysis
of Grain-128”, AIP Conference Proceedings, 2013.