Deterministic Computation of Pseudorandomness in Sequences of Cryptographic Application

被引:0
作者
Fuster-Sabater, A. [1 ]
Caballero-Gil, P. [2 ]
Delgado-Mohatar, O. [1 ]
机构
[1] CSIC, Inst Appl Phys, Serrano 144, Madrid 28006, Spain
[2] Univ La Laguna, Fac Math, DEIOC, E-38271 Tenerife, Spain
来源
COMPUTATIONAL SCIENCE - ICCS 2009, PART I | 2009年 / 5544卷
关键词
Pseudorandomness; bit-string; balancedness; run dirtribution; cryptography; LARGE LINEAR SPAN; GENERATORS;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An easy method of checking balancedness degree as well as run quantification in sequences obtained from LFSR-based keystream generators has been developed. The procedure is a deterministic alternative to the traditional application of statistical tests. The computation method allows one to check deviation of balancedness and run distribution goodness from standard values. The method here developed can be considered as a first selective criterium for acceptance/rejection of this type of generators of cryptographic application.
引用
收藏
页码:621 / +
页数:2
相关论文
共 50 条
  • [31] Cryptographic Computation Using EIGamal Algorithm in 32-bit Computing System
    Rosly, Nurul Atiqah
    Aziz, Mohd Zafran Abdul
    Hashim, Habibah
    Adnan, Syed Farid Syed
    Isa, Mohd Anuar Mat
    PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON CONTROL, AUTOMATION AND SYSTEMS ENGINEERING (CASE-13), 2013, 45 : 63 - 67
  • [32] A CRYPTOGRAPHIC ALGORITHM BASED ON AES CIPHER ANDNON-DETERMINISTIC ALGORITHM APPROACH FOR KEY GENERATION
    Ofosu, Amoah Emmanuel
    Kester, Quist-Aphetsi
    Anyanewah, Attah Josephine Akosua
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, COMPUTATIONAL MODELLING AND APPLICATIONS (ICCMA), 2019, : 105 - 109
  • [33] Efficient DNA Cryptographic Framework for Secured Data Encryption Based on Chaotic Sequences
    Akiwate, Bahubali
    Parthiban, Latha
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY AND PRIVACY, 2022, 16 (01)
  • [34] Cryptographic pseudo-random sequences from the chaotic Hénon map
    Madhekar Suneel
    Sadhana, 2009, 34 : 689 - 701
  • [35] Design of Hopfield network for cryptographic application by spintronic memristors
    A. Ruhan Bevi
    P. Monurajan
    J. Manjula
    Neural Computing and Applications, 2020, 32 : 9443 - 9452
  • [36] Towards Efficient Application of Cryptographic Schemes on Constrained Microcontrollers
    Malina, Lukas
    Hajny, Jan
    Mlynek, Petr
    Machacek, Jiri
    Svoboda, Radomir
    JOURNAL OF CIRCUITS SYSTEMS AND COMPUTERS, 2016, 25 (10)
  • [37] Design of Hopfield network for cryptographic application by spintronic memristors
    Bevi, A. Ruhan
    Monurajan, P.
    Manjula, J.
    NEURAL COMPUTING & APPLICATIONS, 2020, 32 (13) : 9443 - 9452
  • [38] Radio Frequency Public Key Generator for Digital Cryptographic Application
    Kang, Jusung
    Kim, Young-Sik
    Lee, Heung-No
    IEEE ACCESS, 2023, 11 : 140867 - 140880
  • [39] Long term accelerated ageing of an ASIC dedicated to cryptographic application
    Coutet, Julien
    Doche, Emmanuel
    Guetard, Romain
    Janvresse, Aurelien
    Lavagne, Suzel
    Lebosse, Pierre
    Pastre, Antonin
    Sarlotte, Michel
    Moreau, Christian
    Marc, Francois
    Bayle, Franck
    MICROELECTRONICS RELIABILITY, 2019, 100
  • [40] Application of chaotic maps in designing cryptographic pseudo random number generators
    Vajargah, B. Fathi
    Asghari, R.
    JOURNAL OF OPTOELECTRONICS AND ADVANCED MATERIALS, 2017, 19 (1-2): : 109 - 116