9731

MSTg: Cryptographically strong pseudorandom number generator and its realization

Pavol Svaba, Pascal Marquardt, Tran van Trung
Institute of Business Information Technology, Lucerne University of Applied Sciences and Arts, Zentralstrasse 9, CH-6002 Lucerne, Switzerland
Institute for Experimental Mathematics, 2013
@article{svaba2013mstg,

   title={MSTg: Cryptographically strong pseudorandom number generator and its realization},

   author={Svaba, Pavol and Marquardt, Pascal and van Trung, Tran},

   year={2013}

}

Download Download (PDF)   View View   Source Source   

929

views

Random covers for finite groups have been introduced in [5, 9], and [18], and used for constructing public key cryptosystems. The primer [10] introduces a new approach for constructing pseudorandom number generators, called MSTg, based on random covers for large finite groups. In particular, on the class of elementary abelian 2-groups they allow a very efficient realization. The crucial point that makes random covers useful for group based cryptography is the fact, that the problem of finding a factorization with respect to a randomly generated cover is presumed intractable. In other words, random covers induce functions which possess the features of one-way functions. These in addition, as shown by results of statistical tests, behave randomly. We extend the preliminary tests done in [10] and investigate the statistical properties of the output sequences generated by MSTg on proposed class of groups and with different parameters, in particular the block size. We investigate the security of the system and claim that MSTg generators are suitable for cryptographic applications. Finally, we study the possibilities of parallelization of the generator algorithm and propose a method of using MSTg in practice.
VN:F [1.9.22_1171]
Rating: 0.0/5 (0 votes cast)

Recent source codes

* * *

* * *

TwitterAPIExchange Object
(
    [oauth_access_token:TwitterAPIExchange:private] => 301967669-yDz6MrfyJFFsH1DVvrw5Xb9phx2d0DSOFuLehBGh
    [oauth_access_token_secret:TwitterAPIExchange:private] => o29ji3VLVmB6jASMqY8G7QZDCrdFmoTvCDNNUlb7s
    [consumer_key:TwitterAPIExchange:private] => TdQb63pho0ak9VevwMWpEgXAE
    [consumer_secret:TwitterAPIExchange:private] => Uq4rWz7nUnH1y6ab6uQ9xMk0KLcDrmckneEMdlq6G5E0jlQCFx
    [postfields:TwitterAPIExchange:private] => 
    [getfield:TwitterAPIExchange:private] => ?cursor=-1&screen_name=hgpu&skip_status=true&include_user_entities=false
    [oauth:protected] => Array
        (
            [oauth_consumer_key] => TdQb63pho0ak9VevwMWpEgXAE
            [oauth_nonce] => 1472084226
            [oauth_signature_method] => HMAC-SHA1
            [oauth_token] => 301967669-yDz6MrfyJFFsH1DVvrw5Xb9phx2d0DSOFuLehBGh
            [oauth_timestamp] => 1472084226
            [oauth_version] => 1.0
            [cursor] => -1
            [screen_name] => hgpu
            [skip_status] => true
            [include_user_entities] => false
            [oauth_signature] => iCMVPzLA9nSybi7x+ibH/ylLaEU=
        )

    [url] => https://api.twitter.com/1.1/users/show.json
)
Follow us on Facebook
Follow us on Twitter

HGPU group

1966 peoples are following HGPU @twitter

HGPU group © 2010-2016 hgpu.org

All rights belong to the respective authors

Contact us: