[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to main content

Pseudo-random number generator

  • Reference work entry
Encyclopedia of Cryptography and Security

Many cryptographic primitives require random numbers, to be used as keys, challenges, unique identifiers, etc. However, generating random values on a computer is in fact a very difficult task. One possible method for such generation is to use a pseudo-random numbers generator.

A pseudo-random number generator (PRNG) is a function that, once initialized with some random value (called the seed), outputs a sequence that appears random, in the sense that an observer who does not know the value of the seed cannot distinguish the output from that of a (true) random bit generator.

It is important to note that a PRNG is a deterministic process: put back in the same state, it will reproduce the same sequence, as will two PRNGs initialized with the same seed. This property makes PRNGs suitable for use as stream ciphers.

Pseudo-random generators aimed for cryptographic applications must not be confused with those used for most other purposes (simulations, probabilistic algorithms, ...). Whereas...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Coron, J.-S. (1999). “On the security of random sources.” Proceedings of PKC'99, Lecture Notes in Computer Science, vol. 1560, eds. H. Imai and Y. Zheng. Springer-Verlag, Berlin.

    Google Scholar 

  2. Geffe, P. (1973). “How to protect data with ciphers that are really hard to break.” Electronics, 46, 99–101.

    Google Scholar 

  3. Knuth, D.E. (1997). The Art of Computer Programming (3rd. ed.). Computer Science and Information Processing, Vol. 2. Seminumerical Algorithms. Addison-Wesley, Reading, MA.

    Google Scholar 

  4. Maurer, U.M. (1992). “A universal statistical test for random bit generators.” Journal of Cryptology, 5 (2), 89–105.

    Article  MATH  MathSciNet  Google Scholar 

  5. Menezes, A.J., P.C. van Oorschot, and S.A. Vanstone, (1997). Handbook of Applied Cryptography. CRC Press, Boca Raton, FL.

    MATH  Google Scholar 

  6. US Department of Commerce—National Institute of Standards and Technology (1994). FIPS 140-1: Security requirements for Cryptographic Modules, available at http://csrc.nist.gov/publications/fips/fips1401.pdf

  7. US Department of Commerce (1999). FIPS 140-2: Security requirements for Cryptographic Modules (Draft), available at http://csrc.nist.gov/publications/fips/dfips140-2.pdf

  8. Vazirani, U.V. and V.V. Vazirani (1985). “Efficient and secure pseudo-random number generation.” Advances in Cryptology—CRYPTO'84, Lecture Notes in Computer Science, vol. 196, eds. G.R. Blakley and D. Chaum. Springer, Berlin, 193–202.

    Google Scholar 

Download references

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2005 International Federation for Information Processing

About this entry

Cite this entry

Koeune, F. (2005). Pseudo-random number generator. In: van Tilborg, H.C.A. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA . https://doi.org/10.1007/0-387-23483-7_330

Download citation

Publish with us

Policies and ethics