Design of Cryptographically Strong Generator By Transforming Linearly Generated Sequences

Random numbers have been used extensively in many simulation applications like Monte Carlo Integration or computer modeling. But recently security applications have increased the need for strong (secure) random number generation like automatic password generation, encryption algorithms, on-line gambling etc. Thus random number generation has become a challengingand an interesting task. Most classical random number generators, generate sequences that are either linear or predictable hence not suitable for cryptographic and security applications. Others generate sequences that even though they are secure they are not cryptographicallystrong and above all are slow in execution. Also recent advances in random number generation like the construction of Multiple Recursive Generator(MRG) with large orders, Fast Multiple Recursive Gener-ator (FMRG) and DX(system of multiple recursive generators proposed by Deng and Xu [2003]) generators does not generate a strong random number sequences. Though MRGs have extremely long period of length with good empirical performance, its recurrence equation can be solved given a small set of its generated sequence, this implies that MRGs and FMRGs are not strong cryptographic generators. We propose an algorithm that will transform linear sequences generated by both classical LCG, MRGs, FMRGs and DX generators and make them cryptographically strong generators by hiding the entire sequence generated by the generators, thus it will be difficult for cryptanalyst to predict or infer the generator sequence if even the partial sequence or the parameters or knowledge of the algorithm used in the transformation of the generators are known.

[1]  Jack Okorn Random Numbers , 2017, Computational Statistical Physics.

[2]  Santana de Souza,et al.  Protection , 2020, Encyclopedia of the UN Sustainable Development Goals.

[3]  Lih-Yuan Deng,et al.  A system of high-dimensional, efficient, long-cycle and portable uniform random number generators , 2003, TOMC.

[4]  Dennis K. J. Lin,et al.  Random Number Generation for the New Century , 2000 .

[5]  P. L’Ecuyer,et al.  Uniform Random Number Generators: A Review , 1997, Winter Simulation Conference Proceedings,.

[6]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[7]  Hugo Krawczyk,et al.  How to Predict Congruential Generators , 1989, J. Algorithms.

[8]  S. K. Park,et al.  Random number generators: good ones are hard to find , 1988, CACM.

[9]  Oded Goldreich,et al.  RSA and Rabin Functions: Certain Parts are as Hard as the Whole , 1988, SIAM J. Comput..

[10]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[11]  Adi Shamir,et al.  The cryptographic security of truncated linearly related variables , 1985, STOC '85.

[12]  Alan M. Frieze,et al.  Linear Congruential Generators Do Not Produce Random Sequences , 1984, FOCS.

[13]  Manuel Blum,et al.  How to generate cryptographically strong sequences of pseudo random bits , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[14]  G. Marsaglia Random numbers fall mainly in the planes. , 1968, Proceedings of the National Academy of Sciences of the United States of America.

[15]  Lih-Yuan Deng,et al.  Issues on Computer Search for Large Order Multiple Recursive Generators , 2008 .

[16]  Lih-Yuan Deng,et al.  Efficient and portable multiple recursive generators of large order , 2005, TOMC.

[17]  Lih-Yuan Deng,et al.  Generalized Mersenne Prime Number and Its Application to Random Number Generation , 2004 .

[18]  Takashi Kato,et al.  On a nonlinear congruential pseudorandom number generator , 1996, Math. Comput..

[19]  Joan Boyar,et al.  Inferring sequences produced by pseudo-random number generators , 1989, JACM.

[20]  J. Boyar Inferring a Sequence Generated by a Linear Congruence , 1982, FOCS.

[21]  M. Blum,et al.  A simple secure pseudo-random number generator , 1982 .

[22]  James A. Reeds,et al.  "Cracking" a Random Number Generator , 1977, Cryptologia.

[23]  James L. Massey,et al.  Shift-register synthesis and BCH decoding , 1969, IEEE Trans. Inf. Theory.