Pseudorandom Bit Generation with Asymmetric Numeral Systems

The generation of pseudorandom binary sequences is of a great importance in numerous applications stretching from simulation and gambling to cryptography. Pseudorandom bit generators (PRBGs) can be split into two classes depending on their claimed security. The first includes PRBGs that are provably secure (such as the Blum-Blum-Shub one). Security of the second class rests on heuristic arguments. Sadly, PRBG from the first class are inherently inefficient and some PRBG are insecure against quantum attacks. While, their siblings from the second class are very efficient, but security relies on their resistance against known cryptographic attacks. This work presents a construction of PRBG from the asymmetric numeral system (ANS) compression algorithm. We define a family of PRBGs for 2 ANS states and prove that it is indistinguishable from a truly random one for a big enough R. To make our construction efficient, we investigate PRBG built for smaller R = 7, 8, 9 and show how to remove local correlations from output stream. We permute output bits using rotation and Keccak transformations and show that permuted bits pass all NIST tests. Our PRBG design is provably secure (for a large enough R) and heuristically secure (for a smaller R). Besides, we claim that our PRBG is secure against quantum adversaries.

[1]  J. Pieprzyk,et al.  Compcrypt–Lightweight ANS-Based Compression and Encryption , 2021, IEEE Transactions on Information Forensics and Security.

[2]  Joachim von zur Gathen,et al.  Comparative Analysis of Random Generators , 2020 .

[3]  Bijesh Shrestha Multiprime Blum Blum Shub Pseudorandom Number Generator , 2016 .

[4]  Jarek Duda,et al.  Asymmetric numeral systems , 2009, ArXiv.

[5]  Benny Pinkas,et al.  Cryptanalysis of the windows random number generator , 2007, CCS '07.

[6]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[7]  Markus Rohe,et al.  Obtaining True-Random Binary Numbers from a Weak Radioactive Source , 2005, ICCSA.

[8]  今井 浩 20世紀の名著名論:Peter Shor : Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 2004 .

[9]  Willi Meier,et al.  Fast Algebraic Attacks on Stream Ciphers with Linear Feedback , 2003, CRYPTO.

[10]  Olle Häggström Finite Markov Chains and Algorithmic Applications , 2002 .

[11]  Elaine B. Barker,et al.  A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .

[12]  Peter W. Shor,et al.  Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer , 1995, SIAM Rev..

[13]  John J. Cannon,et al.  The Magma Algebra System I: The User Language , 1997, J. Symb. Comput..

[14]  Lov K. Grover A fast quantum mechanical algorithm for database search , 1996, STOC '96.

[15]  Ian Goldberg,et al.  Randomness and the Netscape browser , 1996 .

[16]  Oded Goldreich,et al.  RSA and Rabin Functions: Certain Parts are as Hard as the Whole , 1988, SIAM J. Comput..

[17]  Manuel Blum,et al.  A Simple Unpredictable Pseudo-Random Number Generator , 1986, SIAM J. Comput..

[18]  Andrew Chi-Chih Yao,et al.  Theory and application of trapdoor functions , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).

[19]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.