Applications of two-faced processes to pseudorandom number generation | Applied Discrete Mathematics. Supplement. 2016. № 9.

Applications of two-faced processes to pseudorandom number generation

Random and pseudorandom number generators (RNG and PRNG) are used for many purposes including cryptographic applications. For such applications, a generated bit sequence should mimic true random, i.e., by definition, such a sequence could be interpreted as the result of the flips of a "fair" coin with sides that are labelled 0 and 1. It is known that the Shannon entropy of this process is 1 per letter, whereas for any other stationary process with binary alphabet the Shannon entropy is strictly less than 1. On the other hand, the entropy of the PRNG output should be much less than 1 bit (per letter), but the output sequence should look like truly random. We describe random processes, for which those, in a first glance contradictory, properties are valid. More precisely, it is shown that there exist binary-alphabet random processes whose entropy is less than 1 bit (per letter), but a frequency of occurrences of any word u goes to 2, where |u| is the length of u. In turn, it gives a possibility to construct RNG and PRNG, which possess theoretical guarantees. This is important for applications of them in cryptography.

Download file
Counter downloads: 188

Keywords

random number generator, pseudorandom number generator, Shannon entropy, случайные числа, псевдослучайные числа, энтропия Шеннона

Authors

NameOrganizationE-mail
Ryabko B. Ya.Institute of Computational Technologies SB RASboris@ryabko.net
Всего: 1

References

Rukhin A., Soto J., Nechvatal J., et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications. National Institute of Standards and Technology, 2010.
Barker E. and Kelsey D. Recommendation for Random Bit Generator (RBG) Constructions (DRAFT NIST Special Publication 800-90C). National Institute of Standards and Technology, 2012.
Рябко Б. Я., Фионов А. Н., Шокин Ю. И. Криптография и стеганография в информационных технологиях. Новосибирск: Наука, 2015.
Cover T. M. and Thomas J. A. Elements of Information Theory. N.Y., USA: Wiley-Interscience, 2006.
 Applications of two-faced processes to pseudorandom number generation | Applied Discrete Mathematics. Supplement. 2016. № 9.

Applications of two-faced processes to pseudorandom number generation | Applied Discrete Mathematics. Supplement. 2016. № 9.

Download full-text version
Counter downloads: 1385