D-Library Repositry

//uquui/

Reports Community

Annual Report Collection

 2021

 PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS

 ALHARTHI, MOHAMMED SALEH


//uquui/handle/20.500.12248/131913
0 Downloads
380 Visits

PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS

Alternative : تحليل الأداء لمولدات الأرقام المشفرة
Call Number : 24801
Publisher :جامعة أم القرى
Pub Place : مكة المكرمة
Issue Date : 2021 - 1442 H
Description : 117 ورقة.
Format : ماجستير
Language : عربي
Is format of : مكتبة الملك عبدالله بن عبدالعزيز الجامعية

Pseudorandom Number Generators (PRNGs) are very important in cryptography and have been used in several security applications such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PTRNGs is a critical issue because it should be uniform distribution, unpredictable and independent. Several PRNGs are available but the problem is do these algorithms give better performance than Riginael Algorithms? The performance of PRNGs is determined by passing a set of statistical tests which is put by National Institute of Standards and Technology (NIST). Further, the NIST has also a recommendation for random number generation using advanced encryption standard (AES) and triple data encryption standard (TDES) algorithms with counter mode (CTR) of operation. Further, several block cipher algorithms (BCAs) and alternates are present those may produce strong PRNG than NIST recommendation. Therefore, in this research work, different BCAs such as Rigindael, MARS, Rivest Cipher (RC6), Serpent, and Twofish are explored, implemented, and analyzed. After analyzing and comparing the test results, the algorithms are arranged in the following order: RC6, AES and Twofish, MARS and Serpent on 128-bit key size, Serpent and Twofish, MARS and RC6, and AES on 192-bit key size, and Twofish, AES and Serpent, MARS and RC6 on 256-bit key size. Thus, other algorithms can be used as alternative of NIST standard which indicate better or equivalent performance. This research work may help and guide the security implementers, developers, and the researchers in producing a strong key generation that is deemed necessary for cryptographic, authentication and other security applications.  

Title: PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS
Other Titles: تحليل الأداء لمولدات الأرقام المشفرة
Authors: Al-Somani, Turki F
ALHARTHI, MOHAMMED SALEH
Subjects :: أمن المعلومات
Issue Date :: 2021
Publisher :: جامعة أم القرى
Abstract: Pseudorandom Number Generators (PRNGs) are very important in cryptography and have been used in several security applications such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PTRNGs is a critical issue because it should be uniform distribution, unpredictable and independent. Several PRNGs are available but the problem is do these algorithms give better performance than Riginael Algorithms? The performance of PRNGs is determined by passing a set of statistical tests which is put by National Institute of Standards and Technology (NIST). Further, the NIST has also a recommendation for random number generation using advanced encryption standard (AES) and triple data encryption standard (TDES) algorithms with counter mode (CTR) of operation. Further, several block cipher algorithms (BCAs) and alternates are present those may produce strong PRNG than NIST recommendation. Therefore, in this research work, different BCAs such as Rigindael, MARS, Rivest Cipher (RC6), Serpent, and Twofish are explored, implemented, and analyzed. After analyzing and comparing the test results, the algorithms are arranged in the following order: RC6, AES and Twofish, MARS and Serpent on 128-bit key size, Serpent and Twofish, MARS and RC6, and AES on 192-bit key size, and Twofish, AES and Serpent, MARS and RC6 on 256-bit key size. Thus, other algorithms can be used as alternative of NIST standard which indicate better or equivalent performance. This research work may help and guide the security implementers, developers, and the researchers in producing a strong key generation that is deemed necessary for cryptographic, authentication and other security applications.  
Description :: 117 ورقة.
URI: http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/131913
Appears in Collections :الرسائل العلمية المحدثة

Files in This Item :
File Description SizeFormat 
24801.pdf
"   Restricted Access"
الرسالة الكاملة2.78 MBAdobe PDFView/Open
Request a copy
absa24801.pdf
"   Restricted Access"
ملخص الرسالة بالعربي157.81 kBAdobe PDFView/Open
Request a copy
abse24801.pdf
"   Restricted Access"
ملخص الرسالة بالإنجليزي9.51 kBAdobe PDFView/Open
Request a copy
cont24801.pdf
"   Restricted Access"
فهرس الموضوعات354 kBAdobe PDFView/Open
Request a copy
Indu24801.pdf
"   Restricted Access"
المقدمة11.38 kBAdobe PDFView/Open
Request a copy
Title24801.pdf
"   Restricted Access"
غلاف51.53 kBAdobe PDFView/Open
Request a copy
Add to Auditors PDF citation Digitization Request

Comments (0)



Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.