المستودع الرقمى

//uquui/

تقرير الوحدة

تقرير المجموعة

 2021

 PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS

 ALHARTHI, MOHAMMED SALEH


//uquui/handle/20.500.12248/131913
0 التحميل
408 المشاهدات

PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS

عناوين أخرى : تحليل الأداء لمولدات الأرقام المشفرة
المؤلفون : ALHARTHI, MOHAMMED SALEH
رقم الطلب : 24801
الناشر :جامعة أم القرى
مكان النشر : مكة المكرمة
تاريخ النشر : 2021 - 1442 هـ
الوصف : 117 ورقة.
نوع الوعاء : ماجستير
الموضوعات : أمن المعلومات ؛
اللغة : عربي
المصدر : مكتبة الملك عبدالله بن عبدالعزيز الجامعية
يظهر في المجموعات : الرسائل العلمية المحدثة

Pseudorandom Number Generators (PRNGs) are very important in cryptography and have been used in several security applications such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PTRNGs is a critical issue because it should be uniform distribution, unpredictable and independent. Several PRNGs are available but the problem is do these algorithms give better performance than Riginael Algorithms? The performance of PRNGs is determined by passing a set of statistical tests which is put by National Institute of Standards and Technology (NIST). Further, the NIST has also a recommendation for random number generation using advanced encryption standard (AES) and triple data encryption standard (TDES) algorithms with counter mode (CTR) of operation. Further, several block cipher algorithms (BCAs) and alternates are present those may produce strong PRNG than NIST recommendation. Therefore, in this research work, different BCAs such as Rigindael, MARS, Rivest Cipher (RC6), Serpent, and Twofish are explored, implemented, and analyzed. After analyzing and comparing the test results, the algorithms are arranged in the following order: RC6, AES and Twofish, MARS and Serpent on 128-bit key size, Serpent and Twofish, MARS and RC6, and AES on 192-bit key size, and Twofish, AES and Serpent, MARS and RC6 on 256-bit key size. Thus, other algorithms can be used as alternative of NIST standard which indicate better or equivalent performance. This research work may help and guide the security implementers, developers, and the researchers in producing a strong key generation that is deemed necessary for cryptographic, authentication and other security applications.  

العنوان: PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS
عناوين أخرى: تحليل الأداء لمولدات الأرقام المشفرة
المؤلفون: Al-Somani, Turki F
ALHARTHI, MOHAMMED SALEH
الموضوعات :: أمن المعلومات
تاريخ النشر :: 2021
الناشر :: جامعة أم القرى
الملخص: Pseudorandom Number Generators (PRNGs) are very important in cryptography and have been used in several security applications such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PTRNGs is a critical issue because it should be uniform distribution, unpredictable and independent. Several PRNGs are available but the problem is do these algorithms give better performance than Riginael Algorithms? The performance of PRNGs is determined by passing a set of statistical tests which is put by National Institute of Standards and Technology (NIST). Further, the NIST has also a recommendation for random number generation using advanced encryption standard (AES) and triple data encryption standard (TDES) algorithms with counter mode (CTR) of operation. Further, several block cipher algorithms (BCAs) and alternates are present those may produce strong PRNG than NIST recommendation. Therefore, in this research work, different BCAs such as Rigindael, MARS, Rivest Cipher (RC6), Serpent, and Twofish are explored, implemented, and analyzed. After analyzing and comparing the test results, the algorithms are arranged in the following order: RC6, AES and Twofish, MARS and Serpent on 128-bit key size, Serpent and Twofish, MARS and RC6, and AES on 192-bit key size, and Twofish, AES and Serpent, MARS and RC6 on 256-bit key size. Thus, other algorithms can be used as alternative of NIST standard which indicate better or equivalent performance. This research work may help and guide the security implementers, developers, and the researchers in producing a strong key generation that is deemed necessary for cryptographic, authentication and other security applications.  
الوصف :: 117 ورقة.
الرابط: http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/131913
يظهر في المجموعات :الرسائل العلمية المحدثة

الملفات في هذا العنصر:
ملف الوصف الحجمالتنسيق 
24801.pdf
"   الوصول المحدود"
الرسالة الكاملة2.78 MBAdobe PDFعرض/ فتح
طلب نسخة
absa24801.pdf
"   الوصول المحدود"
ملخص الرسالة بالعربي157.81 kBAdobe PDFعرض/ فتح
طلب نسخة
abse24801.pdf
"   الوصول المحدود"
ملخص الرسالة بالإنجليزي9.51 kBAdobe PDFعرض/ فتح
طلب نسخة
cont24801.pdf
"   الوصول المحدود"
فهرس الموضوعات354 kBAdobe PDFعرض/ فتح
طلب نسخة
Indu24801.pdf
"   الوصول المحدود"
المقدمة11.38 kBAdobe PDFعرض/ فتح
طلب نسخة
Title24801.pdf
"   الوصول المحدود"
غلاف51.53 kBAdobe PDFعرض/ فتح
طلب نسخة
اضف إلى مراجعى الاستشهاد المرجعي طلب رقمنة مادة

تعليقات (0)



جميع الأوعية على المكتبة الرقمية محمية بموجب حقوق النشر، ما لم يذكر خلاف ذلك