- الوحدات والمجموعات
- تصفح النسخ ب :
- تاريخ النشر
- المؤلف
- العنوان
- الموضوع
PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS
Pseudorandom Number Generators (PRNGs) are very important in cryptography and have been used in several security applications such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PTRNGs is a critical issue because it should be uniform distribution, unpredictable and independent. Several PRNGs are available but the problem is do these algorithms give better performance than Riginael Algorithms? The performance of PRNGs is determined by passing a set of statistical tests which is put by National Institute of Standards and Technology (NIST). Further, the NIST has also a recommendation for random number generation using advanced encryption standard (AES) and triple data encryption standard (TDES) algorithms with counter mode (CTR) of operation. Further, several block cipher algorithms (BCAs) and alternates are present those may produce strong PRNG than NIST recommendation. Therefore, in this research work, different BCAs such as Rigindael, MARS, Rivest Cipher (RC6), Serpent, and Twofish are explored, implemented, and analyzed. After analyzing and comparing the test results, the algorithms are arranged in the following order: RC6, AES and Twofish, MARS and Serpent on 128-bit key size, Serpent and Twofish, MARS and RC6, and AES on 192-bit key size, and Twofish, AES and Serpent, MARS and RC6 on 256-bit key size. Thus, other algorithms can be used as alternative of NIST standard which indicate better or equivalent performance. This research work may help and guide the security implementers, developers, and the researchers in producing a strong key generation that is deemed necessary for cryptographic, authentication and other security applications.
العنوان: | PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS |
عناوين أخرى: | تحليل الأداء لمولدات الأرقام المشفرة |
المؤلفون: | Al-Somani, Turki F ALHARTHI, MOHAMMED SALEH |
الموضوعات :: | أمن المعلومات |
تاريخ النشر :: | 2021 |
الناشر :: | جامعة أم القرى |
الملخص: | Pseudorandom Number Generators (PRNGs) are very important in cryptography and have been used in several security applications such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PTRNGs is a critical issue because it should be uniform distribution, unpredictable and independent. Several PRNGs are available but the problem is do these algorithms give better performance than Riginael Algorithms? The performance of PRNGs is determined by passing a set of statistical tests which is put by National Institute of Standards and Technology (NIST). Further, the NIST has also a recommendation for random number generation using advanced encryption standard (AES) and triple data encryption standard (TDES) algorithms with counter mode (CTR) of operation. Further, several block cipher algorithms (BCAs) and alternates are present those may produce strong PRNG than NIST recommendation. Therefore, in this research work, different BCAs such as Rigindael, MARS, Rivest Cipher (RC6), Serpent, and Twofish are explored, implemented, and analyzed. After analyzing and comparing the test results, the algorithms are arranged in the following order: RC6, AES and Twofish, MARS and Serpent on 128-bit key size, Serpent and Twofish, MARS and RC6, and AES on 192-bit key size, and Twofish, AES and Serpent, MARS and RC6 on 256-bit key size. Thus, other algorithms can be used as alternative of NIST standard which indicate better or equivalent performance. This research work may help and guide the security implementers, developers, and the researchers in producing a strong key generation that is deemed necessary for cryptographic, authentication and other security applications. |
الوصف :: | 117 ورقة. |
الرابط: | http://dorar.uqu.edu.sa//uquui/handle/20.500.12248/131913 |
يظهر في المجموعات : | الرسائل العلمية المحدثة |
ملف | الوصف | الحجم | التنسيق | |
---|---|---|---|---|
24801.pdf " الوصول المحدود" | الرسالة الكاملة | 2.78 MB | Adobe PDF | عرض/ فتحطلب نسخة |
absa24801.pdf " الوصول المحدود" | ملخص الرسالة بالعربي | 157.81 kB | Adobe PDF | عرض/ فتحطلب نسخة |
abse24801.pdf " الوصول المحدود" | ملخص الرسالة بالإنجليزي | 9.51 kB | Adobe PDF | عرض/ فتحطلب نسخة |
cont24801.pdf " الوصول المحدود" | فهرس الموضوعات | 354 kB | Adobe PDF | عرض/ فتحطلب نسخة |
Indu24801.pdf " الوصول المحدود" | المقدمة | 11.38 kB | Adobe PDF | عرض/ فتحطلب نسخة |
Title24801.pdf " الوصول المحدود" | غلاف | 51.53 kB | Adobe PDF | عرض/ فتحطلب نسخة |
جميع الأوعية على المكتبة الرقمية محمية بموجب حقوق النشر، ما لم يذكر خلاف ذلك
تعليقات (0)