D-Library Repositry

//uquui/

Reports Community

Annual Report Collection

 2021

 PERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORS

 ALHARTHI, MOHAMMED SALEH


//uquui/handle/20.500.12248/131913
Full metadata record
DC FieldValueLanguage
dc.contributor.adviserAl-Somani, Turki F-
dc.contributor.authorALHARTHI, MOHAMMED SALEH-
dc.date.accessioned2021-11-15T06:36:15Z-
dc.date.available2021-11-15T06:36:15Z-
dc.date.issued2021en_US
dc.identifier.urihttp://dorar.uqu.edu.sa//uquui/handle/20.500.12248/131913-
dc.description117 ورقة.en_US
dc.description.abstractPseudorandom Number Generators (PRNGs) are very important in cryptography and have been used in several security applications such as authentication protocols, session keys, key distribution, and keystream for a one-time pad. Producing PTRNGs is a critical issue because it should be uniform distribution, unpredictable and independent. Several PRNGs are available but the problem is do these algorithms give better performance than Riginael Algorithms? The performance of PRNGs is determined by passing a set of statistical tests which is put by National Institute of Standards and Technology (NIST). Further, the NIST has also a recommendation for random number generation using advanced encryption standard (AES) and triple data encryption standard (TDES) algorithms with counter mode (CTR) of operation. Further, several block cipher algorithms (BCAs) and alternates are present those may produce strong PRNG than NIST recommendation. Therefore, in this research work, different BCAs such as Rigindael, MARS, Rivest Cipher (RC6), Serpent, and Twofish are explored, implemented, and analyzed. After analyzing and comparing the test results, the algorithms are arranged in the following order: RC6, AES and Twofish, MARS and Serpent on 128-bit key size, Serpent and Twofish, MARS and RC6, and AES on 192-bit key size, and Twofish, AES and Serpent, MARS and RC6 on 256-bit key size. Thus, other algorithms can be used as alternative of NIST standard which indicate better or equivalent performance. This research work may help and guide the security implementers, developers, and the researchers in producing a strong key generation that is deemed necessary for cryptographic, authentication and other security applications.  en_US
dc.language.isoعربيen_US
dc.publisherجامعة أم القرىen_US
dc.relation.isformatofمكتبة الملك عبدالله بن عبدالعزيز الجامعيةen_US
dc.subjectأمن المعلوماتen_US
dc.titlePERFORMANCE ANALYSIS OF CRYPTOGRAPHIC PSEUDORANDOM NUMBER GENERATORSen_US
dc.title.alternativeتحليل الأداء لمولدات الأرقام المشفرةen_US
dc.identifier.callnum24801-
dc.type.formatماجستيرen_US
dc.publisher.countryالمملكة العربية السعوديةen_US
dc.relation.collageالحاسب الآلي ونظم المعلوماتen_US
dc.type.statusمجازen_US
dc.rights.holdYesen_US
dc.rights.digitalYesen_US
dc.publisher.cityمكة المكرمةen_US
dc.date.issuedhijri1442en_US
dc.relation.depعلوم الحاسب الآليen_US
dc.rights.digitizedYesen_US
Appears in Collections :الرسائل العلمية المحدثة

Files in This Item :
File Description SizeFormat 
24801.pdf
"   Restricted Access"
الرسالة الكاملة2.78 MBAdobe PDFView/Open
Request a copy
absa24801.pdf
"   Restricted Access"
ملخص الرسالة بالعربي157.81 kBAdobe PDFView/Open
Request a copy
abse24801.pdf
"   Restricted Access"
ملخص الرسالة بالإنجليزي9.51 kBAdobe PDFView/Open
Request a copy
cont24801.pdf
"   Restricted Access"
فهرس الموضوعات354 kBAdobe PDFView/Open
Request a copy
Indu24801.pdf
"   Restricted Access"
المقدمة11.38 kBAdobe PDFView/Open
Request a copy
Title24801.pdf
"   Restricted Access"
غلاف51.53 kBAdobe PDFView/Open
Request a copy

Comments (0)



Items in D-Library are protected by copyright, with all rights reserved, unless otherwise indicated.