A Novel Pseudo Random Number Generator Based on L’Ecuyer’s Scheme

Francesco Buccafurri, Gianluca Lax

2014

Abstract

In this paper, we propose a new lightweight L’Ecuyer-based pseudo random number generator (PRNG). We show that our scheme, despite the very simple functions on which it relies on, is strongly secure in the sense that our number sequences pass the state-of-the-art randomness tests and, importantly, an accurate and deep security analysis shows that it is resistant to a number of attacks.

References

  1. Alcaraz, C. and Lopez, J. (2010). A security analysis for wireless sensor mesh networks in highly critical systems. Systems, Man, and Cybernetics, Part C: Applications and Reviews, IEEE Transactions on, 40(4):419-428.
  2. Blum, L., Blum, M., and Shub, M. (1986). A simple unpredictable pseudo-random number generator. SIAM Journal on computing, 15(2):364-383.
  3. Buccafurri, F. and Lax, G. (2011). Implementing disposable credit card numbers by mobile phones. Electronic Commerce Research, 11(3):271-296.
  4. Bundesamt für Sicherheit in der Informationstechnik (2014). http://www.bsi.de/english/index.htm.
  5. Cox, G., Dike, C., and Johnston, D. (2011). Intels Digital Random Number Generator (DRNG). Technical report, Intel.
  6. Dolev, S., Gilboa, N., Kopeetsky, M., Persiano, G., and Spirakis, P. G. (2011). Information security for sensors by overwhelming random sequences and permutations. Ad Hoc Networks.
  7. Dubrova, E. and Mansouri, S. S. (2012). A bdd-based approach to constructing lfsrs for parallel crc encoding. In Multiple-Valued Logic (ISMVL), 2012 42nd IEEE International Symposium on, pages 128-133. IEEE.
  8. ECMA (1992). ECMA-182: Data Interchange on 12,7 mm 48-Track Magnetic Tape Cartridges - DLT1 Format.
  9. EPCglobal, E. (2004). Radio-frequency identity protocols class-1 generation-2 uhf rfid protocol for communications at 860 mhz-960 mhz version 1.0. 9. K. Chiew et al./On False Authenticationsfor C1G2 Passive RFID Tags, 65.
  10. Hill, J. R. (1979). A table driven approach to cyclic redundancy check calculations. SIGCOMM Comput. Commun. Rev., 9(2):40-60.
  11. Huang, Y.-J., Yuan, C.-C., Chen, M.-K., Lin, W.-C., and Teng, H.-C. (2010). Hardware implementation of rfid mutual authentication protocol. Industrial Electronics, IEEE Transactions on, 57(5):1573-1582.
  12. L'Ecuyer, P. (1994). Uniform random number generation. Annals of Operations Research, 53(1):77-120.
  13. Li, Y. and Zhang, X. (2005). Securing credit card transactions with one-time payment scheme. Electronic Commerce Research and Applications, 4:413-426. Elsevier Science Publishers B. V.
  14. Melià-Seguí, J., Garcia-Alfaro, J., and HerreraJoancomartí, J. (2013). J3gen: A prng for low-cost passive rfid. Sensors, 13(3):3816-3830.
  15. National Institute of Standards and Technology (2014). Federal Information Processing Standards Publication, Washington.
  16. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., and Barker, E. (2001). A statistical test suite for random and pseudorandom number generators for cryptographic applications. Technical report, DTIC Document.
  17. Schindler, W. (1999). Functionality classes and evaluation methodology for deterministic random number generators. Federal Office for Information Security (BSI).
  18. Tang, B.-y., ZENG, N., ZHENG, L.-x., and CHEN, H.- h. (2004). Design and implementation of webbased remote supervisory system in the embedded system. Journal-Xiamen University Natural Science, 43(5):632-635.
  19. Wang, Y. (2011). sSCADA: securing SCADA infrastructure communications. International Journal of Communication Networks and Distributed Systems, 6(1):59-78.
Download


Paper Citation


in Harvard Style

Buccafurri F. and Lax G. (2014). A Novel Pseudo Random Number Generator Based on L’Ecuyer’s Scheme . In Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014) ISBN 978-989-758-045-1, pages 321-328. DOI: 10.5220/0005050303210328


in Bibtex Style

@conference{secrypt14,
author={Francesco Buccafurri and Gianluca Lax},
title={A Novel Pseudo Random Number Generator Based on L’Ecuyer’s Scheme},
booktitle={Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)},
year={2014},
pages={321-328},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005050303210328},
isbn={978-989-758-045-1},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 11th International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2014)
TI - A Novel Pseudo Random Number Generator Based on L’Ecuyer’s Scheme
SN - 978-989-758-045-1
AU - Buccafurri F.
AU - Lax G.
PY - 2014
SP - 321
EP - 328
DO - 10.5220/0005050303210328