• DocumentCode
    480563
  • Title

    Generating High Quality Pseudo Random Number Using Evolutionary methods

  • Author

    Poorghanad, Alireza ; Sadr, Ali ; Kashanipour, Alireza

  • Author_Institution
    Dept of Electr. Eng., Iran Univ. of Sci. & Technol., Tehran, Iran
  • Volume
    1
  • fYear
    2008
  • fDate
    13-17 Dec. 2008
  • Firstpage
    331
  • Lastpage
    335
  • Abstract
    Random number generators represent basic cryptographic primitives. They are widely used in modern security schemes including security protocols, computer security and password sources. In some algorithms (e.g. DSA) or protocols (e.g. zero-knowledge), random numbers are intrinsic to the computation [3]. In all these applications, strength of security depends greatly on the quality of randomness of the source. Pseudo random number generators (PRNGs) play an important role in cryptographic applications, as the security of these systems depends on the assumption that future values in the random sequence can be unpredictable. A linear feedback shift register (LFSR), in effect, implements a binary polynomial generator. These generators find common use for PRNGs. However, the random sequence generated by LFSR can not guarantee the unpredictability in secure system. We have used genetic algorithm to improve LFSR and proposed a novel random number generator with complex architecture and longer period.
  • Keywords
    cryptography; genetic algorithms; random number generation; shift registers; computer security; cryptographic applications; evolutionary methods; genetic algorithm; linear feedback shift register; password sources; pseudo random number generators; security protocols; Application software; Authentication; Computer security; Cryptographic protocols; Cryptography; Genetic algorithms; Linear feedback shift registers; Random number generation; Random sequences; Testing; Genetic Algorithms; Linear Feedback Shift Register; Random Sequence; Suit Tests;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Computational Intelligence and Security, 2008. CIS '08. International Conference on
  • Conference_Location
    Suzhou
  • Print_ISBN
    978-0-7695-3508-1
  • Type

    conf

  • DOI
    10.1109/CIS.2008.220
  • Filename
    4724668