SlideShare a Scribd company logo
Information and Network Security:30
Random Numbers
Prof Neeraj Bhargava
Vaibhav Khanna
Department of Computer Science
School of Engineering and Systems Sciences
Maharshi Dayanand Saraswati University Ajmer
Random Numbers
‱ many uses of random numbers in cryptography
‱ nonces in authentication protocols to prevent replay
‱ session keys
‱ public key generation
‱ keystream for a one-time pad
‱ in all cases its critical that these values be
‱ statistically random, uniform distribution, independent
‱ unpredictability of future values from previous values
‱ true random numbers provide this
‱ care needed with generated random numbers
‱ Random numbers play an important role in the use of encryption for
various network security applications.
‱ In this presentation, we provide a brief overview of the use of random
numbers in cryptography and network security and then focus on the
principles of pseudorandom number generation.
‱ Getting good random numbers is important, but difficult.
‱ You don't want someone guessing the key you're using to protect your
communications because your "random numbers" weren't (as happened in
an early release of Netscape SSL).
‱ Traditionally, the concern in the generation of a sequence of allegedly
random numbers has been that the sequence of numbers be random in
some well-defined statistical sense (with uniform distribution &
independent).
‱ In applications such as reciprocal authentication, session key generation,
and stream ciphers, the requirement is not just that the sequence of
numbers be statistically random but that the successive members of the
sequence are unpredictable
‱ (so that it is not possible to predict future values having observed previous
values).
‱ With "true" random sequences, each number is statistically independent of
other numbers in the sequence and therefore unpredictable.
‱ However, as is discussed shortly, true random numbers are seldom used;
rather, sequences of numbers that appear to be random are generated by
some algorithm.
Pseudorandom Number Generators (PRNGs)
‱ often use deterministic algorithmic techniques to create “random
numbers”
‱ although are not truly random
‱ can pass many tests of “randomness”
‱ known as “pseudorandom numbers”
‱ created by “Pseudorandom Number Generators (PRNGs)”
‱ Cryptographic applications typically make use of deterministic
algorithmic techniques for random number generation, producing
sequences of numbers that are not statistically random, but if the
algorithm is good, the resulting sequences will pass many reasonable
tests of randomness.
‱ Such numbers are referred to as pseudorandom numbers, created by
“Pseudorandom Number Generators (PRNGs)”.
Random & Pseudorandom Number
Generators
‱ Stallings Figure above contrasts a true random number generator (TRNG)
with two forms of pseudorandom number generators.
‱ A TRNG takes as input a source that is effectively random; the source is
often referred to as an entropy source.
‱ In contrast, a PRNG takes as input a fixed value, called the seed, and
produces a sequence of output bits using a deterministic algorithm.
‱ Typically, as shown, there is some feedback path by which some of the
results of the algorithm are fed back as input as additional output bits are
produced.
‱ The important thing to note is that the output bit stream is determined
solely by the input value or values, so that an adversary who knows the
algorithm and the seed can reproduce the entire bit stream.
‱ Figure above shows two different forms of PRNGs, based on
application;
‱ ‱ Pseudorandom number generator: An algorithm that is used to
produce an open-ended sequence of bits is referred to as a PRNG.
‱ A common application for an open-ended sequence of bits is as
input to a symmetric stream cipher
‱ ‱ Pseudorandom function (PRF): A PRF is used to produced a
pseudorandom string of bits of some fixed length.
‱ Examples are the symmetric encryption keys and nonces.
‱ Typically, the PRF takes as input a seed plus some context specific
values, such as a user ID or an application ID.
PRNG Requirements
‱ randomness
‱ uniformity, scalability, consistency
‱ unpredictability
‱ forward & backward unpredictability
‱ use same tests to check
‱ characteristics of the seed
‱ secure
‱ if known adversary can determine output
‱ so must be random or pseudorandom number
PRNG Requirements
‱ When a PRNG or PRF is used for a cryptographic application, then the basic
requirement is that an adversary who does not know the seed is unable to
determine the pseudorandom string.
‱ This general requirement for secrecy of the output of a PRNG or PRF leads
to specific requirements in the areas of randomness, unpredictability, and
the characteristics of the seed.
‱ In terms of randomness, the requirement for a PRNG is that the generated
bit stream appear random even though it is deterministic.
‱ NIST SP 800-22 (A Statistical Test Suite for Random and Pseudorandom
Number Generators for Cryptographic Applications) specifies that the tests
should seek to establish the following three characteristics: uniformity,
scalability, consistency. SP 800-22 lists 15 separate tests of randomness.
‱
PRNG Requirements
‱ A stream of pseudorandom numbers should exhibit two forms of
unpredictability: forward unpredictability, backward unpredictability. The
same set of tests for randomness also provide a test of unpredictability. If
the generated bit stream appears random, then it is not possible to predict
some bit or bit sequence from knowledge of any previous bits. Similarly, if
the bit sequence appears random, then there is no feasible way to deduce
the seed based on the bit sequence. That is, a random sequence will have
no correlation with a fixed value (the seed).
‱ For cryptographic applications, the seed that serves as input to the PRNG
must be secure. Because the PRNG is a deterministic algorithm, if the
adversary can deduce the seed, then the output can also be determined.
Therefore, the seed must be unpredictable. In fact, the seed itself must be
a random or pseudorandom number.
Assignment
‱ Explain the working of Pseudorandom Number Generators.

More Related Content

PDF
J45015460
PDF
Random number generators
PDF
Intel Random Number Generator
PPTX
Information and data security pseudorandom number generation and stream cipher
PDF
STEGANOGRAPHY BASED ASYMMETRIC KEY CRYPTOSYSTEM USING TRELLIS CODED GENETIC A...
PDF
Comparative analysis of efficiency of fibonacci random number generator algor...
PDF
International Journal on Cryptography and Information Security (IJCIS)
PDF
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation
J45015460
Random number generators
Intel Random Number Generator
Information and data security pseudorandom number generation and stream cipher
STEGANOGRAPHY BASED ASYMMETRIC KEY CRYPTOSYSTEM USING TRELLIS CODED GENETIC A...
Comparative analysis of efficiency of fibonacci random number generator algor...
International Journal on Cryptography and Information Security (IJCIS)
Biting into the Jawbreaker: Pushing the Boundaries of Threat Hunting Automation

Similar to Information and network security 30 random numbers (20)

PPT
OWASP Much ado about randomness
PDF
Hd3512461252
PDF
Random Number Generator Using Seven Segment Display In Labview
PPTX
Solving 800-90 Entropy Requirements in Software
PPTX
2. Modelling and Simulation in computer 2.pptx
PPTX
CREDIT CARD FRAUD DETECTION
PDF
Navy security contest-bigdataforsecurity
PPTX
NS Classical Encryption Techniqnbbghghgues.pptx
PDF
40120140502003
PDF
Workshop on Bayesian Workflows with CmdStanPy by Mitzi Morris
PDF
Sullivan randomness-infiltrate 2014
PPTX
malware detection ppt for vtu project and other final year project
PDF
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
An Introduction to Anomaly Detection
PPTX
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
PDF
DEF CON 27 - CHRISTOPHER ROBERTS - firmware slap
PPTX
An Toan Thong Tin.pptx
PPTX
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
PPTX
Static Analysis Primer
OWASP Much ado about randomness
Hd3512461252
Random Number Generator Using Seven Segment Display In Labview
Solving 800-90 Entropy Requirements in Software
2. Modelling and Simulation in computer 2.pptx
CREDIT CARD FRAUD DETECTION
Navy security contest-bigdataforsecurity
NS Classical Encryption Techniqnbbghghgues.pptx
40120140502003
Workshop on Bayesian Workflows with CmdStanPy by Mitzi Morris
Sullivan randomness-infiltrate 2014
malware detection ppt for vtu project and other final year project
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
An Introduction to Anomaly Detection
Quantum cryptography by Girisha Shankar, Sr. Manager, Cisco
DEF CON 27 - CHRISTOPHER ROBERTS - firmware slap
An Toan Thong Tin.pptx
Anomaly Detection - Real World Scenarios, Approaches and Live Implementation
Static Analysis Primer
Ad

More from Vaibhav Khanna (20)

PPTX
Information and network security 47 authentication applications
PPTX
Information and network security 46 digital signature algorithm
PPTX
Information and network security 45 digital signature standard
PPTX
Information and network security 44 direct digital signatures
PPTX
Information and network security 43 digital signatures
PPTX
Information and network security 42 security of message authentication code
PPTX
Information and network security 41 message authentication code
PPTX
Information and network security 40 sha3 secure hash algorithm
PPTX
Information and network security 39 secure hash algorithm
PPTX
Information and network security 38 birthday attacks and security of hash fun...
PPTX
Information and network security 37 hash functions and message authentication
PPTX
Information and network security 35 the chinese remainder theorem
PPTX
Information and network security 34 primality
PPTX
Information and network security 33 rsa algorithm
PPTX
Information and network security 32 principles of public key cryptosystems
PPTX
Information and network security 31 public key cryptography
PPTX
Information and network security 29 international data encryption algorithm
PPTX
Information and network security 28 blowfish
PPTX
Information and network security 27 triple des
PPTX
Information and network security 26 aes decryption and implementational issues
Information and network security 47 authentication applications
Information and network security 46 digital signature algorithm
Information and network security 45 digital signature standard
Information and network security 44 direct digital signatures
Information and network security 43 digital signatures
Information and network security 42 security of message authentication code
Information and network security 41 message authentication code
Information and network security 40 sha3 secure hash algorithm
Information and network security 39 secure hash algorithm
Information and network security 38 birthday attacks and security of hash fun...
Information and network security 37 hash functions and message authentication
Information and network security 35 the chinese remainder theorem
Information and network security 34 primality
Information and network security 33 rsa algorithm
Information and network security 32 principles of public key cryptosystems
Information and network security 31 public key cryptography
Information and network security 29 international data encryption algorithm
Information and network security 28 blowfish
Information and network security 27 triple des
Information and network security 26 aes decryption and implementational issues
Ad

Recently uploaded (20)

PPTX
ai tools demonstartion for schools and inter college
PPTX
ManageIQ - Sprint 268 Review - Slide Deck
PDF
How to Migrate SBCGlobal Email to Yahoo Easily
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PDF
System and Network Administration Chapter 2
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Digital Strategies for Manufacturing Companies
PPTX
history of c programming in notes for students .pptx
PPTX
Introduction to Artificial Intelligence
PDF
AI in Product Development-omnex systems
PPTX
Online Work Permit System for Fast Permit Processing
PDF
2025 Textile ERP Trends: SAP, Odoo & Oracle
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PPTX
VVF-Customer-Presentation2025-Ver1.9.pptx
PPT
Introduction Database Management System for Course Database
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PDF
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
PDF
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
PDF
Wondershare Filmora 15 Crack With Activation Key [2025
PDF
Odoo Companies in India – Driving Business Transformation.pdf
ai tools demonstartion for schools and inter college
ManageIQ - Sprint 268 Review - Slide Deck
How to Migrate SBCGlobal Email to Yahoo Easily
Adobe Illustrator 28.6 Crack My Vision of Vector Design
System and Network Administration Chapter 2
Softaken Excel to vCard Converter Software.pdf
Digital Strategies for Manufacturing Companies
history of c programming in notes for students .pptx
Introduction to Artificial Intelligence
AI in Product Development-omnex systems
Online Work Permit System for Fast Permit Processing
2025 Textile ERP Trends: SAP, Odoo & Oracle
Upgrade and Innovation Strategies for SAP ERP Customers
VVF-Customer-Presentation2025-Ver1.9.pptx
Introduction Database Management System for Course Database
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Raksha Bandhan Grocery Pricing Trends in India 2025.pdf
Audit Checklist Design Aligning with ISO, IATF, and Industry Standards — Omne...
Wondershare Filmora 15 Crack With Activation Key [2025
Odoo Companies in India – Driving Business Transformation.pdf

Information and network security 30 random numbers

  • 1. Information and Network Security:30 Random Numbers Prof Neeraj Bhargava Vaibhav Khanna Department of Computer Science School of Engineering and Systems Sciences Maharshi Dayanand Saraswati University Ajmer
  • 2. Random Numbers ‱ many uses of random numbers in cryptography ‱ nonces in authentication protocols to prevent replay ‱ session keys ‱ public key generation ‱ keystream for a one-time pad ‱ in all cases its critical that these values be ‱ statistically random, uniform distribution, independent ‱ unpredictability of future values from previous values ‱ true random numbers provide this ‱ care needed with generated random numbers
  • 3. ‱ Random numbers play an important role in the use of encryption for various network security applications. ‱ In this presentation, we provide a brief overview of the use of random numbers in cryptography and network security and then focus on the principles of pseudorandom number generation. ‱ Getting good random numbers is important, but difficult. ‱ You don't want someone guessing the key you're using to protect your communications because your "random numbers" weren't (as happened in an early release of Netscape SSL). ‱ Traditionally, the concern in the generation of a sequence of allegedly random numbers has been that the sequence of numbers be random in some well-defined statistical sense (with uniform distribution & independent).
  • 4. ‱ In applications such as reciprocal authentication, session key generation, and stream ciphers, the requirement is not just that the sequence of numbers be statistically random but that the successive members of the sequence are unpredictable ‱ (so that it is not possible to predict future values having observed previous values). ‱ With "true" random sequences, each number is statistically independent of other numbers in the sequence and therefore unpredictable. ‱ However, as is discussed shortly, true random numbers are seldom used; rather, sequences of numbers that appear to be random are generated by some algorithm.
  • 5. Pseudorandom Number Generators (PRNGs) ‱ often use deterministic algorithmic techniques to create “random numbers” ‱ although are not truly random ‱ can pass many tests of “randomness” ‱ known as “pseudorandom numbers” ‱ created by “Pseudorandom Number Generators (PRNGs)”
  • 6. ‱ Cryptographic applications typically make use of deterministic algorithmic techniques for random number generation, producing sequences of numbers that are not statistically random, but if the algorithm is good, the resulting sequences will pass many reasonable tests of randomness. ‱ Such numbers are referred to as pseudorandom numbers, created by “Pseudorandom Number Generators (PRNGs)”.
  • 7. Random & Pseudorandom Number Generators
  • 8. ‱ Stallings Figure above contrasts a true random number generator (TRNG) with two forms of pseudorandom number generators. ‱ A TRNG takes as input a source that is effectively random; the source is often referred to as an entropy source. ‱ In contrast, a PRNG takes as input a fixed value, called the seed, and produces a sequence of output bits using a deterministic algorithm. ‱ Typically, as shown, there is some feedback path by which some of the results of the algorithm are fed back as input as additional output bits are produced. ‱ The important thing to note is that the output bit stream is determined solely by the input value or values, so that an adversary who knows the algorithm and the seed can reproduce the entire bit stream.
  • 9. ‱ Figure above shows two different forms of PRNGs, based on application; ‱ ‱ Pseudorandom number generator: An algorithm that is used to produce an open-ended sequence of bits is referred to as a PRNG. ‱ A common application for an open-ended sequence of bits is as input to a symmetric stream cipher ‱ ‱ Pseudorandom function (PRF): A PRF is used to produced a pseudorandom string of bits of some fixed length. ‱ Examples are the symmetric encryption keys and nonces. ‱ Typically, the PRF takes as input a seed plus some context specific values, such as a user ID or an application ID.
  • 10. PRNG Requirements ‱ randomness ‱ uniformity, scalability, consistency ‱ unpredictability ‱ forward & backward unpredictability ‱ use same tests to check ‱ characteristics of the seed ‱ secure ‱ if known adversary can determine output ‱ so must be random or pseudorandom number
  • 11. PRNG Requirements ‱ When a PRNG or PRF is used for a cryptographic application, then the basic requirement is that an adversary who does not know the seed is unable to determine the pseudorandom string. ‱ This general requirement for secrecy of the output of a PRNG or PRF leads to specific requirements in the areas of randomness, unpredictability, and the characteristics of the seed. ‱ In terms of randomness, the requirement for a PRNG is that the generated bit stream appear random even though it is deterministic. ‱ NIST SP 800-22 (A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications) specifies that the tests should seek to establish the following three characteristics: uniformity, scalability, consistency. SP 800-22 lists 15 separate tests of randomness. ‱
  • 12. PRNG Requirements ‱ A stream of pseudorandom numbers should exhibit two forms of unpredictability: forward unpredictability, backward unpredictability. The same set of tests for randomness also provide a test of unpredictability. If the generated bit stream appears random, then it is not possible to predict some bit or bit sequence from knowledge of any previous bits. Similarly, if the bit sequence appears random, then there is no feasible way to deduce the seed based on the bit sequence. That is, a random sequence will have no correlation with a fixed value (the seed). ‱ For cryptographic applications, the seed that serves as input to the PRNG must be secure. Because the PRNG is a deterministic algorithm, if the adversary can deduce the seed, then the output can also be determined. Therefore, the seed must be unpredictable. In fact, the seed itself must be a random or pseudorandom number.
  • 13. Assignment ‱ Explain the working of Pseudorandom Number Generators.