Introduction to Secure PRNGs

  • Babaei M
  • Farhadi M
N/ACitations
Citations of this article
13Readers
Mendeley users who have this article in their library.

Abstract

Pseudo-Random Number Generators (PRNGs) are required for generating secret keys in cryptographic algorithms , generating sequences of packet in Network simulations (workload generators) and other applications in various fields. In this paper we will discuss a list of some requirements for generating a reliable random sequence and then will present some PRNG methods which are based on combinational chaotic logistic map. In the final section after a brief introduction to two statistical test packets, TestU01 and NIST suite tests, the PRNG methods which are presented in the fourth section will be appraised under these test packets and the results will be reported.

Cite

CITATION STYLE

APA

Babaei, M., & Farhadi, M. (2011). Introduction to Secure PRNGs. International Journal of Communications, Network and System Sciences, 04(10), 616–621. https://doi.org/10.4236/ijcns.2011.410074

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free