CE 340
Cryptography
& Network Security
Pseudo Random Number Generators
&
Stream Ciphers
, many uses of random numbers in
cryptography
noneces in authentication protocols to prevent
replay
session keys
public key generation
keystream for a one-time pad
in all cases its critical that these values be
statistically random, uniform distribution,
independent
unpredictability of future values from previous
values
, often
use deterministic algorithmic
techniques to create “random
numbers”
although are not truly random
can pass many tests of “randomness”
known as “pseudorandom numbers”
created by “Pseudorandom Number
Generators (PRNGs)”
Cryptography
& Network Security
Pseudo Random Number Generators
&
Stream Ciphers
, many uses of random numbers in
cryptography
noneces in authentication protocols to prevent
replay
session keys
public key generation
keystream for a one-time pad
in all cases its critical that these values be
statistically random, uniform distribution,
independent
unpredictability of future values from previous
values
, often
use deterministic algorithmic
techniques to create “random
numbers”
although are not truly random
can pass many tests of “randomness”
known as “pseudorandom numbers”
created by “Pseudorandom Number
Generators (PRNGs)”