We try to provide an alternative attitude toward the use of a Linear Congruential Generator (LCG here after) in generating pseudo-random numbers for some cryptographic purpose. In particular, we choose email encryption as our cryptographic application. Our encryption will be considered secure if the attacker cannot infer the pseudo-random numbers without knowing the parameters of the LCG. We implement Plumstead’s inference algorithm [2] for an unknown LCG and our experimental results show that simply increasing the size of the modulus of the LCG does not significantly increase the difficulty of breaking the system. The only way to circumvent the weakness of the LCG, as we conclude, is to hide the generated numbers from the attacker. We sugg...
grantor: University of TorontoWe attempt to provide evidence for the security of block-cip...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
The DSS signature algorithm requires the signer to generate a new random number with every signature...
E-mail is widely used all over the world invarious fields such as economic, office, personal case an...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
International audienceSuppose that the private key of discrete logarithm-based or factoring-based pu...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
We investigate a cryptographically secure pseudorandom number generator based on a Linear Feedback S...
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad ...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
In this paper we study the linear congruential generator on elliptic curves from the cryptographic p...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
grantor: University of TorontoWe attempt to provide evidence for the security of block-cip...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...
The DSS signature algorithm requires the signer to generate a new random number with every signature...
E-mail is widely used all over the world invarious fields such as economic, office, personal case an...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...
Random numbers are useful in many applications such as Monte Carlo simulation, randomized algorithms...
International audienceSuppose that the private key of discrete logarithm-based or factoring-based pu...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
We investigate a cryptographically secure pseudorandom number generator based on a Linear Feedback S...
Local pseudorandom generators are a class of fundamental cryptographic primitives having very broad ...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
In this paper we study the linear congruential generator on elliptic curves from the cryptographic p...
The design of cryptographically secure pseudorandom number generator (CSPRNG) producing unpredictabl...
grantor: University of TorontoWe attempt to provide evidence for the security of block-cip...
Abstract. Chosen-plaintext attacks on private-key encryption schemes are currently modeled by giving...
Cryptography is essential for secure online communications. Many different types of ciphers are impl...