In this article, we introduce the R package CryptRndTest that performs eight statistical randomness tests on cryptographic random number sequences. The purpose of the package is to provide software implementing recently proposed cryptographic randomness tests utilizing goodness-of-fit tests superior to the usual chi-square test in terms of statistical performance. Most of the tests included in package CryptRndTest are not available in other software packages such as the R package RDieHarder or the C library TestU01. Chi-square, Anderson-Darling, Kolmogorov-Smirnov, and Jarque-Bera goodness-of-fit procedures are provided along with cryptographic randomness tests. CryptRndTest utilizes multiple precision floating numbers for sequences longer ...
Pseudo-random numbers play an important role for the security of a message in a cryptographic system...
Cryptographic algorithms and functions should possess some of the important functional requirements ...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high ...
Randomness provided by pseudo-random number generators is the one of the most vital parts of cryptog...
The article systematizes the basic scientific principles about statistical testing of random and pse...
Random values are considered as an indispensable part of cryptography, since they are necessary for ...
Security of a cryptographic application is highly related to the quality of randomness of the mechan...
Random sequences and random numbers constitute a necessary part of cryptography. Many cryptographic ...
Generating random numbers and random sequences that are indistinguishable from truly random sequence...
International audienceNew dangerous attacks have arisen as we witness the current evolution of digit...
Pseudorandom generators belong to the primary focus of cryptology. The key to every cipher has to be...
The most effective cryptographic algorithm has more randomness in the numbers a generator generates,...
According to Kerchoffs (1883), the security system should only rely on cryptographic keys which is u...
In many applications, for example cryptography and Monte Carlo simulation, there is need for random ...
Random key bit generators are used in statistically secured stream ciphers. In stream ciphers pseudo...
Pseudo-random numbers play an important role for the security of a message in a cryptographic system...
Cryptographic algorithms and functions should possess some of the important functional requirements ...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high ...
Randomness provided by pseudo-random number generators is the one of the most vital parts of cryptog...
The article systematizes the basic scientific principles about statistical testing of random and pse...
Random values are considered as an indispensable part of cryptography, since they are necessary for ...
Security of a cryptographic application is highly related to the quality of randomness of the mechan...
Random sequences and random numbers constitute a necessary part of cryptography. Many cryptographic ...
Generating random numbers and random sequences that are indistinguishable from truly random sequence...
International audienceNew dangerous attacks have arisen as we witness the current evolution of digit...
Pseudorandom generators belong to the primary focus of cryptology. The key to every cipher has to be...
The most effective cryptographic algorithm has more randomness in the numbers a generator generates,...
According to Kerchoffs (1883), the security system should only rely on cryptographic keys which is u...
In many applications, for example cryptography and Monte Carlo simulation, there is need for random ...
Random key bit generators are used in statistically secured stream ciphers. In stream ciphers pseudo...
Pseudo-random numbers play an important role for the security of a message in a cryptographic system...
Cryptographic algorithms and functions should possess some of the important functional requirements ...
Randomness is crucial to enabling secure and robust communications. Ideally one should harness high ...