| Welcome to Crypto. We hope you enjoy your visit. You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free. Join our community! If you're already a member please log in to your account to access all of our features: |
| Looking for tool to analyze crypto-security of random number stream. | |
|---|---|
| Tweet Topic Started: Oct 23 2014, 05:23 AM (382 Views) | |
| KenFisher | Oct 23 2014, 05:23 AM Post #1 |
|
Just registered
![]() ![]() ![]()
|
I'm looking for a utility that can analyze the crypto-security of a stream of pseudo random numbers. In my work, 8 bit unsigned integers used as Cipher. The tests I've heard of are 'next bit test' or 'Yao's test' but I can find nothing on software implementing these tests. I have found statistical tests, and my work passes . But nothing on crypto security. |
![]() |
|
| mok-kong shen | Oct 29 2014, 08:41 PM Post #2 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
I may be gravely wrong but my interpretation of some sentences on p.171 of HAC of Menezes et al. is that, "strictly" speaking, the next bit test is of a nature akin to that of Kolmogorov-Solmonoff-Chaitin complexity, i.e. it's not "constructive". For in order to have a PRNG being able to "pass all polynomial-time statistical tests" one would have to be sure that one indeed has "all" such tests at hand. But how could one know that one has gathered all such tests and not perhaps missed a single one (in particular one that somebody could possibly invent in the future)? |
![]() |
|
| JOE.TEKK1 | Oct 31 2014, 03:16 PM Post #3 |
|
Elite member
![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Maybe some of the books of Bruce Schneir may be of help; his Crypto Engineering book. Joe --- |
![]() |
|
| mok-kong shen | Oct 31 2014, 06:57 PM Post #4 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
I had only once borrowed that book from a library and browsed through it snd don't have it at hand now. But that's quite practice oriented and hence I estimate that the probability that that book could be useful in this context is less then 0.1%. Schneir's Applied Cryptography doesn't have matrials in question. So, if OP likes to follow deeper into his query, he would have to look somewhere else. |
![]() |
|
| JOE.TEKK1 | Nov 1 2014, 04:18 PM Post #5 |
|
Elite member
![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Two (2) more books: Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications) Hardcover – November 1, 2005 by Douglas R. Stinson (Author) 18 customer reviews ISBN-13: 978-1584885085 ISBN-10: 1584885084 Edition: 3rd Series: Discrete Mathematics and Its Applications (Book 30) Hardcover: 616 pages Publisher: Chapman and Hall/CRC; 3 edition (November 1, 2005) Language: English ISBN-10: 1584885084 ISBN-13: 978-1584885085 Product Dimensions: 9.6 x 6.3 x 1.4 inches Shipping Weight: 2.2 pounds (View shipping rates and policies) --- Handbook of Applied Cryptography (Discrete Mathematics and Its Applications) Hardcover – October 16, 1996 by Alfred J. Menezes (Author), & 2 more 23 customer reviews ISBN-13: 978-0849385230 ISBN-10: 0849385237 Edition: 1st Series: Discrete Mathematics and Its Applications (Book 4) Hardcover: 780 pages Publisher: CRC Press; 1 edition (October 16, 1996) Language: English ISBN-10: 0849385237 ISBN-13: 978-0849385230 Product Dimensions: 7 x 1.7 x 10 inches Shipping Weight: 3.4 pounds (View shipping rates and policies) |
![]() |
|
| JOE.TEKK1 | Nov 1 2014, 04:20 PM Post #6 |
|
Elite member
![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
Ken: You should also do a search of those terms on www.iacr.org ; in their << PUBLICATIONS >> section . Joe // Saturday, 1 NOV 2014; 12:20PM EDST--USA Time ; New Jersey time // --- end --- |
![]() |
|
| mok-kong shen | Nov 1 2014, 08:43 PM Post #7 |
|
NSA worthy
![]() ![]() ![]() ![]() ![]() ![]() ![]() ![]()
|
I have mentioned HAC in my first post. Unfortunately, as I argued, that book wouldn't satisfy OP's quest IMHO. (I believe that it's generally desirable that in giving references one should ensure to some extent their relevance or non-relevance and indicate that fact correspondingly so as not to eventually waste the time of the readers.)
Edited by mok-kong shen, Nov 1 2014, 11:16 PM.
|
![]() |
|
| 1 user reading this topic (1 Guest and 0 Anonymous) | |
| « Previous Topic · Utilities · Next Topic » |





![]](http://z2.ifrm.com/static/1/pip_r.png)
. But nothing on crypto security.



12:32 AM Jul 11