Welcome Guest [Log In] [Register]
Welcome to Crypto. We hope you enjoy your visit.


You're currently viewing our forum as a guest. This means you are limited to certain areas of the board and there are some features you can't use. If you join our community, you'll be able to access member-only sections, and use many member-only features such as customizing your profile, sending personal messages, and voting in polls. Registration is simple, fast, and completely free.


Join our community!


If you're already a member please log in to your account to access all of our features:

Username:   Password:
Add Reply
Looking for tool to analyze crypto-security of random number stream.
Topic Started: Oct 23 2014, 05:23 AM (382 Views)
KenFisher
Just registered
[ * ]
I'm looking for a utility that can analyze the crypto-security of a stream of pseudo random numbers. In my work, 8 bit unsigned integers used as Cipher.

The tests I've heard of are 'next bit test' or 'Yao's test' but I can find nothing on software implementing these tests.

I have found statistical tests, and my work passes :) . But nothing on crypto security.
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
I may be gravely wrong but my interpretation of some sentences on p.171 of HAC of Menezes et al. is that, "strictly" speaking, the next bit test is of a nature akin to that of Kolmogorov-Solmonoff-Chaitin complexity, i.e. it's not "constructive". For in order to have a PRNG being able to "pass all polynomial-time statistical tests" one would have to be sure that one indeed has "all" such tests at hand. But how could one know that one has gathered all such tests and not perhaps missed a single one (in particular one that somebody could possibly invent in the future)?
Offline Profile Quote Post Goto Top
 
JOE.TEKK1
Elite member
[ *  *  *  *  * ]
Maybe some of the books of Bruce Schneir may be of help; his Crypto Engineering book.

Joe

---
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
JOE.TEKK1
Oct 31 2014, 03:16 PM
Maybe some of the books of Bruce Schneir may be of help; his Crypto Engineering book.
I had only once borrowed that book from a library and browsed through it snd don't have it at hand now. But that's quite practice oriented and hence I estimate that the probability that that book could be useful in this context is less then 0.1%. Schneir's Applied Cryptography doesn't have matrials in question. So, if OP likes to follow deeper into his query, he would have to look somewhere else.
Offline Profile Quote Post Goto Top
 
JOE.TEKK1
Elite member
[ *  *  *  *  * ]


Two (2) more books:
Cryptography: Theory and Practice, Third Edition (Discrete Mathematics and Its Applications) Hardcover – November 1, 2005
by Douglas R. Stinson (Author)
18 customer reviews
ISBN-13: 978-1584885085 ISBN-10: 1584885084 Edition: 3rd
Series: Discrete Mathematics and Its Applications (Book 30)
Hardcover: 616 pages
Publisher: Chapman and Hall/CRC; 3 edition (November 1, 2005)
Language: English
ISBN-10: 1584885084
ISBN-13: 978-1584885085
Product Dimensions: 9.6 x 6.3 x 1.4 inches
Shipping Weight: 2.2 pounds (View shipping rates and policies)

---

Handbook of Applied Cryptography (Discrete Mathematics and Its Applications) Hardcover – October 16, 1996
by Alfred J. Menezes (Author), & 2 more
23 customer reviews
ISBN-13: 978-0849385230 ISBN-10: 0849385237 Edition: 1st
Series: Discrete Mathematics and Its Applications (Book 4)
Hardcover: 780 pages
Publisher: CRC Press; 1 edition (October 16, 1996)
Language: English
ISBN-10: 0849385237
ISBN-13: 978-0849385230
Product Dimensions: 7 x 1.7 x 10 inches
Shipping Weight: 3.4 pounds (View shipping rates and policies)
Offline Profile Quote Post Goto Top
 
JOE.TEKK1
Elite member
[ *  *  *  *  * ]
Ken: You should also do a search of those terms on www.iacr.org ; in their
<< PUBLICATIONS >> section .

Joe

// Saturday, 1 NOV 2014; 12:20PM EDST--USA Time ; New Jersey time //

--- end ---
Offline Profile Quote Post Goto Top
 
mok-kong shen
NSA worthy
[ *  *  *  *  *  * ]
I have mentioned HAC in my first post. Unfortunately, as I argued, that book wouldn't satisfy OP's quest IMHO. (I believe that it's generally desirable that in giving references one should ensure to some extent their relevance or non-relevance and indicate that fact correspondingly so as not to eventually waste the time of the readers.)
Edited by mok-kong shen, Nov 1 2014, 11:16 PM.
Offline Profile Quote Post Goto Top
 
1 user reading this topic (1 Guest and 0 Anonymous)
« Previous Topic · Utilities · Next Topic »
Add Reply