• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954
Citation: Gao Shujing, Qu Yingjie, Song Tingqiang. Pseudorandom Number Generators Based on One-Way Functions[J]. Journal of Computer Research and Development, 2015, 52(6): 1394-1399. DOI: 10.7544/issn1000-1239.2015.20131954

Pseudorandom Number Generators Based on One-Way Functions

More Information
  • Published Date: May 31, 2015
  • Pseudorandom number generators (referred as PRNG) is an important cryptographic primitive that was first introduced and formalized as BMY generator in 1982. The PRNG based on one-way functions is constructed by iterating a one-way function (OWF) on a random seed and generating pseudorandom sequences periodically. The seed length and the property of the one-way function are two important factors of this kind PRNG, which measure the efficiency and the security of the PRNG. The security of the latest PRNG of this type relies on one-way function of length preserving or one-way permutation that is hard to be obtained. This paper revisits the current randomized iteration technique and makes improvement on the iteration process by expanding the outputs of one-way function. The new technique, which is called expanded randomized iteration, eliminates the length preserving property of the one-way function. On the basis of the expanded randomized iteration, our construction uses the general compression regular one-way function and universal hash function as the main components. In the BMY case, a hardcore-bit of each iteration step is taken as the output of the pseudorandom sequence. Our scheme adopts the similar structure as the current ones but relaxes the requirement of the property of the one-way function, reduces the seed length and improves the efficiency. Finally, the security of the iteration is proved irreversible and the security of the proposed pseudorandom generator is proved undistinguishable from the real random sequence.
  • Related Articles

    [1]Gao Wei, Chen Liqun, Tang Chunming, Zhang Guoyan, Li Fei. One-Time Chameleon Hash Function and Its Application in Redactable Blockchain[J]. Journal of Computer Research and Development, 2021, 58(10): 2310-2318. DOI: 10.7544/issn1000-1239.2021.20210653
    [2]Wei Zheng, Dou Yu, Gao Yanzhen, Ma Jie, Sun Ninghui, Xing Jing. A Consistent Hash Data Placement Algorithm Based on Stripe[J]. Journal of Computer Research and Development, 2021, 58(4): 888-903. DOI: 10.7544/issn1000-1239.2021.20190732
    [3]Li Fei, Gao Wei, Wang Guilin, Xie Dongqing, Tang Chunming. Generic Tightly Secure Signature Schemes from Strong Chameleon Hash Functions[J]. Journal of Computer Research and Development, 2017, 54(10): 2244-2254. DOI: 10.7544/issn1000-1239.2017.20170422
    [4]WuTao, JinJianguo, WeiMingjun. A Hash Function Algorithm Based on Variable Parameter Cascade Chaos[J]. Journal of Computer Research and Development, 2016, 53(3): 674-681. DOI: 10.7544/issn1000-1239.2016.20148155
    [5]Ma Bingke, Li Bao. Collision and Second Preimage Attacks on the HTBC Hash Function[J]. Journal of Computer Research and Development, 2014, 51(11): 2513-2517. DOI: 10.7544/issn1000-1239.2014.20130882
    [6]Qin Chuan, Chang Chin Chen, Guo Cheng. Perceptual Robust Image Hashing Scheme Based on Secret Sharing[J]. Journal of Computer Research and Development, 2012, 49(8): 1690-1698.
    [7]Fu Jianqing, Wu Chunming, Wu Jiyi, Ping Lingdi. Reverse Hash Chain Traversal Based on Binary Tree[J]. Journal of Computer Research and Development, 2012, 49(2): 294-303.
    [8]Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-Based RFID Security Authentication Protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
    [9]Liu Ji. One-Way Hash Function based on Integer Coupled Tent Maps and Its Performance Analysis[J]. Journal of Computer Research and Development, 2008, 45(3): 563-569.
    [10]Huang Yuhua, Hu Aiqun, Wang Xingjian. Triple-Block-Chaining-Based Hash Function and Its Performance Analysis[J]. Journal of Computer Research and Development, 2006, 43(8): 1398-1404.
  • Cited by

    Periodical cited type(6)

    1. 童伟传,方友军,唐明. 基于数据挖掘的政务数据安全风险检测系统. 信息技术. 2023(02): 151-156 .
    2. 白荣华,魏强,郭瑞,刘金. 政务信息系统商用密码集约化平台设计与实现. 信息安全研究. 2023(05): 461-468 .
    3. 黎祥远. 攻防视角下的高校网络安全防护策略——基于网络安全攻防演练的研究. 华商论丛. 2023(01): 101-106 .
    4. 朱然,曾宇. 基于信任评估模型的物联网节点篡改共识仿真. 计算机仿真. 2021(04): 267-271 .
    5. 刘平. 国家公共文化云网络安全设计和实践. 百花. 2020(07): 31-34 .
    6. 张锐昕,王玉荣. 中国政府上网20年:发展历程、成就及反思. 福建师范大学学报(哲学社会科学版). 2019(05): 43-50+168 .

    Other cited types(2)

Catalog

    Article views (1598) PDF downloads (947) Cited by(8)

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return