Random Bit Generator Mechanism Based on Elliptic Curves and Secure Hash Function

02/21/2020
by   O. Reyad, et al.
0

Pseudorandom bit generators (PRBG) can be designed to take the advantage of some hard number theoretic problems such as the discrete logarithm problem (DLP). Such type of generators will have good randomness and unpredictability properties as it is so difficult to find an easy solution to the regarding mathematical dilemma. Hash functions in turn play a remarkable role in many cryptographic tasks to achieve various security strengths. In this paper, a pseudorandom bit generator mechanism that is based mainly on the elliptic curve discrete logarithm problem (ECDLP) and hash derivation function is proposed. The cryptographic hash functions are used in consuming applications that require various security strengths. In a good hash function, finding whatever the input that can be mapped to any pre-specified output is considered computationally infeasible. The obtained pseudorandom bits are tested with NIST statistical tests and it also could fulfill the up-to-date standards. Moreover, a 256 × 256 grayscale images are encrypted with the obtained pseudorandom bits following by necessary analysis of the cipher images for security prove.

READ FULL TEXT
research
08/14/2021

Probability Distributions for Elliptic Curves in the CGL Hash Function

Hash functions map data of arbitrary length to data of predetermined len...
research
03/15/2019

Hash functions from superspecial genus-2 curves using Richelot isogenies

Last year Takashima proposed a version of Charles, Goren and Lauter's ha...
research
06/14/2018

Ramanujan graphs in cryptography

In this paper we study the security of a proposal for Post-Quantum Crypt...
research
04/28/2023

Stretching Demi-Bits and Nondeterministic-Secure Pseudorandomness

We develop the theory of cryptographic nondeterministic-secure pseudoran...
research
07/08/2023

A Novel Pseudo-Random Number Generator Based on Multi-Objective Optimization for Image-Cryptographic Applications

Pseudo-random number generators (PRNGs) play an important role to ensure...
research
03/14/2019

Keyed hash function from large girth expander graphs

In this paper we present an algorithm to compute keyed hash function (me...
research
02/07/2023

Homomorphic Hashing Based on Elliptic Curve Cryptography

For avoiding the exposure of plaintexts in cloud environments, some homo...

Please sign up or login with your details

Forgot password? Click here to reset