Skip to main content

Questions tagged [randomness]

Usage of randomness (i.e. non-predictable data, usually in the form of bits or numbers) for cryptographic purposes.

Filter by
Sorted by
Tagged with
4 votes
1 answer
231 views

This could be related to any cipher, but this is specific so some AES hardware. In this hardware, a 128-bit random number is exchanged, as one does, between hosts. Due to a hardware quirk, the last ...
b degnan's user avatar
  • 5,375
9 votes
2 answers
2k views

Committing security is growing in importance as a set of properties for authenticated encryption in symmetric settings. This notion is defined by Bellare, Hoang, and Wu as: $\underline{\small \textrm{...
aiootp's user avatar
  • 1,324
1 vote
0 answers
41 views

Summary This is an experimental exploration of using high-dimensional vector spaces and invertible neural networks (INNs) to harden classical encryption against potential post-quantum attacks. The ...
Cal's user avatar
  • 11
1 vote
1 answer
199 views

I have one hundred integers inside an array that are consecutive outputs from rand() which are modulo'd by a magic number such as 41, inside an array like so: ...
hexesandohs's user avatar
1 vote
2 answers
384 views

My algorithm's latest run found 5 (4096-bit, 1233-digit) safe or Sophie Germain primes in 6 hours and 59 minutes, after 11,190,811 attempts. It doesn't use any libraries, public or otherwise—just a ...
Arkady's user avatar
  • 17
1 vote
1 answer
128 views

As I understand the leftover hash lemma: I pick a hash function $h$ at random from an $2$-universal family of hash functions. I pick a random string $s$, and then $(h(x,s),s)$ is statistically close ...
Sam Jaques's user avatar
  • 1,920
1 vote
7 answers
2k views

While reading about PRNG theory, I'm always seeing "it is hard to determine whether the stream is really random". Do we really need a random stream? Maybe a better option is just an ...
Jakub Juszczakiewicz's user avatar
-1 votes
3 answers
239 views

It is invariably stated that the human mind cannot produce random passwords, numbers etc. because patterns and preferences emerge. I propose that this is wrong, and that with practise it is possible. ...
Zonnkq Shad's user avatar
3 votes
2 answers
376 views

From the MacOS terminal (in Central London) I ping a website on the other side of the world (a café in Tokyo), then take the last digit of the ping time in milliseconds e.g. 289.642 ms becomes 2. I ...
Zonnkq Shad's user avatar
3 votes
2 answers
903 views

Supposing that one has reliably random data of uniform distribution to use as an input, how can an integer in the range $[0, k-1]$ be selected at random without bias and in constant-time with respect ...
Melab's user avatar
  • 4,328
1 vote
0 answers
80 views

I have a 32-bit xorshift PRNG. In my setup (see below), generating a single number takes 6 "cycles", and parallelizing is straightforward. I intend to run 6 at once and concatenate their ...
raehik's user avatar
  • 111
5 votes
2 answers
348 views

I've been developing a diagnostic framework that analyzes RNG behavior by tracking the timing and phase of number recurrence—not just frequency or independence. Core Idea: NAVSYS maps numeric streams ...
Jonathan Hutton's user avatar
1 vote
0 answers
95 views

As you know, elliptic curve key generation involve picking a random scalar and multiply it by the Generator point. A strong characteristic of secure random number generation is each of the bits has ½ ...
user2284570's user avatar
1 vote
1 answer
214 views

For non-cryptographic purposes (which use a HWRNG instead), I implemented into a bare metal program a Xorshift* RNG (Taken from [1], see below for implementation). The RNG is currently seeded with the ...
a3f's user avatar
  • 13
1 vote
1 answer
90 views

I have an interest in cryptography, information theory, high performance computing and computer science in general, although I enjoy exploring said activities only as a hobby; I am am no professional ...
Ömer Enes Özmen's user avatar

15 30 50 per page
1
2 3 4 5
39