z-logo
open-access-imgOpen Access
Comparing Some Pseudo-Random Number Generators and Cryptography Algorithms Using a General Evaluation Pattern
Author(s) -
Ahmad Gaeini,
Abdolrasoul Mirghadri,
Gholamreza Jandaghi,
Behbod Keshavarzi
Publication year - 2016
Publication title -
international journal of information technology and computer science
Language(s) - English
Resource type - Journals
eISSN - 2074-9015
pISSN - 2074-9007
DOI - 10.5815/ijitcs.2016.09.04
Subject(s) - computer science , pseudorandom number generator , algorithm , block (permutation group theory) , mathematics , geometry
Since various pseudo-random algorithms and sequences are used for cryptography of data or as init ial values for starting a secure communicat ion, how these algorithms are analyzed and selected is very important. In fact, given the g rowingly extensive types of pseudorandom sequences and block and stream cipher algorithms, selection of an appropriate algorithm needs an accurate and thorough investigation. Also, in order to generate a pseudo-random sequence and generalize it to a cryptographer algorithm, a comprehensive and regular framework is needed, so that we are enabled to evaluate the presented algorithm as quick as possible. The purpose of this study is to use a number of pseudo-random number generators as well as popular cryptography algorithms, analyze them in a standard framework and observe the results obtained in each stage. The investigations are like a match between d ifferent algorithms, such that in each stage, weak algorithms are eliminated using a standard method and successful algorithms enter the next stage so that the best algorithms are chosen in the final stage. The main purpose of this paper is to certify the approved algorithm.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here
Accelerating Research

Address

John Eccles House
Robert Robinson Avenue,
Oxford Science Park, Oxford
OX4 4GP, United Kingdom