Preprint Article Version 1 Preserved in Portico This version is not peer-reviewed

Random Number Generators: Principles and Applications

Version 1 : Received: 13 September 2023 / Approved: 13 September 2023 / Online: 14 September 2023 (03:37:49 CEST)

A peer-reviewed article of this Preprint also exists.

Bikos , A.; Nastou , P.E.; Petroudis , G.; Stamatiou , Y.C. Random Number Generators: Principles and Applications. Cryptography 2023, 7, 54. Bikos , A.; Nastou , P.E.; Petroudis , G.; Stamatiou , Y.C. Random Number Generators: Principles and Applications. Cryptography 2023, 7, 54.

Abstract

this paper we present approaches for generating random numbers along with potential applications. Rather than trying to provide extensive coverage of several techniques or algorithms that have appeared in the scientific literature, we focus on some representative approaches presenting their workings and properties in detail. Our goal is to delineate their strengths and weaknesses as well as their potential application domains so as the reader can judge what would be the best approach for the application in hand, possibly a combination of the available approaches. For instance, a physical source of randomness can be used for the initial seed, then suitable preprocessing can enhance its randomness and then the output of the preprocessing can feed different types of generators, e.g. a linear congruential generator, a cryptographically secure one and one based on the combination of one way hash functions and shared key cryptoalgorithms in various modes of operation. Then, if desired, the outputs of the different generators can be combined giving the final random sequence. Moreover, we present a set of practical randomness tests which can be applied on the outputs of random number generators in order to assess their randomness characteristics. In order to demonstrate the importance of unpredictable random sequences, we present an application of cryptographically secure generators in domains where unpredictability is one of the major requirements, i.e. eLotteries and cryptographic key generation.

Keywords

Random Number Generation; Cryptography

Subject

Computer Science and Mathematics, Security Systems

Comments (0)

We encourage comments and feedback from a broad range of readers. See criteria for comments and our Diversity statement.

Leave a public comment
Send a private comment to the author(s)
* All users must log in before leaving a comment
Views 0
Downloads 0
Comments 0
Metrics 0


×
Alerts
Notify me about updates to this article or when a peer-reviewed version is published.
We use cookies on our website to ensure you get the best experience.
Read more about our cookies here.