On Stern's attack against secret truncated linear congruential generators

被引:0
|
作者
Contini, S [1 ]
Shparlinski, IE [1 ]
机构
[1] Macquarie Univ, Dept Comp, N Ryde, NSW 2109, Australia
来源
INFORMATION SECURITY AND PRIVACY, PROCEEDINGS | 2005年 / 3574卷
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In 1987, Stern showed how the parameters for secret truncated linear congruential generators could be derived in polynomial time. Here, we present a modification to that algorithm which makes it simpler, more robust, and require less data. We then present a more careful analysis of the algorithm, and establish some limits of its applicability. Thus, secret truncated linear congruential generators may not necessarily be insecure for properly chosen parameters. Unfortunately, as in the original algorithm, all the results remain heuristic, however we present results of numerical experiments which support our conclusions.
引用
收藏
页码:52 / 60
页数:9
相关论文
共 50 条
  • [31] On the Linear Complexity Profile of Nonlinear Congruential Pseudorandom Number Generators with Dickson Polynomials
    Hassan Aly
    Arne Winterhof
    Designs, Codes and Cryptography, 2006, 39 : 155 - 162
  • [32] ON THE DISTRIBUTION AND LINEAR COMPLEXITY OF COUNTER-DEPENDENT NONLINEAR CONGRUENTIAL PSEUDORANDOM NUMBER GENERATORS
    El-Mahassni, Edwin D.
    Winterhof, Arne
    JP JOURNAL OF ALGEBRA NUMBER THEORY AND APPLICATIONS, 2006, 6 (02): : 411 - 423
  • [33] Proving the deterministic period breaking of linear congruential generators using two tile quasicrystals
    Guimond, LS
    Patera, J
    MATHEMATICS OF COMPUTATION, 2002, 71 (237) : 319 - 332
  • [34] OPTIMAL MULTIPLIERS FOR LINEAR CONGRUENTIAL PSEUDO-RANDOM NUMBER GENERATORS WITH PRIME MODULI
    DENZER, V
    ECKER, A
    BIT, 1988, 28 (04): : 803 - 808
  • [35] Secure pseudo-random bit sequence generation using coupled linear congruential generators
    Katti, Raj S.
    Kavasseri, Rajesh G.
    PROCEEDINGS OF 2008 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-10, 2008, : 2929 - 2932
  • [36] Beware of linear congruential generators with multipliers of the form a = ±2q ±2r
    L'ecuyer, P
    Simard, R
    ACM TRANSACTIONS ON MATHEMATICAL SOFTWARE, 1999, 25 (03): : 367 - 374
  • [37] On the algebraic attack against summation type keystream generators
    Iftekhar Salam, Md.
    Lee, Hoon-Jae
    International Journal of Information and Computer Security, 2012, 5 (02) : 132 - 149
  • [38] A Timing Attack against the Secret Permutation in the McEliece PKC
    Strenzke, Falko
    POST-QUANTUM CRYPTOGRAPHY, PROCEEDINGS, 2010, 6061 : 95 - 107
  • [39] An exhaustive search for good 64-bit linear congruential random number generators with restricted multiplier
    Tang, Hui-Chin
    Chang, Hwapeng
    COMPUTER PHYSICS COMMUNICATIONS, 2011, 182 (11) : 2326 - 2330
  • [40] An optimised linear attack on pseudorandom generators using a non-linear combiner
    Tanaka, H
    Ohishi, T
    Kaneko, T
    INFORMATION SECURITY, 1998, 1396 : 43 - 54