Rozprawy doktorskie na temat „Pseudo-random number generator (PRNG)”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 19 najlepszych rozpraw doktorskich naukowych na temat „Pseudo-random number generator (PRNG)”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj rozprawy doktorskie z różnych dziedzin i twórz odpowiednie bibliografie.
Yang, Chunxiao. "Fractional chaotic pseudo-random number generator design and application to image cryptosystem". Electronic Thesis or Diss., Ecole centrale de Nantes, 2022. http://www.theses.fr/2022ECDN0063.
Pełny tekst źródłaChaotic systems have been employed to design pseudo-random number generators (PRNG) and applied to cryptosystems due to their promising features, such as randomness and sensitivity to initial conditions. The fractional chaotic systems, though muchless discussed than the classical integer order chaotic maps and systems, possess intriguing intricacy which can provide novelty, complexity, and extra secret keys to the Chaotic PRNG (CPRNG) design, which in turn enhance the security of the cryptosystem.This thesis investigated different numerical calculation approaches for fractional chaotic systems. A non-uniform gird calculationmethod with two different grid compositions was proposed to solve the 3D fractional chaotic systems numerically. The FractionalCPRNGs (FCPRNG), which meet the randomness and statistical requirements, were designed for the first time employing threedifferent fractional chaotic systems. In addition, a stream cipher and a block cipher based on DNA encoding and decoding methods were proposed and studied using the designed FCPRNGs. Both ciphers have been verified to be secure and reliable
Gärtner, Joel. "Analysis of Entropy Usage in Random Number Generators". Thesis, KTH, Skolan för datavetenskap och kommunikation (CSC), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-214567.
Pełny tekst źródłaKryptografiskt säkra slumptalsgeneratorer behöver ofta initialiseras med ett oförutsägbart frö. En annan lösning är att istället konstant ge slumptalsgeneratorer entropi. Detta gör det möjligt att garantera att det interna tillståndet i generatorn hålls oförutsägbart. I den här rapporten analyseras fyra sådana generatorer som matas med entropi. Dessutom presenteras olika sätt att skatta entropi och en ny skattningsmetod utvecklas för att användas till analysen av generatorerna. Den framtagna metoden för entropiskattning lyckas bra i tester och används för att analysera entropin i de olika generatorerna. Alla analyserade generatorer uppvisar beteenden som inte verkar optimala för generatorns funktionalitet. De flesta av de analyserade generatorerna verkar dock oftast säkra att använda.
Nordmark, Oskar. "Turbo Code Performance Analysis Using Hardware Acceleration". Thesis, Linköpings universitet, Datorteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-137666.
Pełny tekst źródłaBakiri, Mohammed. "Hardware implementation of a pseudo random number generator based on chaotic iteration". Thesis, Bourgogne Franche-Comté, 2018. http://www.theses.fr/2018UBFCD014/document.
Pełny tekst źródłaSecurity and cryptography are key elements in constrained devices such as IoT, smart card, embedded system, etc. Their hardware implementations represent a challenge in terms of limitations in physical resources, operating speed, memory capacity, etc. In this context, as most protocols rely on the security of a good random number generator, considered an indispensable element in lightweight security core. Therefore, this work proposes new pseudo-random generators based on chaotic iterations, and designed to be deployed on hardware support, namely FPGA or ASIC. These hardware implementations can be described as post-processing on existing generators. They transform a sequence of numbers not uniform into another sequence of numbers uniform. The dependency between input and output has been proven chaotic, according notably to the mathematical definitions of chaos provided by Devaney and Li-Yorke. Following that, we firstly elaborate or develop out a complete state of the art of the material and physical implementations of pseudo-random number generators (PRNG, for pseudorandom number generators). We then propose new generators based on chaotic iterations (IC) which will be tested on our hardware platform. The initial idea was to start from the n-cube (or, in an equivalent way, the vectorial negation in CIs), then remove a Hamiltonian cycle balanced enough to produce new functions to be iterated, for which is added permutation on output . The methods recommended to find good functions, will be detailed, and the whole will be implemented on our FPGA platform. The resulting generators generally have a better statistical profiles than its inputs, while operating at a high speed. Finally, we will implement them on many hardware support (65-nm ASIC circuit and Zynq FPGA platform)
Mahdal, Jakub. "Bezpečné kryptografické algoritmy". Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2008. http://www.nusl.cz/ntk/nusl-235972.
Pełny tekst źródłaDusitsin, Krid, i Kurt Kosbar. "Accuracy of Computer Simulations that use Common Pseudo-random Number Generators". International Foundation for Telemetering, 1998. http://hdl.handle.net/10150/609238.
Pełny tekst źródłaIn computer simulations of communication systems, linear congruential generators and shift registers are typically used to model noise and data sources. These generators are often assumed to be close to ideal (i.e. delta correlated), and an insignificant source of error in the simulation results. The samples generated by these algorithms have non-ideal autocorrelation functions, which may cause a non-uniform distribution in the data or noise signals. This error may cause the simulation bit-error-rate (BER) to be artificially high or low. In this paper, the problem is described through the use of confidence intervals. Tests are performed on several pseudo-random generators to access which ones are acceptable for computer simulation.
Zouhar, Petr. "Generátor náhodných čísel". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2010. http://www.nusl.cz/ntk/nusl-218290.
Pełny tekst źródłaStewart, Robert Grisham. "A Statistical Evaluation of Algorithms for Independently Seeding Pseudo-Random Number Generators of Type Multiplicative Congruential (Lehmer-Class)". Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etd/2049.
Pełny tekst źródłaXu, Jinzhong. "Stream Cipher Analysis Based on FCSRs". UKnowledge, 2000. http://uknowledge.uky.edu/gradschool_diss/320.
Pełny tekst źródłaNovotný, Marek. "Programy pro výpočet nejistoty měření metodou Monte Carlo". Master's thesis, Vysoké učení technické v Brně. Fakulta elektrotechniky a komunikačních technologií, 2015. http://www.nusl.cz/ntk/nusl-221220.
Pełny tekst źródłaPasserat-Palmbach, Jonathan. "Contributions to parallel stochastic simulation : application of good software engineering practices to the distribution of pseudorandom streams in hybrid Monte Carlo simulations". Phd thesis, Université Blaise Pascal - Clermont-Ferrand II, 2013. http://tel.archives-ouvertes.fr/tel-00858735.
Pełny tekst źródłaГрицак, Анатолій Васильович, i Anatoliy Hrytsak. "Методи побудови ефективних криптографічних функцій гешування". Thesis, Національний авіаційний університет, 2020. https://er.nau.edu.ua/handle/NAU/44653.
Pełny tekst źródłaВащенко, Світлана Михайлівна, Светлана Михайловна Ващенко, Svitlana Mykhailivna Vashchenko i A. V. Sobol. "Information System of Test Monitoring of Students' Knowledge". Thesis, Sumy State University, 2016. http://essuir.sumdu.edu.ua/handle/123456789/47039.
Pełny tekst źródłaKuo, Chi-Yuan, i 郭啟源. "A Chaotic Pseudo Random Number Generator". Thesis, 2003. http://ndltd.ncl.edu.tw/handle/kj6vje.
Pełny tekst źródła中原大學
電機工程研究所
91
Abstract The use of chaotic sequences in digital communication is proposed. In arriving these new sequences, the theory of chaotic has been used. Unlike the conventional PN sequences, which are easily intercepted and deciphered, the chaotic pseudo random numbers offers opportunities for improvement based on its chaotic nature in several aspects. First of all, chaotic sequences are easy to generate and store. Only a few parameters and functions are needed even for very long sequences. In addition, an enormous number of different sequences can be generated simply by changing its initial condition. Moreover, the nature of chaotic signals are deterministic, reproducible, uncorrelated and random-like, which can be very helpful in enhancing the security of transmission in communication. This work mainly focuses on the application of the theory of chaos to digital communication. Based on the equation derived from nonlinear dynamical systems capable of exhibiting chaos, Xn+1= r Xn (1- Xn ), the desirable chaotic pseudo random number generator was invented. After assigning a different initial condition to each use, start the chaotic map with the initial condition of the intended receiver and repeatedly generate points of the orbit. Sensitively depending on its initial value, x0 , for those values of r, the orbit will be of great numbers, noise-like, random-like and reproducible. As a result, the probability of being intercepted would be naturally reduced. Since the spreading sequence in a Chaotic Spread Spectrum(SS) is no longer binary, the application of the chaotic sequences in digital communication is thus limited. A further attempt to transform continuous values to binary ones by using digital encoding technique is therefore proposed to adopt it in digital communication. Some criteria are performed. However, the problem of easily interception due to the nature of binary PN may again arise. To prevent the codes from being intercepted, the binary PN sequences of the two chaotic maps C1 (x, r 1) and C2 (x, r 2) are compared to form a third binary PN sequences using the principle of exclusivity. By using Crypt-X’98 as a testing tool, numerous properties of these sequences are examined to clarify the doubt of deception. Furthermore, the correlation properties are examined at the same time. As the results indicate, the increase of complexity of generators, which produce chaotic pseudo random spreading sequences, provides the spread spectrum system with significantly more security features than the conventional binary sequences. The findings are very attracted for LPI communication and the study of Cryptography in the future as well. The above application represents the first step toward the exploitation of the fascinating theory of chaos from digital point of view. Further research on how to modulate and demodulate the messages with chaotic pseudorandom sequences will be of great interests.
Ramakrishnan, Karthik. "Wireless network security using a low cost pseudo random number generator". 2006. http://proquest.umi.com/pqdweb?did=1172122391&sid=10&Fmt=2&clientId=39334&RQT=309&VName=PQD.
Pełny tekst źródłaTitle from PDF title page (viewed on Mar. 08, 2007) Available through UMI ProQuest Digital Dissertations. Thesis adviser: Sridhar, Ramalingam, Upadhyaya, Shambhu. Includes bibliographical references.
Lee, Po Han, i 李柏翰. "Implementation of chaotic stream ciphers using chaotic pseudo-random number generator". Thesis, 1999. http://ndltd.ncl.edu.tw/handle/47247003253993049254.
Pełny tekst źródła國立臺灣大學
物理學研究所
87
Cryptographic systems are generally classified into block and stream ciphers.The cryptosystem CSC, chaotic stream ciphers, of combining a pseudo-random number generator of chaotic system with classic cryptography has been presented. A chaotic dynamical system means that the numerical trajectory in the phase space exhibits the phenomenon of aperiodic, complicated, and sensible dependence on initial conditions. We describe a simple random number generator based on the chaotic property of the Lorenz system. The random numbers generated by the Lorenz system can be used as secret keys for encryption and decryption after suitable modulo operations have been applied. In this thesis, we will illustrate that the linear congruential recur- rence is not secure and also analyze the secrecy of the logistic map. Through statistical tests, the CSC cryptosystem using chaotic Lorenz system as compared to that developed by Rong He and P.G. Vaidya has the advantages of easy implementation, good privacy, efficiency, and is robust against intruder.
Chen, Jiung-Sheng, i 陳俊晟. "A 32-bit Chaos-Based Pseudo Random Number Generator by Injecting Digital Noise". Thesis, 2005. http://ndltd.ncl.edu.tw/handle/92579125861284269402.
Pełny tekst źródła國立清華大學
電機工程學系
93
Random number generator (RNG) is an important part of communication and protocols in cryptography. It generates the cryptography keys and initial numbers, and also could be used in any application that needs the random value. It is hard to define a good RNG design by the unpredictable character or by the statistical test result. To be unpredictable, the analog RNG is chosen. However, the influence from different environments would cause uncontrollable quality of RNG. To be good in statistical test result, the digital RNG is chosen. Thus the random outputs are generated from the iterative computations of the chosen equation with good statistical feature, and the outputs are working on the deterministic curve. A good statistical result depends on the chosen equation and on the highly precise digital operation. In this thesis, a chaos-based RNG for a shorter bit length of 32 in pure digital environment with pseudo noise influenced is proposed. Once the pre-decided timing (ranged from 600 to 800 in this work) arrives, some of the least significant bits would be set to fixed values called the pseudo noises and feedback to the chaos equation operated. In the algorithm implemented, the proposed RNG would have the analog and digital feature simultaneously. By tuning the timing of reseeding, an acceptable quality of randomness is obtained without operating in hi-precise digital operation, exclusive-or gates or the parity filter to scramble the output.
Huang, Chih Ming, i 黃志銘. "Pseudo Random Number Generator with On-Line Testing Scheme using Carry-Lookahead Parity Prediction". Thesis, 2015. http://ndltd.ncl.edu.tw/handle/r8nn72.
Pełny tekst źródłaLai, Hane-Ru, i 賴漢儒. "An Alternate Twofish Cipher with Variable S-boxes Sequence Determined by a Pseudo-Random Number Generator". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/49052053040191068843.
Pełny tekst źródła國立臺北大學
通訊工程研究所
94
Encryption/Decryption is the key technique in the study of Information Security and Cryptography. Twofish, a 128-bit block cipher with a variable-length of the key up to 256 bits, is one of the five final candidates of the Advanced Encryption Standard (AES). Twofish is a 128-bit symmetric block cipher based on the structure of the Feistel network. Twofish cipher consists of 16 round operations each with a bijective F function to ensure maximum security. In each round, four key-dependent 8×8 S-boxes, a fixed 4×4 Maximal Distance Separable Matrix (MDS) over GF(28), a pseudo-Hadamard transformation, and some bit-rotation operations are applied for the effect of confusion and diffusion. In this thesis, the purpose of our study is to investigate the change in the S-boxes of Twofish. For the random change of the S-box sequence, we propose a clock-controlled key generator of the stream cipher which is used to as a combinational generator to increase the complexity of the linear attack and differential attack. In the design of S-boxes, we consider cryptographic criteria such as 0-1 balance, nonlinearity, uniformly differential distribution, propagation criterion and avalanche criterion, etc. In the pseudo-random number generator, we design two independent combinational generators based on linear feedback shift registers (LFSRs). The output sequence of one combinational generator is used as the clock signal to control the output sequence of the other combinational generator, in order to generate a more complex pseudo-random number sequence. In addition to maximize the period of the output sequence of each linear feedback shift register, we also analyze cryptographic characteristics of the combinational function such as 0-1 balance, nonlinearity, correlation immunity, algebraic degree, etc.