L 07png
L 07png
L 07png
Number Generation
and Stream Ciphers
Raj Jain
Washington University in Saint Louis
Saint Louis, MO 63130
Jain@cse.wustl.edu
Audio/Video recordings of this lecture are available at:
http://www.cse.wustl.edu/~jain/cse571-11/
Washington University in St. Louis CSE571S ©2011 Raj Jain
7-1
Overview
These slides are based on Lawrie Brown’s slides supplied with William Stalling’s
book “Cryptography and Network Security: Principles and Practice,” 5th Ed, 2011.
Washington University in St. Louis CSE571S ©2011 Raj Jain
7-2
Pseudo Random Numbers
Many uses of random numbers in cryptography
nonces in authentication protocols to prevent replay
keystream for a one-time pad
These values should be
statistically random, uniform distribution, independent
unpredictability of future values from previous values
True random numbers provide this
Psuedo Deterministic, reproducible, generated by a formula
For example,
Equivalently,
a = multiplier
m = modulus
Date/Time
Next Seed
Seed
Random Stream