Open Science Research Excellence

Open Science Index

Commenced in January 2007 Frequency: Monthly Edition: International Publications Count: 31242

Select areas to restrict search in scientific publication database:
Deterministic Random Number Generator Algorithm for Cryptosystem Keys
One of the crucial parameters of digital cryptographic systems is the selection of the keys used and their distribution. The randomness of the keys has a strong impact on the system’s security strength being difficult to be predicted, guessed, reproduced, or discovered by a cryptanalyst. Therefore, adequate key randomness generation is still sought for the benefit of stronger cryptosystems. This paper suggests an algorithm designed to generate and test pseudo random number sequences intended for cryptographic applications. This algorithm is based on mathematically manipulating a publically agreed upon information between sender and receiver over a public channel. This information is used as a seed for performing some mathematical functions in order to generate a sequence of pseudorandom numbers that will be used for encryption/decryption purposes. This manipulation involves permutations and substitutions that fulfill Shannon’s principle of “confusion and diffusion”. ASCII code characters were utilized in the generation process instead of using bit strings initially, which adds more flexibility in testing different seed values. Finally, the obtained results would indicate sound difficulty of guessing keys by attackers.
Digital Object Identifier (DOI):


[1] B. Schneier, “Applied cryptography: protocols, algorithms, and source code in C,” Second Edition, John Wiley & Sons, 1996.
[2] D. Dilli, Madhu S., “Design of a New Cryptography Algorithm using Reseeding -Mixing Pseudo Random Number Generator,” IJITEE, vol. 52, No. 5, 2013
[3] K. Marton, A. Suciu, C. Sacarea, and Octavian Cret, “Generation and Testing of Random Numbers for Cryptographic Applications,” Proceedings of the Ramanian Academy, Series A, Vol. 13, No. 4, 2012, PP 368–377.
[4] S. Martain, “Testing of True Random Number Generator Used in Cryptography,”International Journal of Computer Applications IJCA, Vol.2, No. 4, 2012.
[5] Wikipedia, “Pseudorandom number generator”, Last visited December 2014.
[6] D. Dilli, and S. Madhu, “Design of a New Cryptography Algorithm using Reseeding -Mixing Pseudo Random Number Generator,” IJITEE, vol. 52, no. 5, 2013.
[7] A. Rukhin, J. Soto, J. Nechvatal, M. Smid, E. Barker, S. Leigh, M. Levenson, M. Vangel, D. Banks, A. Heckert, J. Dray, and S. Vo, “A Statistical Test Suite for Random and Pseudorandom Generators for Cryptographic Application,” NIST Special Publication 800-22, 2001.
[8] P. Burns, “Lagged, Fibonacci Random Number Generators”, GS 510, fall 2004,
[9] A. B. Orue, F. Montoya, and L. H. Encinas, “Trifork, a New Pseudorandom Number Generator Based on Lagged Fibonacci Maps,” Journal of Computer Science and Engineering, vol. 1, no. 10, 2010.
[10] (Randomness and Integrity Service LTD),
[11], Last visited 3/1/2015.
[12] F. W. Burton, and R. L. Page, “Distributed random number generation”, Journal of Functional Program, vol. 2, no. 2, 1992, PP 203–212.
[13] K. Claessen, and M. Palka, "Splittable Pseudorandom Number Generators using Cryptographic Hashing," Proceedings of Haskell Symposium, 2013, PP 47-58.
[14] J. M. Bahi, and C. Guyeux, “Topological chaos and chaotic iterations, application to hash functions,” IEEE World Congress on Computational Intelligence WCCI’, Barcelona, Spain, July 2010. Best paper award, PP 1–7,
[15] J. Bahi, C. Guyeux, and Q. Wang, “A novel pseudo-random generator based on discrete chaotic iterations,” INTERNET’09, 1-st International conference on Evolving Internet, Cannes, France, August 2009, PP 71– 76.
[16] J. Bahi, C. Guyeux, and Qianxue Wang, ”A pseudo random numbers generator based on chaotic iterations; Application to watermarking,” International conference on Web Information Systems and Mining, WISM 2010, vol. 6318 of LNCS, Sanya, China, October 2010, PP 202– 211.
[17] Y. Hu, X. Liao, K. W. Wong, and Qing Zhou, “A true random number generator based on mouse movement and chaotic cryptography,” Chaos, Solitons & Fractals, vol.40, no. 5, 2009, PP 2286–2293.
[18] L. De Micco, C. M. Gonzaez, H.A. Larrondo, M.T. Martin, A. Plastino, and O.A. Rosso, “Randomizing nonlinear maps via symbolic dynamics,” Physica A: Statistical Mechanics and its Applications, vol. 387, no. 14, 2008, PP 3373–3383.
[19] L. Larger, and J. M. Dudley, “Nonlinear dynamics Optoelectronic chaos,” Nature, vol. 465, no. 7294, 2010, PP 41–42.
[20] Q. Wang, J. Bahi, C. Guyeux, and X. Fang, “Randomness quality of CI chaotic generators; application to internet security,” INTERNET’2010. The 2nd International Conference on Evolving Internet, Valencia, Spain, September 2010. IEEE Computer Society Press. Best Paper award, PP 125–130.
[21] H. B. Neumann, S. Scholze, and M. Voegeler, “Method of generating pseudo-random numbers,” US 20090150467 A1 , Jun 11, 2009.
[22] M. N. Elsherbeny, and M. Raha, “Pseudo –Random Number Generator Using Deterministic Chaotic System,” International Journal of Scientific and Technology Research,” vol. 1, no. 9, Oct. 2012.
[23] S. Behnia, A. Akhavan, A. Akhshani, and A.Samsudin, “A novel dynamic model of pseudo random number generator,” Journal of Computational and Applied Mathematics –J COMPUT APPL MATH, vol. 235, no. 12, 2011, PP 3455-3463.
[24] W. Bhaya and W. Mahdi, “ Fingerprint Security Approach for Information Exchange on Networks,” European Journal of Scientific Research, vol. 123, no 2, 2014, PP 169-181.
Vol:15 No:05 2021Vol:15 No:04 2021Vol:15 No:03 2021Vol:15 No:02 2021Vol:15 No:01 2021
Vol:14 No:12 2020Vol:14 No:11 2020Vol:14 No:10 2020Vol:14 No:09 2020Vol:14 No:08 2020Vol:14 No:07 2020Vol:14 No:06 2020Vol:14 No:05 2020Vol:14 No:04 2020Vol:14 No:03 2020Vol:14 No:02 2020Vol:14 No:01 2020
Vol:13 No:12 2019Vol:13 No:11 2019Vol:13 No:10 2019Vol:13 No:09 2019Vol:13 No:08 2019Vol:13 No:07 2019Vol:13 No:06 2019Vol:13 No:05 2019Vol:13 No:04 2019Vol:13 No:03 2019Vol:13 No:02 2019Vol:13 No:01 2019
Vol:12 No:12 2018Vol:12 No:11 2018Vol:12 No:10 2018Vol:12 No:09 2018Vol:12 No:08 2018Vol:12 No:07 2018Vol:12 No:06 2018Vol:12 No:05 2018Vol:12 No:04 2018Vol:12 No:03 2018Vol:12 No:02 2018Vol:12 No:01 2018
Vol:11 No:12 2017Vol:11 No:11 2017Vol:11 No:10 2017Vol:11 No:09 2017Vol:11 No:08 2017Vol:11 No:07 2017Vol:11 No:06 2017Vol:11 No:05 2017Vol:11 No:04 2017Vol:11 No:03 2017Vol:11 No:02 2017Vol:11 No:01 2017
Vol:10 No:12 2016Vol:10 No:11 2016Vol:10 No:10 2016Vol:10 No:09 2016Vol:10 No:08 2016Vol:10 No:07 2016Vol:10 No:06 2016Vol:10 No:05 2016Vol:10 No:04 2016Vol:10 No:03 2016Vol:10 No:02 2016Vol:10 No:01 2016
Vol:9 No:12 2015Vol:9 No:11 2015Vol:9 No:10 2015Vol:9 No:09 2015Vol:9 No:08 2015Vol:9 No:07 2015Vol:9 No:06 2015Vol:9 No:05 2015Vol:9 No:04 2015Vol:9 No:03 2015Vol:9 No:02 2015Vol:9 No:01 2015
Vol:8 No:12 2014Vol:8 No:11 2014Vol:8 No:10 2014Vol:8 No:09 2014Vol:8 No:08 2014Vol:8 No:07 2014Vol:8 No:06 2014Vol:8 No:05 2014Vol:8 No:04 2014Vol:8 No:03 2014Vol:8 No:02 2014Vol:8 No:01 2014
Vol:7 No:12 2013Vol:7 No:11 2013Vol:7 No:10 2013Vol:7 No:09 2013Vol:7 No:08 2013Vol:7 No:07 2013Vol:7 No:06 2013Vol:7 No:05 2013Vol:7 No:04 2013Vol:7 No:03 2013Vol:7 No:02 2013Vol:7 No:01 2013
Vol:6 No:12 2012Vol:6 No:11 2012Vol:6 No:10 2012Vol:6 No:09 2012Vol:6 No:08 2012Vol:6 No:07 2012Vol:6 No:06 2012Vol:6 No:05 2012Vol:6 No:04 2012Vol:6 No:03 2012Vol:6 No:02 2012Vol:6 No:01 2012
Vol:5 No:12 2011Vol:5 No:11 2011Vol:5 No:10 2011Vol:5 No:09 2011Vol:5 No:08 2011Vol:5 No:07 2011Vol:5 No:06 2011Vol:5 No:05 2011Vol:5 No:04 2011Vol:5 No:03 2011Vol:5 No:02 2011Vol:5 No:01 2011
Vol:4 No:12 2010Vol:4 No:11 2010Vol:4 No:10 2010Vol:4 No:09 2010Vol:4 No:08 2010Vol:4 No:07 2010Vol:4 No:06 2010Vol:4 No:05 2010Vol:4 No:04 2010Vol:4 No:03 2010Vol:4 No:02 2010Vol:4 No:01 2010
Vol:3 No:12 2009Vol:3 No:11 2009Vol:3 No:10 2009Vol:3 No:09 2009Vol:3 No:08 2009Vol:3 No:07 2009Vol:3 No:06 2009Vol:3 No:05 2009Vol:3 No:04 2009Vol:3 No:03 2009Vol:3 No:02 2009Vol:3 No:01 2009
Vol:2 No:12 2008Vol:2 No:11 2008Vol:2 No:10 2008Vol:2 No:09 2008Vol:2 No:08 2008Vol:2 No:07 2008Vol:2 No:06 2008Vol:2 No:05 2008Vol:2 No:04 2008Vol:2 No:03 2008Vol:2 No:02 2008Vol:2 No:01 2008
Vol:1 No:12 2007Vol:1 No:11 2007Vol:1 No:10 2007Vol:1 No:09 2007Vol:1 No:08 2007Vol:1 No:07 2007Vol:1 No:06 2007Vol:1 No:05 2007Vol:1 No:04 2007Vol:1 No:03 2007Vol:1 No:02 2007Vol:1 No:01 2007