A comparative Study to calculate the Runs Property in the encryption systems
Cryptographic applications demand much more of a pseudo-random-sequence generator than do most other applications. Cryptographic randomness does not mean just statistical randomness, although that is part of it. For a sequence to be cryptographically secure pseudo-random, it must be unpredictable....
Main Author: | |
---|---|
Format: | Article |
Language: | Arabic |
Published: |
College of Education for Women
2019-02-01
|
Series: | مجلة كلية التربية للبنات |
Online Access: | http://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/884 |
id |
doaj-88fb8a9aef2a42ec8c0fa11f0fabb3ab |
---|---|
record_format |
Article |
spelling |
doaj-88fb8a9aef2a42ec8c0fa11f0fabb3ab2020-11-25T03:29:23ZaraCollege of Education for Womenمجلة كلية التربية للبنات1680-87382663-547X2019-02-01254A comparative Study to calculate the Runs Property in the encryption systemsایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن Cryptographic applications demand much more of a pseudo-random-sequence generator than do most other applications. Cryptographic randomness does not mean just statistical randomness, although that is part of it. For a sequence to be cryptographically secure pseudo-random, it must be unpredictable. The random sequences should satisfy the basic randomness postulates; one of them is the run postulate (sequences of the same bit). These sequences should have about the same number of ones and zeros, about half the runs should be of length one, one quarter of length two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones should be the same. These properties can be measured deterministicallyand then compared to statistical expectations using a chi-square test. In this paper the Run Criterion, is calculated, it can be calculated for any key generator before it be implemented or constructed (software or hardware).The cryptosystems: Linear, Product and Brüer are chosen as study cases. http://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/884 |
collection |
DOAJ |
language |
Arabic |
format |
Article |
sources |
DOAJ |
author |
ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن |
spellingShingle |
ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن A comparative Study to calculate the Runs Property in the encryption systems مجلة كلية التربية للبنات |
author_facet |
ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن |
author_sort |
ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن |
title |
A comparative Study to calculate the Runs Property in the encryption systems |
title_short |
A comparative Study to calculate the Runs Property in the encryption systems |
title_full |
A comparative Study to calculate the Runs Property in the encryption systems |
title_fullStr |
A comparative Study to calculate the Runs Property in the encryption systems |
title_full_unstemmed |
A comparative Study to calculate the Runs Property in the encryption systems |
title_sort |
comparative study to calculate the runs property in the encryption systems |
publisher |
College of Education for Women |
series |
مجلة كلية التربية للبنات |
issn |
1680-8738 2663-547X |
publishDate |
2019-02-01 |
description |
Cryptographic applications demand much more of a pseudo-random-sequence
generator than do most other applications. Cryptographic randomness does not mean just
statistical randomness, although that is part of it. For a sequence to be cryptographically
secure pseudo-random, it must be unpredictable.
The random sequences should satisfy the basic randomness postulates; one of them is
the run postulate (sequences of the same bit). These sequences should have about the same
number of ones and zeros, about half the runs should be of length one, one quarter of length
two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones
should be the same. These properties can be measured deterministicallyand then compared to
statistical expectations using a chi-square test.
In this paper the Run Criterion, is calculated, it can be calculated for any key generator
before it be implemented or constructed (software or hardware).The cryptosystems: Linear,
Product and Brüer are chosen as study cases.
|
url |
http://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/884 |
work_keys_str_mv |
AT ạyạdgẖạzynạṣrạlsẖmryʿạmrʿbdạlmjydʿbdạlrḥmn acomparativestudytocalculatetherunspropertyintheencryptionsystems AT ạyạdgẖạzynạṣrạlsẖmryʿạmrʿbdạlmjydʿbdạlrḥmn comparativestudytocalculatetherunspropertyintheencryptionsystems |
_version_ |
1724579552104022016 |