A comparative Study to calculate the Runs Property in the encryption systems

Cryptographic applications demand much more of a pseudo-random-sequence generator than do most other applications. Cryptographic randomness does not mean just statistical randomness, although that is part of it. For a sequence to be cryptographically secure pseudo-random, it must be unpredictable....

Full description

Bibliographic Details
Main Author: ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن
Format: Article
Language:Arabic
Published: College of Education for Women 2019-02-01
Series:مجلة كلية التربية للبنات
Online Access:http://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/884
id doaj-88fb8a9aef2a42ec8c0fa11f0fabb3ab
record_format Article
spelling doaj-88fb8a9aef2a42ec8c0fa11f0fabb3ab2020-11-25T03:29:23ZaraCollege of Education for Womenمجلة كلية التربية للبنات1680-87382663-547X2019-02-01254A comparative Study to calculate the Runs Property in the encryption systemsایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن Cryptographic applications demand much more of a pseudo-random-sequence generator than do most other applications. Cryptographic randomness does not mean just statistical randomness, although that is part of it. For a sequence to be cryptographically secure pseudo-random, it must be unpredictable. The random sequences should satisfy the basic randomness postulates; one of them is the run postulate (sequences of the same bit). These sequences should have about the same number of ones and zeros, about half the runs should be of length one, one quarter of length two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones should be the same. These properties can be measured deterministicallyand then compared to statistical expectations using a chi-square test. In this paper the Run Criterion, is calculated, it can be calculated for any key generator before it be implemented or constructed (software or hardware).The cryptosystems: Linear, Product and Brüer are chosen as study cases. http://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/884
collection DOAJ
language Arabic
format Article
sources DOAJ
author ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن
spellingShingle ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن
A comparative Study to calculate the Runs Property in the encryption systems
مجلة كلية التربية للبنات
author_facet ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن
author_sort ایاد غازي ناصر الشمري عامر عبد المجید عبد الرحمن
title A comparative Study to calculate the Runs Property in the encryption systems
title_short A comparative Study to calculate the Runs Property in the encryption systems
title_full A comparative Study to calculate the Runs Property in the encryption systems
title_fullStr A comparative Study to calculate the Runs Property in the encryption systems
title_full_unstemmed A comparative Study to calculate the Runs Property in the encryption systems
title_sort comparative study to calculate the runs property in the encryption systems
publisher College of Education for Women
series مجلة كلية التربية للبنات
issn 1680-8738
2663-547X
publishDate 2019-02-01
description Cryptographic applications demand much more of a pseudo-random-sequence generator than do most other applications. Cryptographic randomness does not mean just statistical randomness, although that is part of it. For a sequence to be cryptographically secure pseudo-random, it must be unpredictable. The random sequences should satisfy the basic randomness postulates; one of them is the run postulate (sequences of the same bit). These sequences should have about the same number of ones and zeros, about half the runs should be of length one, one quarter of length two, one eighth of length three, and so on.The distribution of run lengths for zeros and ones should be the same. These properties can be measured deterministicallyand then compared to statistical expectations using a chi-square test. In this paper the Run Criterion, is calculated, it can be calculated for any key generator before it be implemented or constructed (software or hardware).The cryptosystems: Linear, Product and Brüer are chosen as study cases.
url http://jcoeduw.uobaghdad.edu.iq/index.php/journal/article/view/884
work_keys_str_mv AT ạyạdgẖạzynạṣrạlsẖmryʿạmrʿbdạlmjydʿbdạlrḥmn acomparativestudytocalculatetherunspropertyintheencryptionsystems
AT ạyạdgẖạzynạṣrạlsẖmryʿạmrʿbdạlmjydʿbdạlrḥmn comparativestudytocalculatetherunspropertyintheencryptionsystems
_version_ 1724579552104022016