Search engine for discovering works of Art, research articles, and books related to Art and Culture
ShareThis
Javascript must be enabled to continue!

Overview of Randomness Test on Cryptographic Algorithms

View through CrossRef
Abstract Randomness is an important research topic in the field of information security, especially in cryptography. Randomness test techniques are used to examine the quality of random numbers so that they meet the requirements of the application. The randomness of cryptographic algorithms is one of the key concerns in the algorithm design. People have put forward different standards and test requirements for the randomness of cryptographic algorithms, as well as developed corresponding randomness test kits. This paper analyzes the randomness test technologies of cryptographic algorithms and the general randomness test methods, and compares them on this basis. At the end, the actual application scenarios to apply these randomness test methods are discussed.
Title: Overview of Randomness Test on Cryptographic Algorithms
Description:
Abstract Randomness is an important research topic in the field of information security, especially in cryptography.
Randomness test techniques are used to examine the quality of random numbers so that they meet the requirements of the application.
The randomness of cryptographic algorithms is one of the key concerns in the algorithm design.
People have put forward different standards and test requirements for the randomness of cryptographic algorithms, as well as developed corresponding randomness test kits.
This paper analyzes the randomness test technologies of cryptographic algorithms and the general randomness test methods, and compares them on this basis.
At the end, the actual application scenarios to apply these randomness test methods are discussed.

Related Results

A comprehensive review of post-quantum cryptography: Challenges and advances
A comprehensive review of post-quantum cryptography: Challenges and advances
One of the most crucial measures to maintain data security is the use of cryptography schemes and digital signatures built upon cryptographic algorithms. The resistance of cryptogr...
Complexity Theory
Complexity Theory
The workshop Complexity Theory was organised by Joachim von zur Gathen (Bonn), Oded Goldreich (Rehovot), Claus-Peter Schnorr (Frankfurt), and Madhu Sudan ...
A NEW PROPOSED LIGHTWEIGHT CIPHER
A NEW PROPOSED LIGHTWEIGHT CIPHER
Modern cryptography algorithm development has favored hardware optimization in computer systems. This is especially important for fitting cryptographic protocols onto devices with ...
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
POTENTIAL APPLICATION OF HARDWARE PROTECTED SYMMETRIC AUTHENTICATION MICROCIRCUITS TO ENSURE THE SECURITY OF INTERNET OF THINGS
The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic m...
Factorial number system for nonlinear substitutions generation
Factorial number system for nonlinear substitutions generation
Modern cryptographic applications use cryptographic algorithms with a symmetric key. They provide high conversion rates and resistance to crypto-graphic attacks. To complicate the ...
Randomness as the Security Levels of Investments
Randomness as the Security Levels of Investments
We propose to use the degree of randomness of high frequency price time series for the purpose of measuring the security levels of stock investments. We employ the RMT-test (quanti...
Bell inequalities for device-independent protocols
Bell inequalities for device-independent protocols
The technological era that we live in is sometimes described as the Information Age. Colossal amounts of data are generated every day and considerable effort is put into creating t...
Evolution of Cryptographic Algorithms and Performance Parameters
Evolution of Cryptographic Algorithms and Performance Parameters
Internet and networks applications are growing very fast. Most of confidential data is circulated through networks as electronic data for achieving faster communication. In data co...

Back to Top