The current article statistically analyzes several PRNG for well-known high-speed stream ciphers. The study focuses on frequency detection, uniformity distribution alongside with randomization in the generated sequence. The purpose of this work is to show if there is a signature left by these PRNG in theirs produced sequence. In addition, the work compares these PRNG to indicate which is the safest against statistical cryptanalysis.
HarmouchY. and El KouchR., A fair comparison between several ciphers in characteristics, safety and speed test, Europe and MENA Cooperation Advances in Information and Communication Technologies, Springer, (2017), 535–547.
2.
BanegasG., Attacks in stream ciphers: A survey, IACR Cryptology ePrint Archive (2014), 677.
3.
GershoA. and GrayR.M., Vector quantization and signal compression (Vol. 159), Springer Science & Business Media.
4.
WuH., Cryptanalysis and design of stream ciphers, (2008).
5.
DaneshgarA. and MohebbipoorF., A secure self-synchro- nized stream cipher, arXiv preprint arXiv:170908613. (2017).
6.
EasonG. et al., The RC4 encryption algorithm, RSA Data Security (1992).
MaximovA. et al., An improved correlation attack on A5/1, International Workshop on Selected Areas in Cryptography, Springer, (2004), 1–18.
9.
GoldbergI. et al., The real-time cryptanalysis of A5/2, Rump session of Crypto (1999), 239–255.
10.
FergusonN. et al., Helix: Fast encryption and authentication in a single cryptographic primitive, International Workshop on Fast Software Encryption, Springer, (2003), 330–346.
11.
JenkinsR.J., Isaac, International Workshop on Fast Software Encryption, Springer, (1996), 41–49.
12.
WatanabeD. et al., A new keystream generator MUGI, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences87(1) (2004), 37–45.
13.
WhitingD. et al., Fast encryption and authentication in a single cryptographic primitive, ECRYPT Stream Cipher Project Report27(200) (2005), 5.
14.
BernsteinD.J., ChaCha, a variant of Salsa20, Workshop Record of SASC8 (2008), 3–5.
15.
WuH., The stream cipher HC-128, New Stream Cipher Designs, Lecture Notes in Computer Science, Springer, 4986 (2008).
16.
WuH., A new stream cipher HC-256, International Workshop on Fast Software Encryption, Springer, (2004), 226–244.
17.
DaemenJ. and ClappC., Fast hashing and stream encryption with PANAMA, International Workshop on Fast Software Encryption, Springer, (1998), 60–74.
18.
BoesgaardM. et al., Rabbit: A new high-performance stream cipher, International Workshop on Fast Software Encryption, Springer, (2003), 307–329.
19.
BerbainC.et al., Sosemanuk a fast software-oriented stream cipher, New Stream Cipher Designs, Springer, (2008), 98–118.
20.
BernsteinD.J., The salsa20 family of stream ciphers, New Stream Cipher Designs, Springer, (2008), 84-97.
21.
RogawayP. and CoppersmithD., A software-optimized encryption algorithm, Journal of Cryptology11(4) (1998), 273–287.
22.
WheelerD.J., A bulk data encryption algorithm, International Workshop on Fast Software Encryption, Springer, (1993), 127–134.
23.
GilbertH., The security of one-block-to-many modes of operation, International Workshop on Fast Software Encryption, Springer, (2003), 376–395.
24.
FIPS 81, DES modes of operation, U.S. Federal Information Processing Standards Publication, Department of Commerce/National Bureau of Standards, (1980).
25.
NIST SP 800-38A, Recommendation for block cipher modes of operation, NIST Special Publication 800-38A, (2001).
26.
ISO/IEC 10116, Information technology-security techniques-modes of operation for an n-bit block cipher, International Organization for Standardization, (1997).
27.
KoblitzN., A course in number theory and cryptography, Springer Science & Business Media114 (2012).
BluetoothS.I.G., Specification of the bluetooth system, Version 1.1, (2001).
30.
PekdahlP. and JohanssonT., A new version of the stream cipher SNOW, International Workshop on Selected Areas in Cryptography, Springer, (2002), 47–61.
31.
ArnaultF. and BergerT.P., F-FCSR: Design of a new class of stream ciphers, International Workshop on Fast Software Encryption, Springer, (2005), 83–97.
32.
KlapperA. and GoreskyM., Feedback shift registers 2-adic span and combiners with memory, Journal of Cryptology10(2) (1997), 111–147.
33.
KlimovA. and ShamirA., A new class of invertible mappings, International Workshop on Cryptographic Hardware and Embedded Systems, Springer, (2002), 470–483.
34.
KlimovA. and ShamirA., Cryptographic applications of T-functions, International Workshop on Selected Areas in Cryptography, Springer, (2003), 248–261.
35.
KangJ. et al., Distinguishing attack on SDDO-based block cipher BMD-128, Ubiquitous Information Technologies and Applications, Springer, (2014), 595–602.
36.
MenezesA.J. et al., The Handbook of Applied Cryptography, Fifth Printing, CRC Press, 2001.
37.
D’AgostinoR.B., Tests for the normal distribution Goodness-of-fit techniques, (1986), 367–419.
38.
MaurerU.M., A universal statistical test for random bit generators, Journal of Cryptology5(2) (1992), 89–105.
39.
KnuthD.E., The art of computer programming, Semi Numerical Algorithms, Addison Wesley, 2 (1969).
40.
GolombS.W., Shift register sequences, Aegean Park Press, 1982.
41.
NIST SP 800-22, A Statistical test suite for the Validation of random number generators and pseudo random number generators for cryptographic applications, (2000).
42.
MarsagliaG., The marsaglia random number CDROM including the diehard battery of tests of randomness, Florida State University, 1995.
43.
CaelliW. et al., CRYPT-X stastical package manual-measuring the strength of stream and block ciphers, Queensland Univeristy of Technology, 1992.
44.
GérardB., Cryptanalyses statistiques des algorithmes de chiffrement à clef secrète, Ph.D. Dissertation, Université Pierre et Marie Curie-Paris VI, 2010.
45.
JunodP., Statistical cryptanalysis of block ciphers, (2005).
46.
WiegoldJ., Cipher systems: The protection of communications, (1983).
47.
KlimaR. et al., Applications of abstract algebra with Maple and MATLAB, CRC Press, (2006).
48.
CochranD., For Whose Eyes Only? Cryptanalysis and Frequency Analysis, Department of Mathematics, US Military Academy.
49.
GanesanR. and ShermanA.T., Statistical techniques for language recognition: An introduction and guide for cryptanalysts, Cryptologia17(4) (1993), 321–366.
50.
L’EcuyerP. and SimardR., TestU01: AC library for empirical testing of random number generators, ACM Transactions on Mathematical Software 33(4) (2007), 22.
51.
HarmouchY. and El KouchR., A statistical analysis for high-speed stream ciphers, International Conference on Innovations in Bio-Inspired Computing and Applications, Springer, (2017), 339–349.
52.
BekerH. and PiperF., Cipher systems: The protection of communications, Northwood Books, 1982.
53.
HaoL. and MinL., Statistical tests and chaotic synchronization based pseudorandom number generator for string bit sequences with application to image encryption, The European Physical Journal Special Topics223(8) (2014), 1679–1697.
54.
FIPS PUB 140-2, Security requirements for cryptographic modules, NIST, (2007).