Project information
Cryptographic random and pseudo-random number generators
- Project Identification
- GA102/06/0711
- Project Period
- 1/2006 - 12/2008
- Investor / Pogramme / Project type
-
Czech Science Foundation
- Standard Projects
- MU Faculty or unit
- Faculty of Informatics
- Keywords
- cryptography, random number, pseudorandom number, generator, biometrics, statistical test
A vast majority of cryptographic/security solutions in the area of information technology depends on the quality of secret data called (cryptographic) keys that based on random numbers. There is a substantial difference between random numbers used for cryptographic and other, e.g. simulation, purposes, and the area of (pseudo)random number generation is one of the most active areas of cryptography and security research. Truly random sequences are extremely difficult to generate in computing environments, namely when considering the (expected) deterministic behaviour of computer systems. Thus we often restrict ourselves to the use of (deterministic) pseudorandom sequences instead. Such sequences should not be distinguishable from truly random sequences, and are generated from (typically shorter) inputs that should be of a random nature. This project focuses on the following three areas: (1)Definition of properties for mechanisms usable for cryptographic pseudorandom number generation, (2) analysis of options for generating truly random sequences in the mobile environment, with the vision of providing a unique comprehensive review of currently used options for random sequence generation, (3) review of properties of sequences that can be generated from biometric data, where we aim to investigate a completely novel use of biometric data.
Publications
Total number of publications: 37
2020
-
Detection of Algorithmically Generated Domain Names in Botnets
Advanced Information Networking and Applications, AINA 2019, year: 2020
2011
-
Generating Random Numbers in Hostile Environments
Security Protocols XVI - 16th International Workshop, Revised Selected Papers, year: 2011
-
Security Protocols XVI - 16th International Workshop, Revised Selected Papers
Year: 2011, type:
2009
-
Authenticated Key Exchange with Group Support for Wireless Sensor Networks
From Problem to Solution: Wireless Sensor Networks Security, year: 2009, number of pages: 23 s.
-
Biometriky a generování klíčového materiálu
Data Security Management, year: 2009, volume: XIII, edition: 3
-
Evolutionary Design of Secrecy Amplification Protocols for Wireless Sensor Networks
Proceedings of the second ACM conference on Wireless network security, year: 2009
-
Generating Random and Pseudorandom Sequences in Mobile Devices
Security and Privacy in Mobile Information and Communication Systems, LNICST, year: 2009
-
Náhodná data generovaná v mobilních zařízeních
DSM, year: 2009, volume: XIII, edition: 4
-
Towards True Random Number Generation in Mobile Environments
LNCS 5838, Identity and Privacy in the Internet Age, year: 2009
2008
-
Authorizing Card Payments with PINs
Computer, year: 2008, volume: 41, edition: 2