Project information
Cryptographic random and pseudo-random number generators
- Project Identification
- GA102/06/0711
- Project Period
- 1/2006 - 12/2008
- Investor / Pogramme / Project type
-
Czech Science Foundation
- Standard Projects
- MU Faculty or unit
- Faculty of Informatics
- Keywords
- cryptography, random number, pseudorandom number, generator, biometrics, statistical test
A vast majority of cryptographic/security solutions in the area of information technology depends on the quality of secret data called (cryptographic) keys that based on random numbers. There is a substantial difference between random numbers used for cryptographic and other, e.g. simulation, purposes, and the area of (pseudo)random number generation is one of the most active areas of cryptography and security research. Truly random sequences are extremely difficult to generate in computing environments, namely when considering the (expected) deterministic behaviour of computer systems. Thus we often restrict ourselves to the use of (deterministic) pseudorandom sequences instead. Such sequences should not be distinguishable from truly random sequences, and are generated from (typically shorter) inputs that should be of a random nature. This project focuses on the following three areas: (1)Definition of properties for mechanisms usable for cryptographic pseudorandom number generation, (2) analysis of options for generating truly random sequences in the mobile environment, with the vision of providing a unique comprehensive review of currently used options for random sequence generation, (3) review of properties of sequences that can be generated from biometric data, where we aim to investigate a completely novel use of biometric data.
Publications
Total number of publications: 37
2008
-
Autorizace elektronických transakcí a autentizace dat i uživatelů
Year: 2008, edition: Vyd. 1., number of pages: 128 s.
-
Biometrie a identita člověka - ve forenzních a komerčních aplikacích
Year: 2008, number of pages: 664 s.
-
Generating random numbers in hostile environments
16th Security Protocols Workshop, year: 2008
-
Generating Random Sequences from Fingerprints
2008 Workshop on Mathematical and Engineering Methods in Computer Science, year: 2008
-
Information Security Summit 2008 - Towards an Electronic Society
Year: 2008, type:
-
On security and crypto issues of e-passports
MKB 2008, year: 2008
-
Typosquatting aneb zneužívání překlepů
DSM, year: 2008, volume: XII, edition: 2
2007
-
Autentizace uživatelů a autorizace elektronických transakcí
Year: 2007, number of pages: 318 s.
-
Authenticated Key Exchange with Group Support for Wireless Sensor Networks
The 3rd Wireless and Sensor Network Security Workshop; 4th IEEE International Conference on Mobile Ad-hoc and Sensor Systems, year: 2007
-
Automatic Construction of Secrecy Amplification Protocols
MEMICS 2007 Proceedings, year: 2007