Random Number Generation and Quasi-Monte Carlo ∗
Total Page:16
File Type:pdf, Size:1020Kb

Load more
Recommended publications
-
Sensor-Seeded Cryptographically Secure Random Number Generation
International Journal of Recent Technology and Engineering (IJRTE) ISSN: 2277-3878, Volume-8 Issue-3, September 2019 Sensor-Seeded Cryptographically Secure Random Number Generation K.Sathya, J.Premalatha, Vani Rajasekar Abstract: Random numbers are essential to generate secret keys, AES can be executed in various modes like Cipher initialization vector, one-time pads, sequence number for packets Block Chaining (CBC), Cipher Feedback (CFB), Output in network and many other applications. Though there are many Feedback (OFB), and Counter (CTR). Pseudo Random Number Generators available they are not suitable for highly secure applications that require high quality randomness. This paper proposes a cryptographically secure II. PRNG IMPLEMENTATIONS pseudorandom number generator with its entropy source from PRNG requires the seed value to be fed to a sensor housed on mobile devices. The sensor data are processed deterministic algorithm. Many deterministic algorithms are in 3-step approach to generate random sequence which in turn proposed, some of widely used algorithms are fed to Advanced Encryption Standard algorithm as random key to generate cryptographically secure random numbers. Blum-Blum-Shub algorithm uses where X0 is seed value and M =pq, p and q are prime. Keywords: Sensor-based random number, cryptographically Linear congruential Generator uses secure, AES, 3-step approach, random key where is the seed value. Mersenne Prime Twister uses range of , I. INTRODUCTION where that outputs sequence of 32-bit random Information security algorithms aim to ensure the numbers. confidentiality, integrity and availability of data that is transmitted along the path from sender to receiver. All the III. SENSOR-SEEDED PRNG security mechanisms like encryption, hashing, signature rely Some of PRNGs uses clock pulse of computer system on random numbers in generating secret keys, one time as seeds. -
Lecture 8: Key Derivation, Protecting Passwords, Slow Hashes, Merkle Trees
Lecture 8: Key derivation, protecting passwords, slow hashes, Merkle trees Boaz Barak Last lecture we saw the notion of cryptographic hash functions which are functions that behave like a random function, even in settings (unlike that of standard PRFs) where the adversary has access to the key that allows them to evaluate the hash function. Hash functions have found a variety of uses in cryptography, and in this lecture we survey some of their other applications. In some of these cases, we only need the relatively mild and well-defined property of collision resistance while in others we only know how to analyze security under the stronger (and not precisely well defined) random oracle heuristic. Keys from passwords We have seen great cryptographic tools, including PRFs, MACs, and CCA secure encryptions, that Alice and Bob can use when they share a cryptographic key of 128 bits or so. But unfortunately, many of the current users of cryptography are humans which, generally speaking, have extremely faulty memory capacity for storing large numbers. There are 628 ≈ 248 ways to select a password of 8 upper and lower case letters + numbers, but some letter/numbers combinations end up being chosen much more frequently than others. Due to several large scale hacks, very large databases of passwords have been made public, and one estimate is that the most frequent 10, 000 ≈ 214 passwords account for more than 90% of the passwords chosen. If we choose a password at random from some set D then the entropy of the password is simply log |D|. Estimating the entropy of real life passwords is rather difficult. -
A Secure Authentication System- Using Enhanced One Time Pad Technique
IJCSNS International Journal of Computer Science and Network Security, VOL.11 No.2, February 2011 11 A Secure Authentication System- Using Enhanced One Time Pad Technique Raman Kumar1, Roma Jindal 2, Abhinav Gupta3, Sagar Bhalla4 and Harshit Arora 5 1,2,3,4,5 Department of Computer Science and Engineering, 1,2,3,4,5 D A V Institute of Engineering and Technology, Jalandhar, Punjab, India. Summary the various weaknesses associated with a password have With the upcoming technologies available for hacking, there is a come to surface. It is always possible for people other than need to provide users with a secure environment that protect their the authenticated user to posses its knowledge at the same resources against unauthorized access by enforcing control time. Password thefts can and do happen on a regular basis, mechanisms. To counteract the increasing threat, enhanced one so there is a need to protect them. Rather than using some time pad technique has been introduced. It generally random set of alphabets and special characters as the encapsulates the enhanced one time pad based protocol and provides client a completely unique and secured authentication passwords we need something new and something tool to work on. This paper however proposes a hypothesis unconventional to ensure safety. At the same time we need regarding the use of enhanced one time pad based protocol and is to make sure that it is easy to be remembered by you as a comprehensive study on the subject of using enhanced one time well as difficult enough to be hacked by someone else. -
A Note on Random Number Generation
A note on random number generation Christophe Dutang and Diethelm Wuertz September 2009 1 1 INTRODUCTION 2 \Nothing in Nature is random. number generation. By \random numbers", we a thing appears random only through mean random variates of the uniform U(0; 1) the incompleteness of our knowledge." distribution. More complex distributions can Spinoza, Ethics I1. be generated with uniform variates and rejection or inversion methods. Pseudo random number generation aims to seem random whereas quasi random number generation aims to be determin- istic but well equidistributed. 1 Introduction Those familiars with algorithms such as linear congruential generation, Mersenne-Twister type algorithms, and low discrepancy sequences should Random simulation has long been a very popular go directly to the next section. and well studied field of mathematics. There exists a wide range of applications in biology, finance, insurance, physics and many others. So 2.1 Pseudo random generation simulations of random numbers are crucial. In this note, we describe the most random number algorithms At the beginning of the nineties, there was no state-of-the-art algorithms to generate pseudo Let us recall the only things, that are truly ran- random numbers. And the article of Park & dom, are the measurement of physical phenomena Miller (1988) entitled Random generators: good such as thermal noises of semiconductor chips or ones are hard to find is a clear proof. radioactive sources2. Despite this fact, most users thought the rand The only way to simulate some randomness function they used was good, because of a short on computers are carried out by deterministic period and a term to term dependence. -
Pseudorandomness and Computational Difficulty
PSEUDORANDOMNESS AND COMPUTATIONAL DIFFICULTY RESEARCH THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF SCIENCE HUGO KRAWCZYK SUBMITTED TOTHE SENATEOFTHE TECHNION —ISRAEL INSTITUTE OF TECHNOLOGY SHVAT 5750 HAIFAFEBRUARY 1990 Amis padres, AurorayBernardo, aquienes debo mi camino. ALeonor,compan˜era inseparable. ALiat, dulzuraycontinuidad. This research was carried out in the Computer Science Department under the supervision of Pro- fessor Oded Goldreich. To Oded, my deep gratitude for being both teacher and friend. Forthe innumerable hoursofstimulating conversations. Forhis invaluable encouragement and support. Iamgrateful to all the people who have contributed to this research and given me their support and help throughout these years. Special thanks to Benny Chor,Shafi Goldwasser,Eyal Kushilevitz, Jacob Ukel- son and Avi Wigderson. ToMikeLuby thanks for his collaboration in the work presented in chapter 2. Ialso wish to thank the Wolf Foundation for their generous financial support. Finally,thanks to Leonor,without whom all this would not have been possible. Table of Contents Abstract ............................. 1 1. Introduction ........................... 3 1.1 Sufficient Conditions for the Existence of Pseudorandom Generators ........ 4 1.2 The Existence of Sparse Pseudorandom Distributions . ............ 5 1.3 The Predictability of Congruential Generators ............... 6 1.4 The Composition of Zero-Knowledge Interactive-Proofs . ........... 8 2. On the Existence of Pseudorandom Generators ............... 10 2.1. Introduction .......................... 10 2.2. The Construction of Pseudorandom Generators .............. 13 2.3. Applications: Pseudorandom Generators based on Particular Intractability Assump- tions . ............................ 22 3. Sparse Pseudorandom Distributions ................... 25 3.1. Introduction .......................... 25 3.2. Preliminaries ......................... 25 3.3. The Existence of Sparse Pseudorandom Ensembles ............. 27 3.4. -
On Sampling from the Multivariate T Distribution by Marius Hofert
CONTRIBUTED RESEARCH ARTICLES 129 On Sampling from the Multivariate t Distribution by Marius Hofert Abstract The multivariate normal and the multivariate t distributions belong to the most widely used multivariate distributions in statistics, quantitative risk management, and insurance. In contrast to the multivariate normal distribution, the parameterization of the multivariate t distribution does not correspond to its moments. This, paired with a non-standard implementation in the R package mvtnorm, provides traps for working with the multivariate t distribution. In this paper, common traps are clarified and corresponding recent changes to mvtnorm are presented. Introduction A supposedly simple task in statistics courses and related applications is to generate random variates from a multivariate t distribution in R. When teaching such courses, we found several fallacies one might encounter when sampling multivariate t distributions with the well-known R package mvtnorm; see Genz et al.(2013). These fallacies have recently led to improvements of the package ( ≥ 0.9-9996) which we present in this paper1. To put them in the correct context, we first address the multivariate normal distribution. The multivariate normal distribution The multivariate normal distribution can be defined in various ways, one is with its stochastic represen- tation X = m + AZ, (1) where Z = (Z1, ... , Zk) is a k-dimensional random vector with Zi, i 2 f1, ... , kg, being independent standard normal random variables, A 2 Rd×k is an (d, k)-matrix, and m 2 Rd is the mean vector. The covariance matrix of X is S = AA> and the distribution of X (that is, the d-dimensional multivariate normal distribution) is determined solely by the mean vector m and the covariance matrix S; we can thus write X ∼ Nd(m, S). -
EFFICIENT ESTIMATION and SIMULATION of the TRUNCATED MULTIVARIATE STUDENT-T DISTRIBUTION
Efficient estimation and simulation of the truncated multivariate student-t distribution Zdravko I. Botev, Pierre l’Ecuyer To cite this version: Zdravko I. Botev, Pierre l’Ecuyer. Efficient estimation and simulation of the truncated multivariate student-t distribution. 2015 Winter Simulation Conference, Dec 2015, Huntington Beach, United States. hal-01240154 HAL Id: hal-01240154 https://hal.inria.fr/hal-01240154 Submitted on 8 Dec 2015 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. Proceedings of the 2015 Winter Simulation Conference L. Yilmaz, W. K V. Chan, I. Moon, T. M. K. Roeder, C. Macal, and M. Rosetti, eds. EFFICIENT ESTIMATION AND SIMULATION OF THE TRUNCATED MULTIVARIATE STUDENT-t DISTRIBUTION Zdravko I. Botev Pierre L’Ecuyer School of Mathematics and Statistics DIRO, Universite´ de Montreal The University of New South Wales C.P. 6128, Succ. Centre-Ville Sydney, NSW 2052, AUSTRALIA Montreal´ (Quebec),´ H3C 3J7, CANADA ABSTRACT We propose an exponential tilting method for exact simulation from the truncated multivariate student-t distribution in high dimensions as an alternative to approximate Markov Chain Monte Carlo sampling. The method also allows us to accurately estimate the probability that a random vector with multivariate student-t distribution falls in a convex polytope. -
Stochastic Simulation APPM 7400
Stochastic Simulation APPM 7400 Lesson 1: Random Number Generators August 27, 2018 Lesson 1: Random Number Generators Stochastic Simulation August27,2018 1/29 Random Numbers What is a random number? Lesson 1: Random Number Generators Stochastic Simulation August27,2018 2/29 Random Numbers What is a random number? “You mean like... 5?” Lesson 1: Random Number Generators Stochastic Simulation August27,2018 2/29 Random Numbers What is a random number? “You mean like... 5?” Formal definition from probability: A random number is a number uniformly distributed between 0 and 1. Lesson 1: Random Number Generators Stochastic Simulation August27,2018 2/29 Random Numbers What is a random number? “You mean like... 5?” Formal definition from probability: A random number is a number uniformly distributed between 0 and 1. (It is a realization of a uniform(0,1) random variable.) Lesson 1: Random Number Generators Stochastic Simulation August27,2018 2/29 Random Numbers Here are some realizations: 0.8763857 0.2607807 0.7060687 0.0826960 Density 0.7569021 . 0 2 4 6 8 10 0.0 0.2 0.4 0.6 0.8 1.0 sample Lesson 1: Random Number Generators Stochastic Simulation August27,2018 3/29 Random Numbers Here are some realizations: 0.8763857 0.2607807 0.7060687 0.0826960 Density 0.7569021 . 0 2 4 6 8 10 0.0 0.2 0.4 0.6 0.8 1.0 sample Lesson 1: Random Number Generators Stochastic Simulation August27,2018 3/29 Random Numbers Here are some realizations: 0.8763857 0.2607807 0.7060687 0.0826960 Density 0.7569021 . -
Multivariate Stochastic Simulation with Subjective Multivariate Normal
MULTIVARIATE STOCHASTIC SIMULATION WITH SUBJECTIVE MULTIVARIATE NORMAL DISTRIBUTIONS1 Peter J. Ince2 and Joseph Buongiorno3 Abstract.-In many applications of Monte Carlo simulation in forestry or forest products, it may be known that some variables are correlated. However, for simplicity, in most simulations it has been assumed that random variables are independently distributed. This report describes an alternative Monte Carlo simulation technique for subjectivelyassessed multivariate normal distributions. The method requires subjective estimates of the 99-percent confidence interval for the expected value of each random variable and of the partial correlations among the variables. The technique can be used to generate pseudorandom data corresponding to the specified distribution. If the subjective parameters do not yield a positive definite covariance matrix, the technique determines minimal adjustments in variance assumptions needed to restore positive definiteness. The method is validated and then applied to a capital investment simulation for a new papermaking technology.In that example, with ten correlated random variables, no significant difference was detected between multivariate stochastic simulation results and results that ignored the correlation. In general, however, data correlation could affect results of stochastic simulation, as shown by the validation results. INTRODUCTION MONTE CARLO TECHNIQUE Generally, a mathematical model is used in stochastic The Monte Carlo simulation technique utilizes three simulation studies. In addition to randomness, correlation may essential elements: (1) a mathematical model to calculate a exist among the variables or parameters of such models.In the discrete numerical result or outcome as a function of one or case of forest ecosystems, for example, growth can be more discrete variables, (2) a sequence of random (or influenced by correlated variables, such as temperatures and pseudorandom) numbers to represent random probabilities, and precipitations. -
Cryptanalysis of the Random Number Generator of the Windows Operating System
Cryptanalysis of the Random Number Generator of the Windows Operating System Leo Dorrendorf School of Engineering and Computer Science The Hebrew University of Jerusalem 91904 Jerusalem, Israel [email protected] Zvi Gutterman Benny Pinkas¤ School of Engineering and Computer Science Department of Computer Science The Hebrew University of Jerusalem University of Haifa 91904 Jerusalem, Israel 31905 Haifa, Israel [email protected] [email protected] November 4, 2007 Abstract The pseudo-random number generator (PRNG) used by the Windows operating system is the most commonly used PRNG. The pseudo-randomness of the output of this generator is crucial for the security of almost any application running in Windows. Nevertheless, its exact algorithm was never published. We examined the binary code of a distribution of Windows 2000, which is still the second most popular operating system after Windows XP. (This investigation was done without any help from Microsoft.) We reconstructed, for the ¯rst time, the algorithm used by the pseudo- random number generator (namely, the function CryptGenRandom). We analyzed the security of the algorithm and found a non-trivial attack: given the internal state of the generator, the previous state can be computed in O(223) work (this is an attack on the forward-security of the generator, an O(1) attack on backward security is trivial). The attack on forward-security demonstrates that the design of the generator is flawed, since it is well known how to prevent such attacks. We also analyzed the way in which the generator is run by the operating system, and found that it ampli¯es the e®ect of the attacks: The generator is run in user mode rather than in kernel mode, and therefore it is easy to access its state even without administrator privileges. -
Stochastic Simulation
Agribusiness Analysis and Forecasting Stochastic Simulation Henry Bryant Texas A&M University Henry Bryant (Texas A&M University) Agribusiness Analysis and Forecasting 1 / 19 Stochastic Simulation In economics we use simulation because we can not experiment on live subjects, a business, or the economy without injury. In other fields they can create an experiment Health sciences they feed (or treat) lots of lab rats on different chemicals to see the results. Animal science researchers feed multiple pens of steers, chickens, cows, etc. on different rations. Engineers run a motor under different controlled situations (temp, RPMs, lubricants, fuel mixes). Vets treat different pens of animals with different meds. Agronomists set up randomized block treatments for a particular seed variety with different fertilizer levels. Henry Bryant (Texas A&M University) Agribusiness Analysis and Forecasting 2 / 19 Probability Distributions Parametric and Non-Parametric Distributions Parametric Dist. have known and well defined parameters that force their shapes to known patterns. Normal Distribution - Mean and Standard Deviation. Uniform - Minimum and Maximum Bernoulli - Probability of true Beta - Alpha, Beta, Minimum, Maximum Non-Parametric Distributions do not have pre-set shapes based on known parameters. The parameters are estimated each time to make the shape of the distribution fit the data. Empirical { Actual Observations and their Probabilities. Henry Bryant (Texas A&M University) Agribusiness Analysis and Forecasting 3 / 19 Typical Problem for Risk Analysis We have a stochastic variable that needs to be included in a business model. For example: Price forecast has residuals we could not explain and they are the stochastic component we need to simulate. -
Random Number Generation Using MSP430™ Mcus (Rev. A)
Application Report SLAA338A–October 2006–Revised May 2018 Random Number Generation Using MSP430™ MCUs ......................................................................................................................... MSP430Applications ABSTRACT Many applications require the generation of random numbers. These random numbers are useful for applications such as communication protocols, cryptography, and device individualization. Generating random numbers often requires the use of expensive dedicated hardware. Using the two independent clocks available on the MSP430F2xx family of devices, software can generate random numbers without such hardware. Source files for the software described in this application report can be downloaded from http://www.ti.com/lit/zip/slaa338. Contents 1 Introduction ................................................................................................................... 1 2 Setup .......................................................................................................................... 1 3 Adding Randomness ........................................................................................................ 2 4 Usage ......................................................................................................................... 2 5 Overview ...................................................................................................................... 2 6 Testing for Randomness...................................................................................................