Ch08 Crypto7e (4)
Ch08 Crypto7e (4)
y and
Network
Security
Seventh Edition, Global Edition
by William Stallings
Independence
• No one subsequence in the sequence can
be inferred from the others
sequence Thr
zeros• inPurpose
a
to is
significantly
is
compressed
without loss
determine
approximat
ee
ely the whetherofthe
same asnumberinformation
of
runs of A.
test
would be
expected ones and significantly
zeros ofcompressibl
for a truly
sequence s
random various e sequence
lengths isis
considered
as expected
for a to be non-
random random
sequence
strongest PRNGs
drive the generator. One is
a 64-bit representation of
the current date and time.
• A number of
applications
employ this
technique
including The algorithm makes use of
financial security triple DES for encryption.
applications and Ingredients are:
PGP Output
Keys
• The generator makes use
• The output of three triple DES
encryption modules. All
consists of a 64- three make use of the
bit pseudorandom same pair of 56-bit keys,
which must be kept secret
number and a 64- and are used only for
bit seed value. pseudorandom number
generation.
CTR_DRBG Parameters
© 2017 Pearson Education, Ltd., All rights reserved.
CTR_DRBG
Functions
There is also an online service (random.org) which can deliver random sequences securely over
the
© 2017 Internet
Pearson Education, Ltd., All rights reserved.
Table 8.5
c
o
m
p
o
n
e
n
t
i
s
t
o
a
s
s
u
r
e
t
h
a
t
o
s
e
o
ft
th
I
t
e
o
u
t
p
u
t
b
e
h
a
v
e
s
a
s
a
h
e
h
e
a
lt
h
t
e
s
t
s
o
n
t
h
e
c
o
n
d
it
tru
e
r
a
n
d
o
m
b
o
n
i
n
g
it
s
tr
e
a
m
Function
i
s
r
e
a
s
o
n
a
b
l
e
t
o
u
s
e
t
h
e
t
e
s
t
s
f
o
r
r
a
n
d
o
m
n
e
s
s
d
e
f
i
n
e
d
i
n
S
P
8
0
0
-
2
2