首页> 外文会议>Information security theory and practice : Security and privacy of mobile devices in wireless communication >A Comparison of Post-Processing Techniques for Biased Random Number Generators
【24h】

A Comparison of Post-Processing Techniques for Biased Random Number Generators

机译:偏置随机数发生器后处理技术的比较

获取原文
获取原文并翻译 | 示例

摘要

In this paper, we study and compare two popular methods for post-processing random number generators: linear and Von Neumann compression. We show that linear compression can achieve much better throughput than Von Neumann compression, while achieving practically good level of security. We also introduce a concept known as the adversary bias which measures how accurately an adversary can guess the output of a random number generator, e.g. through a trapdoor or a bad RNG design. Then we prove that linear compression performs much better than Von Neumann compression when correcting adversary bias. Finally, we discuss on good ways to implement this linear compression in hardware and give a field-programmable gate array (FPGA) implementation to provide resource utilization estimates.
机译:在本文中,我们研究和比较了两种流行的后处理随机数生成器的方法:线性和Von Neumann压缩。我们证明,线性压缩比冯·诺依曼压缩能获得更好的吞吐量,同时又能达到很高的安全性。我们还介绍了一种称为“攻击者偏好”的概念,该概念衡量攻击者可以猜出随机数生成器(例如,通过活板门或不良的RNG设计。然后,我们证明了在校正对手偏差时,线性压缩的性能要比冯·诺依曼压缩好得多。最后,我们讨论了在硬件中实现此线性压缩的好方法,并给出了现场可编程门阵列(FPGA)的实现以提供资源利用率估算值。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号