首页> 外文期刊>Computers & Security >On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL
【24h】

On statistical distance based testing of pseudo random sequences and experiments with PHP and Debian OpenSSL

机译:基于统计距离的伪随机序列测试以及PHP和Debian OpenSSL的实验

获取原文
获取原文并翻译 | 示例
           

摘要

NIST SP800-22 (2010) proposed the state of the art statistical testing techniques for testing the quality of (pseudo) random generators. However, it is easy to construct natural functions that are considered as GOOD pseudorandom generators by the NIST SP800-22 test suite though the output of these functions is easily distinguishable from the uniform distribution. This paper proposes solutions to address this challenge by using statistical distance based testing techniques. We carried out both NIST tests and LIL based tests on commonly deployed pseudorandom generators such as the standard C linear congruential generator, Mersenne Twister pseudorandom generator, and Debian Linux (CVE-2008-0166) pseudorandom generator with OpenSSL 0.9.8c-1. Based on experimental results, we illustrate the advantages of our LIL based testing over NIST testing. It is known that Debian Linux (CVE-2008-0166) pseudorandom generator based on OpenSSL 0.9.8c-1 is flawed and the output sequences are predictable. Our LIL tests on these sequences discovered the flaws in Debian Linux implementation. However, NIST SP800-22 test suite is not able to detect this flaw using the NIST recommended parameters. It is concluded that NIST SP800-22 test suite is not sufficient and distance based LIL test techniques be included in statistical testing practice. It is also recommended that all pseudorandom generator implementations be comprehensively tested using state-of-the-art statistically robust testing tools.
机译:NIST SP800-22(2010)提出了用于测试(伪)随机生成器质量的最新统计测试技术。但是,很容易构造被NIST SP800-22测试套件视为良好伪随机生成器的自然函数,尽管这些函数的输出很容易与均匀分布区分开。本文提出了使用基于统计距离的测试技术来解决这一挑战的解决方案。我们在具有OpenSSL 0.9.8c-1的常用C线性同余生成器,Mersenne Twister伪随机生成器和Debian Linux(CVE-2008-0166)伪随机生成器等常用的伪随机生成器上进行了NIST测试和基于LIL的测试。根据实验结果,我们说明了基于LIL的测试相对于NIST测试的优势。众所周知,基于OpenSSL 0.9.8c-1的Debian Linux(CVE-2008-0166)伪随机生成器存在缺陷,并且输出序列是可预测的。我们对这些序列的LIL测试发现了Debian Linux实现中的缺陷。但是,NIST SP800-22测试套件无法使用NIST建议的参数检测到此缺陷。结论是NIST SP800-22测试套件还不够,统计测试实践中还包括基于距离的LIL测试技术。还建议使用最新的统计可靠的测试工具对所有伪随机生成器实现进行全面测试。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号