Volume 32 Issue 04
Apr.  2006
Turn off MathJax
Article Contents
Gao Xiaopeng, Zhang Zhe, Liu Guoliang, et al. Fast algorithm for pseudo random number generation in Linux user space[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(04): 489-493. (in Chinese)
Citation: Gao Xiaopeng, Zhang Zhe, Liu Guoliang, et al. Fast algorithm for pseudo random number generation in Linux user space[J]. Journal of Beijing University of Aeronautics and Astronautics, 2006, 32(04): 489-493. (in Chinese)

Fast algorithm for pseudo random number generation in Linux user space

  • Received Date: 07 Mar 2005
  • Publish Date: 30 Apr 2006
  • RNGs(random number generators) are important building blocks for algorithms in security applications. They are paramount in construction of encryption keys. For security applications with key exchange in high frequency, the two RNGs provided by Linux kernel are not acceptable because of their low efficiency. An algorithms for fast pseudo random number generation as proposed is implemented in Linux user space. The source of random number is a high-frequency 64 bit counter. The lowest 4 bytes of the counter are added in a pool, then the pool is hashed with SHA(security hash algorithm). The first 16 bytes of the hash are output. This process is repeated until the requested number of random number is achieved. Several statistical tests are employed to investigate the randomness of RNGs. The results show that the quality of random number generated are guaranteed. Due to its running in Linux user space, this algorithm has much higher efficiency than Linux’s two RNGs.

     

  • loading
  • [1] Linux 2.4内核随机数生成算法源代码 . /usr/src/linux/drivers/char/random.c Source code of Linux 2.4 random number generator . /usr/src/linux/drivers/char/random.c(in Chinese) [2] FIPS-180-1.Secure hash standard[S]. National Institute of Standards and Technology, US Department of Commerce, 1995 [3] Mungkee D.Cryptographic random number generators . http://www.phrack.org/phrack/59/p59-0x0f.txt [4] Intel.Intel architecture software developer’s manual volume 2:instruction set reference .http://www.intel.com/design/pentiumii/manuals/243191.htm [5] Kaufman C. Internet key exchange (IKE v2) protocol . IETF draft-ietf-ipsec-ikev2-17.txt.Sep,2004 [6] Donald E K.The art of computer programming (2nd Edition),Volume 2/seminumerical algorithms[M]. Beijing:Tsinghua University Press,1980 [7] Juan S.Statistical testing of random number generators .Proceedings of the 22nd National Information Systems Security Conference. http://csrc.nist.gov/nissc/1999/proceeding/papers/p24.pdf [8] 韩于羹.应用数理统计[M].北京:北京航空航天大学出版社,1989 Han Yugeng. Mathematical statistics & applic
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Article Metrics

    Article views(2833) PDF downloads(1783) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return