A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm

Takeshi Koshiba, Behrouz Zolfaghari, Khodakhast Bibak*

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

Abstract

Discrete logarithmic pseudorandom number generators are a prevailing class of cryptographically-secure pseudorandom number generators (CSPRNGs). In generators of this type, the security parameter affects both security and performance. This adds to the design complexity via creating a critical tradeoff between security and performance. This research is an attempt at shifting the security-performance tradeoff paradigm in this realm. To this end, we propose a modification to Gennaro's pseudorandom number generator via replacing word-wise arithmetic operations with bit-wise logical operations in trapdoor and hard-core functions. The security of our generator (like that of Gennaro's) is based on the hardness of a special variant of the discrete logarithm problem. We establish an equivalence between the specific variant of the discrete logarithm problem with the standard problem. Moreover, we demonstrate that in the modified generator, performance will be almost independent of the security parameter as logical operations can be performed in register level without the interference of the Arithmetic-Logic Unit (ALU). This relaxes the security-performance tradeoff and allows designers to maneuver more flexibly in the tradeoff space. We implement and evaluate our proposed generator and prove its security. Our CSPRNG is deemed random by all randomness tests in NIST SP 800-22 suite.

Original languageEnglish
Article number103430
JournalJournal of Information Security and Applications
Volume73
DOIs
Publication statusPublished - 2023 Mar

Keywords

  • Cryptographically-secure pseudorandom number generator
  • Discrete logarithm problem
  • Mersenne primes
  • Security-performance tradeoff

ASJC Scopus subject areas

  • Software
  • Safety, Risk, Reliability and Quality
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm'. Together they form a unique fingerprint.

Cite this