Inicio  /  Information  /  Vol: 13 Par: 8 (2022)  /  Artículo
ARTÍCULO
TITULO

Quantum Randomness in Cryptography?A Survey of Cryptosystems, RNG-Based Ciphers, and QRNGs

Anish Saini    
Athanasios Tsokanos and Raimund Kirner    

Resumen

Cryptography is the study and practice of secure communication with digital data and focuses on confidentiality, integrity, and authentication. Random number generators (RNGs) generate random numbers to enhance security. Even though the cryptographic algorithms are public and their strength depends on the keys, cryptoanalysis of encrypted ciphers can significantly contribute to the unveiling of the cipher?s key. Therefore, to ensure high data security over a network, researchers need to improve the randomness of keys as they develop cryptosystems. Quantum particles have a leading edge in advancing RNG technology as they can provide true randomness, unlike pseudo-random numbers generators (PRNGs). In order to increase the level of the security of cryptographic systems based on random numbers, this survey focuses on three objectives: Cryptosystems with related cryptographic attacks, RNG-based cryptosystems, and the design of quantum random number generators (QRNGs). This survey aims to provide researchers with information about the importance of RNG-based ciphers and various research techniques for QRNGs that can incorporate quantum-based true randomness in cryptosystems.

 Artículos similares

       
 
Luca Pasqualini and Maurizio Parton    
A Pseudo-Random Number Generator (PRNG) is any algorithm generating a sequence of numbers approximating properties of random numbers. These numbers are widely employed in mid-level cryptography and in software applications. Test suites are used to evalua... ver más
Revista: Algorithms

 
Jose Luis Martin-Navarro and Amparo Fúster-Sabater    
The Internet of Things (IoT) revolution leads to a range of critical services which rely on IoT devices. Nevertheless, they often lack proper security, becoming the gateway to attack the whole system. IoT security protocols often rely on stream ciphers, ... ver más
Revista: Computers

 
Teh-Lu Liao, Pei-Yen Wan and Jun-Juh Yan    
This paper is concerned with the design of synchronized large-scale chaos random number generators (CRNGs) and its application to secure communication. In order to increase the diversity of chaotic signals, we firstly introduce additional modulation para... ver más
Revista: Applied Sciences

 
Aleksei F. Deon and Yulian A. Menyaev    
The widely known generators of Poisson random variables are associated with different modifications of the algorithm based on the convergence in probability of a sequence of uniform random variables to the created stochastic number. However, in some situ... ver más
Revista: Algorithms

 
I.Y. Sesin,V.V. Nechaev     Pág. 34 - 40
Path tracing is one of unbiased rendering methods. Said method relies on integral rendering equation to simulate wide variety of optical phenomena. In path tracing, integral part of rendering equation is calculated using Monte Carlo method, which makes t... ver más