Pseudo-Random Number Generation Using Hash Functions and MACs
Outline : 1. PRNG Based on Hash Function 2. PRNG Based on MAC Function 1. PRNG Based on Hash Function Note 1 : It is recommended for reader that if they want to know about the better clarity regarding this blog then please study well about PRNG or you can copy and paste the given link on your web browser. ( shorturl.at/cpEG8 ) Figure 1 shows the basic strategy for a Hash based PRNG. Fig. 1 : Basic Structure of Hash Based PRNGs This algorithm uses the cryptographic hash Function 'H' with an hash value output of outlen bits. The basic operation of the algorithm is : Symbol Specification : V = seed Seedlen = bit length of V>= k + 64, where k is a desired security level expressed in bits. n = desired number of output bits. m = ceil(n/outlen) data = v W = the null string For i = 1 to m W i = H(data) W = W || Wi data = (data + 1) mod 2 seedlen Retur...