Neural network identification of keystream generators
Leader, Jeffery J.
Heyman, James E.
MetadataShow full item record
Applications such as stream ciphers and spread spectra require the generation of binary keystreams to implement, and the simulation of such keystreams to break. Most cryptanalytic attacks are of the known generator type, that is, they assume knowledge of the method used to generate the keystream. We show that a neural network can be used to identify the generator, and in some cases to simulate the keystream.
Approved for public release; distribution is unlimited.
NPS Report NumberNPS-MA-93-016
Showing items related by title, author, creator and subject.
Pseudorandom number generators for mobile devices: an examination and attempt to improve randomness Larsson, Ola (Monterey, California: Naval Postgraduate School, 2013-09);This thesis examines the quality of pseudorandom number generation for cryptographic purposes in general and the generation of such numbers in a mobile device (Android phone), in particular, since we expected to find ...
Lewis, Peter A. W. (Monterey, California. Naval Postgraduate School, 1986-12); NPS55-86-025There exist today many 'good' pseudo-random number generators; the problem is to retrieve them. This document discusses three commonly used pseudo- random number generators, the first being RANDU, a notoriously bad generator, ...
Howe, John E. (1965);Methods are developed, and Fortran 63 CODAP computer programs are demonstrated, to generate random numbers from the uniform, normal (including multivariate normal), Poisson, and exponential probability distributions. ...