SlideShare a Scribd company logo
1 of 8
Cryptography -
Random Numbers
5 minute series
Abdul Manaf Vellakodath
Security Architect
Random - What does it mean?
How does - computers - the
devices which could only
provide a completely
predictable outcome; could
generate random values?
Are those random numbers
that we generate for
cryptography are really
random? If so, how random
is it?
Random Numbers - Why do we need it?
Encryption Process
Data
Encryption
Algorithm
e8)iuk2323*0232323>2324
Jlsdojfakjdpot
23kj[8JSsdfhwlasduo7wtq owjdl
qjniluagSOCIay
sdo 87peuqiwjeb qy8wepqwnd
asiuyc98h2eh13kl
2ey9yhdjady089ypnl oq34ykllasd
aoe8dyihq3 oq24yplkand;aify098y
po123 q3yeq983748edklwhk
hsadhaoisyd8yr3qpohd
Encryption has typically three elements:
1. Data (message to be protected)
2. Encryption Algorithm (This is public
information - mostly)
3. Encryption Key (Secret, except for the Public
Key in the Public Key algorithm.)
The only element that protects the secrecy of data
is the secrecy of the ‘encryption key’ used; as the
algorithm is already public.
If you can predict or guess the ‘encryption key’, you
can break the encryption to get the data that is
protected.
Some examples of random keys:
1. Session Key in a Web Browser
2. Encryption Keys in RSA/AES256 algorithms
3. Lotteries and draws
http://lxr.free-electrons.com/source/drivers/char/random.c#L66; Copyright Matt Mackall <mpm@selenic.com>
Random Numbers - In words of a cryptographer!
Random Numbers - Random Distribution
Suppose,
we plot randomly generated values in x-y coordinates! Let’s say (x= some measurement, y=probability)
More
predictable
More
Random
https://blog.cloudflare.com/why-randomness-matters/
A Simple Pseudo-Randomness - An illustration!
The middle
square
method is
trivial to
predict: the
next number it
generates is
entirely
determined by
the number it
last produced
True Randomness
A random number generated from the following, or a combination of the same are
considered to be truly random:
● Atmospheric noise levels
● Variation in radioactive decay timings
● A variety of random bits from larger computer networks
Attacks on Random Numbers
https://en.wikipedia.org/wiki/Random_number_generator_attack

More Related Content

Similar to Cryptography - 5 minutes series - Random Numbers

Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsIRJET Journal
 
Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
Modeling and Utilizing Security Knowledge for Eliciting Security RequirementsModeling and Utilizing Security Knowledge for Eliciting Security Requirements
Modeling and Utilizing Security Knowledge for Eliciting Security RequirementsShinpei Hayashi
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security IntroductionGLC Networks
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer SystemFaruk_Hossen
 
04 authentication
04 authentication04 authentication
04 authenticationJadavsejal
 
A Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesA Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesIJERA Editor
 
Safe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSafe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSoumitra Bhattacharyya
 
TISS Computing Skills - Course 1 (B. Voc)
TISS Computing Skills - Course 1 (B. Voc)TISS Computing Skills - Course 1 (B. Voc)
TISS Computing Skills - Course 1 (B. Voc)Mukesh Tekwani
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTautomatskicorporation
 
SCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architectureSCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architectureqqlan
 
Network Security
Network SecurityNetwork Security
Network SecurityMAJU
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfHaris Chughtai
 

Similar to Cryptography - 5 minutes series - Random Numbers (20)

Network security
Network securityNetwork security
Network security
 
Emerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital ForensicsEmerging Trends In Cryptography And Digital Forensics
Emerging Trends In Cryptography And Digital Forensics
 
Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
Modeling and Utilizing Security Knowledge for Eliciting Security RequirementsModeling and Utilizing Security Knowledge for Eliciting Security Requirements
Modeling and Utilizing Security Knowledge for Eliciting Security Requirements
 
Cloud Security Introduction
Cloud Security IntroductionCloud Security Introduction
Cloud Security Introduction
 
home security System
home security Systemhome security System
home security System
 
G05124550
G05124550G05124550
G05124550
 
Threats and Security Tips of Computer System
Threats and Security Tips of Computer SystemThreats and Security Tips of Computer System
Threats and Security Tips of Computer System
 
04 authentication
04 authentication04 authentication
04 authentication
 
A Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart PhonesA Novel Key Generation Technique Used In Tablets and Smart Phones
A Novel Key Generation Technique Used In Tablets and Smart Phones
 
Safe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devicesSafe and secure programming practices for embedded devices
Safe and secure programming practices for embedded devices
 
Network security
Network securityNetwork security
Network security
 
i-Secure - 3FA Smart Lock
i-Secure - 3FA Smart Locki-Secure - 3FA Smart Lock
i-Secure - 3FA Smart Lock
 
TISS Computing Skills - Course 1 (B. Voc)
TISS Computing Skills - Course 1 (B. Voc)TISS Computing Skills - Course 1 (B. Voc)
TISS Computing Skills - Course 1 (B. Voc)
 
Automatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoTAutomatski - The Internet of Things - Security in IoT
Automatski - The Internet of Things - Security in IoT
 
SCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architectureSCADA deep inside:protocols and software architecture
SCADA deep inside:protocols and software architecture
 
Network Security
Network SecurityNetwork Security
Network Security
 
ProtegeGx Overview 2016
ProtegeGx Overview 2016ProtegeGx Overview 2016
ProtegeGx Overview 2016
 
Cryptography&Security
Cryptography&SecurityCryptography&Security
Cryptography&Security
 
Cybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdfCybersecurity Interview Preparation Questions.pdf
Cybersecurity Interview Preparation Questions.pdf
 
Cyber security
Cyber securityCyber security
Cyber security
 

More from Abdul Manaf Vellakodath

Cryptography - Simplified - Hash Functions
Cryptography - Simplified - Hash FunctionsCryptography - Simplified - Hash Functions
Cryptography - Simplified - Hash FunctionsAbdul Manaf Vellakodath
 
Cryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityCryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityAbdul Manaf Vellakodath
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric EncryptionCryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric EncryptionAbdul Manaf Vellakodath
 
Cryptography - Simplified - Symmetric Encryption
Cryptography - Simplified - Symmetric EncryptionCryptography - Simplified - Symmetric Encryption
Cryptography - Simplified - Symmetric EncryptionAbdul Manaf Vellakodath
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysAbdul Manaf Vellakodath
 

More from Abdul Manaf Vellakodath (6)

information security awareness course
information security awareness courseinformation security awareness course
information security awareness course
 
Cryptography - Simplified - Hash Functions
Cryptography - Simplified - Hash FunctionsCryptography - Simplified - Hash Functions
Cryptography - Simplified - Hash Functions
 
Cryptography - Simplified - Message Integrity
Cryptography - Simplified - Message IntegrityCryptography - Simplified - Message Integrity
Cryptography - Simplified - Message Integrity
 
Cryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric EncryptionCryptography - Simplified - Asymmetric Encryption
Cryptography - Simplified - Asymmetric Encryption
 
Cryptography - Simplified - Symmetric Encryption
Cryptography - Simplified - Symmetric EncryptionCryptography - Simplified - Symmetric Encryption
Cryptography - Simplified - Symmetric Encryption
 
Cryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric KeysCryptography - Simplified - Key Generation - Asymmetric Keys
Cryptography - Simplified - Key Generation - Asymmetric Keys
 

Recently uploaded

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024SynarionITSolutions
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024Top 10 Most Downloaded Games on Play Store in 2024
Top 10 Most Downloaded Games on Play Store in 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Cryptography - 5 minutes series - Random Numbers

  • 1. Cryptography - Random Numbers 5 minute series Abdul Manaf Vellakodath Security Architect
  • 2. Random - What does it mean? How does - computers - the devices which could only provide a completely predictable outcome; could generate random values? Are those random numbers that we generate for cryptography are really random? If so, how random is it?
  • 3. Random Numbers - Why do we need it? Encryption Process Data Encryption Algorithm e8)iuk2323*0232323>2324 Jlsdojfakjdpot 23kj[8JSsdfhwlasduo7wtq owjdl qjniluagSOCIay sdo 87peuqiwjeb qy8wepqwnd asiuyc98h2eh13kl 2ey9yhdjady089ypnl oq34ykllasd aoe8dyihq3 oq24yplkand;aify098y po123 q3yeq983748edklwhk hsadhaoisyd8yr3qpohd Encryption has typically three elements: 1. Data (message to be protected) 2. Encryption Algorithm (This is public information - mostly) 3. Encryption Key (Secret, except for the Public Key in the Public Key algorithm.) The only element that protects the secrecy of data is the secrecy of the ‘encryption key’ used; as the algorithm is already public. If you can predict or guess the ‘encryption key’, you can break the encryption to get the data that is protected. Some examples of random keys: 1. Session Key in a Web Browser 2. Encryption Keys in RSA/AES256 algorithms 3. Lotteries and draws
  • 4. http://lxr.free-electrons.com/source/drivers/char/random.c#L66; Copyright Matt Mackall <mpm@selenic.com> Random Numbers - In words of a cryptographer!
  • 5. Random Numbers - Random Distribution Suppose, we plot randomly generated values in x-y coordinates! Let’s say (x= some measurement, y=probability) More predictable More Random
  • 6. https://blog.cloudflare.com/why-randomness-matters/ A Simple Pseudo-Randomness - An illustration! The middle square method is trivial to predict: the next number it generates is entirely determined by the number it last produced
  • 7. True Randomness A random number generated from the following, or a combination of the same are considered to be truly random: ● Atmospheric noise levels ● Variation in radioactive decay timings ● A variety of random bits from larger computer networks
  • 8. Attacks on Random Numbers https://en.wikipedia.org/wiki/Random_number_generator_attack