SlideShare a Scribd company logo
1 of 9
Download to read offline
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.10, 2013

www.iiste.org

Comparative Analysis of Efficiency of Fibonacci Random Number
Generator Algorithm and Gaussian Random Number Generator
Algorithm in a Cryptographic System.
Dr. Ing. Edward Opoku-Mensah1, Abilimi A. Christopher2, Francis Ohene Boateng3
1. Department of Information Technology Education, University of Education Winneba, P.O.Box 1277,
Kumasi, Ghana, Email : ingeopm@gmail.com
2. Department of Computer Science, Christian Service University College, P.O. Box 3110, Kumasi,
Ghana, Email: cabilimia@gmail.com
3. Department of Information Technology Education, University of Education Winneba, P.O.Box 1277,
Kumasi, Ghana. Email : fanbotgh@yahoo.com
Abstract
Random Numbers determine the security level of Cryptographic Applications as they are used to generate
padding schemes in the encryption and decryption process as well as used to generate cryptographic keys. The
more randomness in the numbers a generator generates the more effective the cryptographic algorithm, and the
more secured it is to be used for protecting confidential data. Sometimes developers find it difficult to determine
which Random Number Generators (RNGs) can provide a much secured Cryptographic System for secured
enterprise application implementations. Two of such random number generators include the Fibonacci Random
Number Generator and the Gaussian Random Generator. The researchers sought to determine, between these
two, the better to be used for improving data security in cryptographic software systems. The researchers
employed statistical tests like Frequency test, Chi-Square test, Kolmogorov-Smirnov test on the first 100 random
numbers between 0 and 1000 generated using the above generators. The research concluded that Fibonacci
Random Number Generator is more efficient than the Gaussian Random Number Generator and therefore
recommended the choice of Fibonacci Random Number Generator when choosing between the two for use in a
cryptographic system for better data security.
Keywords: Cryptographic Algorithms, Random Number Generators, encryption, decryption
1. Introduction
According to Kessler (2012), in the information security world, it is repeatedly examining statements like
‘protected via 128-bit Advance Encryption Standard’ or ‘sheltered by 2048 bit validation’. Invariably people
would want to know the data security or safety power of various cryptographic algorithms. Some cryptographic
algorithms like Rivest, Shamir Adleman, Elliptic curve cryptography and Advance Encryption Standard contain
a confirmation evidence of not being easy to crack. These cryptographic algorithms are mostly used in protocols
to take care of data that need to be protected for their confidentially, integrity and identity. As an illustration
think about using Secure Socket Layer (SSL) or Transport Layer Security (TLS) while a book is bought from an
online market like the Amazon, or when a sum of money will have to be transferred to your bank account by a
bond (Hasani, 2011). Another example can be seen in how Internet Protocol Security (IPsec) and Internet Key
Exchange (IKE) are used while a computer is connected to a network in order to access information on the
World Wide Web.
AuthenTec Embedded Security Solutions (2010) stated that some of the things that are not often seen are
random number generator strengths and their use by security applications. The most important thing software
designers are concerned with is the controlled use of bits and their creation rate, but not much of the real
randomness associated with the bits produced.
The security level of a cryptographic application is dependent on the importance of the random numbers
used in the application. Furthermore, how intricate it is to crack a cryptographic system is dependent on the
quality of random numbers used in the cryptography (Biege, 2006).
High security cryptographic system can be achieved if researchers can understand cryptographic systems
are developed based on the principle of cryptographic algorithms design called Kerckhoff Principle which states
that “The security of the system must depend solely on the key material, and not on the design of the
system”(AuthenTec Embedded Security Solutions, 2010). This is due to the fact that before an attacker can
break modern cryptographic systems, the attacker needs to deduce the keys used in developing the algorithms as
well as the protocol used. The strength of a cryptographic application is expressed with the assumption that the
attacker has no idea of the bits and its pattern used in the key formation and used in the cryptographic systems.
An enhanced attack against cryptographic system exposes extra key bits that can be computed by looking at the
(inadequate sum of) output data, and that diminishes the ‘valuable strength’ of an algorithm.

50
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.10, 2013

www.iiste.org

A manual prepared by the Internet Engineering Task Force (IETF) and named a ‘Best Practices’ document
is used to describe the significance of true randomness in cryptographic applications, and these serve as
guidelines on how random numbers are created (Eastlake, Schiller & Crocker, 2005). The National Institute of
Standard and Technology provides a subdivision on Random Number Creation in their Cryptographic Toolbox
pages, and a number of standards organizations like International Standard Organisation (ISO), Institute of
Electrical and Electronic Engineers (IEEE), IETF, and American National Standards Institute (ANSI), are
working on, standards associated to random number generation. This goes to show the importance of proper
random number generation. This research therefore compares the effectiveness of Pseudo Random Number
Generator so as to get a secured cryptographic system, when implemented in cryptography.
2. Random numbers in Cryptography
A high-quality Cryptographic System needs good-quality random numbers (Mike, Paul, & Mark, 2012). This
paper evaluates software security based on Pseudo Random Number Generator Algorithms (PRNGA) needed for
Cryptographic Applications.
Nearly each and every cryptographic protocol needs the exploit and creation of furtive ethics that
attackers should not know. Algorithms for the generation of random numbers are requisites for generation of
private keys or public key pairs for symmetry and hybrid cryptosystems as well as asymmetric encryption
algorithms like Diffie-Hellman, Rivest Shamir Adleman and Digital Signature Algorithm. Random Number
Generators are considered necessary to generate blinding values, challenges, padding bytes, and nonces (salts) in
cryptographic applications. The randomness of keys used in cryptographic system is the pre-requisite for security
protocol; RNGs used in cryptographic systems ought to convene rigid parameters. Hiding the important patterns
concerning the output of the Random Number Generator from the attackers, as well as folks who know how the
Random Number Generator Algorithm is designed, is very important in every cryptographic application. For
illustration, the clear entropy of the output of Random Numbers Generator must be as close up as probable to the
length of the bit use. The paper compares the efficiency of two different random number generators, Fibonacci
Random Number Generator Algorithm and Gaussian Random Number Generator Algorithm, in Cryptographic
Algorithm to see the better one to be used in cryptography.
The ideal quality of high-quality pseudo random number generator is that the series should not be easy to
predict by the attacker of a cryptosystem. This is because sometimes the adversary may know the cryptographic
algorithm used, and this is what is called the Kerckhoff's principle (Yehuda, 2006).
According to Andrew et al. (2010), an additional reason for statistical randomness of a pseudo random
number generator is the basis for good pseudo random number generators. All correlations and trends in the
generators should be hidden. Statistically these can be proven. The statistical component of a pseudo random
number generator shows that every value or result over a given range has equal chance of incidence. Every
number has a probability of ½ in the range of [0, 1]. Every couple of numbers used will have an occurrence of ¼
and a frequency of 1/8 for every triplet. That is when the basis for the numbers generated is considered not
biased and consecutive output is considered not correlated. The mean and variance computation must also be
included in the statistical randomness test. If the output for the Mean is closer to 0.5 and that of the variance is
closer to 0.08, then the pseudo random numbers are homogeneous.
According to Andrew et al. (2010), another test for the efficacy of pseudo random numbers generators is
the Frequency Test also called the Monobits. The Frequency Test concentrates on the percentage of ones and
zeroes in the entire series of numbers produced by the generators. This test is used to establish that the series of
numbers generated or created produces the same number of ones and zeroes as should be anticipated for any true
random series. That is the assessment of how close the fraction of ones is to ½, which means that, the amount of
zeroes and ones in series must be almost the same when compared to each other. The Monobit Test in a Block
concentrates on the percentage of ones and zeroes in the Blocks of M-bits. This assessment ascertains whether
M/2 is roughly the number of ones in the block of M-bit.
According to Justin (2012), the effectiveness of Pseudo Random Number Generator algorithms also
depends on the period. Every algorithm has input parameters that produce an equivalent period. What happens is
that any time an algorithm for generating the random numbers creates a repeated value then it will start the
generation process all over again in order to ensure that the results are not correlated. Therefore it should be
recognized that the seed or the value or the parameter determines the period of the algorithm used. This means
that the more the repetition, the shorter the period used and vice versa.
Lastly, uniformity also determines the period of the pseudo random number generator. That is every
perfect generator algorithm will produce records that are consistently distributed within a certain interval. This
makes it very difficult for algorithms that have smaller periods, if even they have huge intervals, to pass this kind
of statistical test for randomness (Christophe & Diethelm, 2003). They also explained that if there exist
correlations within the numbers generated, then the algorithms with larger period will experience massive

51
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.10, 2013

www.iiste.org

problems.
Christophe and Diethelm (2003), stated that the ideal thing to do to any cryptographic application
systems is to make sure that the generator used in the generation of the random numbers produces values that
correlate serially. When smaller values of numbers are produced via random number generators, then algorithms
that have larger periods and high-uniformity may be highly inconsistent. The security of the generator then
depends on the correlation of values produced, and hence it can be explained that the more the system is secured
the lesser the correlations of numbers in the generator and vice versa.
3. Methodology
The researchers employed statistical tests for testing the randomness of two pseudo random numbers generators,
namely Fibonacci Random Number Generator and Gaussian random number generator algorithms, in order to
determine whether a set of data has a recognizable pattern to it or not. These tests are Chi-Square Test and
Kolmogorov-Smirnov test (KS-test).
3.1 Chi-square Test
The Chi-Square Test has shown to conform to the errors of pseudo random series generators sensitivity. The
distribution of the Chi-Square is a non-negative value and a proportion which show how often real random series
should surpass a computed number or value determined as a result for collections of zeroes and ones in a certain
data file. The procedures used are as follows:
i.
Java Programming codes are written for each of Fibonacci Random Number Generator and Gaussian
Random Number Generator.
ii.
This test involved producing sequences of 100 random integers between 0 and 1000 using the Java
codes for each of Fibonacci Random Number Generator and Gaussian Random Number Generator.
iii.
The generated random numbers in (ii) above is coded in Statistical Package for Social Science (SPSS)
software to test for the randomness of the numbers in the generators. The procedures include:
a. Go to and click on the Analyse Menu on the SPSS bar after the data has been coded.
b. Choose Nonparametric Test on the submenu.
c. Go to and then Click on Chi-Square Test.
d. Select the two random numbers generators and move them to the variable list.
e. The results generated for the Chi-Square Test.
iv.
For uniform distributions of random numbers from the generators, then the expectations is that there
should be 1 appearance or occurrence for the number 1 or 2 or 3 and so on to the end of the dimension
of the numbers, 100. Then how often each of the numbers appears will be expected to have a frequency
of 1.0 or 1.1 averagely for all the numbers from 1 to 100 ranges. The observed frequency is the real
frequency for every one of the numbers generated by the generator with the ranges of numbers
specified. The Chi-Square value or statistics is calculated from the difference between the observed
frequency of the test and that of the expected frequency of every one of the numbers generated as
follows:
R

χ2 = ∑
i =1

(Oi − Ei ) 2
Ei

R is the distinct individual random numbers likely (R = 100), the number of the observed frequencies of
happenings or occurrences for the random numbers (i) is Oi and where the frequency of expectation or the
expected frequency is Ei for the random integer or number i. Since the expectation is that the integer distribution
must uniformly spread, then the occurrences for every random number or integer must have equal expected
frequencies. Ei can then be computed with N as the total number of observations, using the equation above.
There is one way to explain the above percentages namely; it explains the level of non-randomness
suspicions, that is, the degree to which the series of random numbers generated is assumed of being non-random.
If the percentages are between 90% and 95%, 10% and 5% shows the series is “almost suspect”. If the
percentage is in the range of 99% and 95% or in the range of 1% and 5%, then the series is suspect. Finally, if
the percentage is greater than 99% or less than 1%, then the series is almost certainly not random.
3.2 Kolmogorov-Smirnov Test (KS-test)
The Kolmogorov-Smirnov (K-S) test is based on the Empirical Distribution Function (ECDF).
Given N ordered data points Y1, Y2, ..., YN, the ECDF is defined as

E N = n (i ) N
where n(i) is the number of points less than Yi and the Yi are ordered from smallest to largest value. This is a step
function that increases by 1/N at the value of each ordered data point.
The procedures used to perform the Kolmogorov-Smirnov test (KS-test) for the two random numbers
generators namely: Fibonacci Random Number Generator and Gaussian Random Number Generator are as

52
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.10, 2013

www.iiste.org

follows:
i.

Java Programming codes are written for each of Fibonacci Random Number Generator and
Gaussian Random Number Generator.
This test involved produces sequences of 100 random integers between 0 and 1000 using the
Java codes for each of Fibonacci Random Number Generator and Gaussian Random Numbers
Generator.
The generated random numbers in (ii) above is coded in Statistical Package for Social Science
(SPSS) software to test for randomness of the numbers in the generators. The procedures
include:
a. Go to and click on the Analyse Menu on the SPSS bar after the data has been coded.
b. Choose Nonparametric Test on the submenu.
c. Go to and then Click on One Sample KS-Test.
d. Select the two random numbers generators and move them to the variable list and check
Normal.
e. Click on Exact tap and select asymptotic option and then click OK.

ii.

iii.

4. Results
4.1 Gaussian Random Number Generator
This generator produces smaller random numbers at the beginning and at the end of the range used,
while producing bigger numbers at the middle of the range of the numbers generated as shown in Figure 1.
However abnormal uniformity occurs at the range of -100 to 50. The generator produces random numbers that
are much skewed to the center, hence produces a substantially good standard deviation of 68.515. This standard
deviation value shows that the generator obeys the normal distribution curve.
Table 1
The descriptive statistics of the Random Numbers Generators
Generators
N
Mean
Std.
Minimum
Maximum
Deviation
Gaussian Random
Generator
Fibonacci Random
Generator

Number

100

5.08

68.51

Number

100

-90142675.73

975930540

-121

126

-2092787285

2.E9

Gausian Random Number Generator
150

Mean =5.08
Stdev=68.515
N = 100

50
0
1
5
9
13
17
21
25
29
33
37
41
45
49
53
57
61
65
69
73
77
81
85
89
93
97

Random numbers

100

-50
-100
-150

Range of generation

Figure 1: The trend of randomness Gaussian Random number Generator

53
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.10, 2013

www.iiste.org

4.2 Fibonacci Random Number Generator
From the results generated, it is found out that the Fibonacci Random Number Generator started with
smaller random numbers at the beginning, elevates gradually, gets to its peak at a value of 0.0E0 and declines
gradually to the end of the range as in Figure 2. This result tends to obey the normal distribution curve more
than all the other generators studied, with standard deviation of 9.759E8.This represents the greater deviation of
individual numbers produced by the generator from each other and hence not normally distributed.

Fibonacci Random Number Generator

Mean =-90142675.73
Stdev=9.759E8
N=100

2.5E+09
2E+09

1E+09
500000000
0
-5E+08

1
5
9
13
17
21
25
29
33
37
41
45
49
53
57
61
65
69
73
77
81
85
89
93
97

Random numbers

1.5E+09

-1E+09
-1.5E+09
-2E+09
-2.5E+09

Range of Generation
Figure 2: The trend of randomness in Fibonacci Random Number Generator

The researchers compared the two Pseudo Random Number Generators (PRNGs) studied namely,
Fibonacci Random Number Generator (FRNG) and Gaussian Random Number Generator (GRNG). The results
of the repetition of the two generators were used to draw a line graph as shown in Figure 3. The figure shows a
line graph of frequencies for the two random numbers generators. It was found out that the random number
generator with the highest number of repeated numbers is Gaussian Random Number Generator, while Fibonacci
Random Number Generator had no repeated numbers in the random numbers. This means that numbers were
more likely to be random with Fibonacci Random Number Generator compared with the Gaussian Random
Number Generator algorithm as shown in Figure 3.

54
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.10, 2013

www.iiste.org

Numbers Repetition
4.5
4

frequency

3.5
3
2.5
2

GRNG

1.5

FRNG

1
0.5
0
1 6 11 16 21 26 31 36 41 46 51 56 61 66 71 76 81 86 91 96

Random numbers generated
Figure 3: The number of repetitions in Pseudo Random Number Generators
4.3 The Chi-Square Test for Independence of Random Numbers
The analysis of the factors responsible for randomness in a random number generator showed that factors
tend to give many considerations to Fibonacci Random Number Generator than the Gaussian Random Number
Generators compared with. This is because the Chi-Square analysis for the independence of numbers in the
generators showed that numbers were more independent to each other in the Fibonacci Random Number
Generator (Chi-Square Value = 0.000) than the Gaussian Random Number Generators under studied. This is
because independence of numbers increases with the decrease in Chi-Square Value and vice versa.
However, the worse generator in terms of independence is Gaussian Random Number Generator (ChiSquare value = 14.400) as shown in Table 2. This is because it produces a higher Chi-Square Value from the
test. This also means that numbers in the GRNG were more likely to depend on each other than the Fibonacci
Random Number Generator. Table 2 represents the descriptive statistics of the analysis (Standard Deviation,
Minimum, and Maximum & Mean). Standard deviation of numbers increases with decreasing normality and vice
versa. This means the higher the standard deviation value, the higher the deviation from the normal and vice
versa. Therefore Fibonacci Random Number Generator is more deviated from the normal distribution, while
Gaussian Random Number Generator produces numbers that obeys the normal distribution far more than the
Fibonacci Random Generator as shown in Table 2.
Table 2
The Chi-Square Test Result for Pseudo-Random Number Generator
Test Statistics
Gaussian Random
Fibonacci Random
Number Generator
Number Generator
14.400a
.000b
Chi-Square
87
99
Df
1.000
1.000
Asymp.Sig.
1. 000a
1.000b
Monte Carlo Sig.
99%
Confidence
Interval
1.000
1.000
Lower Bound
1.000
1.000
Upper Bound
a. 88 cells (100.0%) have expected frequencies less than 5. The minimum expected cell frequency is 1.1.
b. . 100 cells (100.0%) have expected frequencies less than 5. The minimum expected cell frequency is
1.0.
4.4 The Kolmogorov-Smirnov Test for Uniformity of random numbers
In Kolmogorov-Smirnov, the more the z-value falls in between the lower and upper bound of the Monte

55
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.10, 2013

www.iiste.org

carlo Significance.(2-tailed) Value, the more uniform the numbers generated by the random number generator is
and vice versa. From Table 3, the Gaussian Random Number Generator produces more uniform numbers than its
counterpart Fibonacci Random Number Generator. This is because Gaussian Random Number Generator
produces z-value that fall closer between the lower and upper bounds of z-value, while Fibonacci Random
Number Generator produces z-value that fall outside the range of lower and upper bounds z-value as shown in
Table 3. The factors responsible for decision also showed that factors tend to give more considerations to
Fibonacci Random Numbers Generator (K-S value = 2.020) than the Gaussian Random Number Generator
compared with in this paper. This therefore makes Fibonacci Random Number Generator less uniform than the
Gaussian Random Number Generator (K-S value = 0.725) as shown in Table 3.
However, the lesser the uniformity of numbers produced, the more independent numbers are and vice versa.
This accounts for why Fibonacci Random Number Generator is more independent of the two generators.
Table 3
The Kolmogorov-Smirnov Test for Uniformity of random numbers
Gaussian
Random
Statistics
Number Generator

Minimum

100
-121

Maximum
Absolute

N
Uniform Parameters

126
0.072

Fibonacci
Random Number
Generator
100
2092787285
2144908973
0.202

Most Extreme Differences
Positive
Negative
Kolmogorov-Smirnov Z
Asymp.Sig. (2-tailed)
Sig.
Monte carlo.Sig.(2- 90%Confidence
tailed)
Interval

0.072
-0.060

Lower
Bound
Upper
Bound

5.

0.202
-0.164

0.725
0.670
0.640
0.561

2.020
0.001
0.000
0.000

0.719

0.23

Discussions
The analysis of factors for uniformity also shows that factors tend to give more considerations to
Gaussian Random Number Generator than the Fibonacci generator. This therefore makes Fibonacci random
Number Generator less uniform and more secure than Gaussian Random Numbers Generator.
A good PRNG will produce a sequence of numbers that cannot be easily guessed or determined by an
adversary. The general assumption is that the opponent knows the algorithm being used. This is usually referred
to as Kerckhoff's principle (Yehuda, 2006). This assertion is evidenced in the findings relating to Fibonacci
Random Number Generator and the Gaussian Random Number Generator. The Chi-Square analysis for the
independence of numbers in the generators showed that numbers were more independent to each other in the
Fibonacci Random Number Generator than the other generator under study and therefore less likely to be
guessed by an adversary.
According to Andrew et al. (2010), another factor to be considered for a good PRNG is that the series
generated should be statistically random. It should be able to hide all patterns and correlations. This can be tested
by some statistical tests. A PRNG should have the statistical property that each value over the interval has an
equally likely occurrence. In the case of the interval [0,1] each number would appear with the frequency 1/2 in a
long run. Each pair of numbers would appear with frequency 1/4, and each triplet with frequency 1/8. This
would form a basis of observation that the numbers being generated are unbiased and successive outcomes are
uncorrelated (James et al., 2003). Mean should be close to 0.5 and variance 1/12 or 0.08 for uniformly
distributed pseudorandom numbers. This is also evidenced more in Gaussian Random Number Generator with
lower Variance (square root of standard deviation) compared with that of Fibonacci Random Number Generator.
Again, Andrew et al. (2010) stated that Frequency (Monobits) Test is also another test for efficiency.
The focus of the test is the proportion of zeroes and ones for the entire sequence. The purpose of this test is to
determine whether that number of ones and zeros in a sequence are approximately the same as would be

56
Computer Engineering and Intelligent Systems
ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online)
Vol.4, No.10, 2013

www.iiste.org

expected for a truly random sequence. The test assesses the closeness of the fraction of ones to ½, that is, the
number of ones and zeroes in a sequence should be about the same. Test for Frequency within a Block: the focus
of the test is the proportion of zeroes and ones within M-bit blocks. This test also determines whether the
frequency of ones in an M-bit block is approximately M/2. In the analysis of the factors responsible for decision
to be taken on the two random number generators revealed that Fibonacci Random Number Generator produces
random numbers that have less number of ones and zeroes to be about the same than the Gaussian Random
Number Generator and hence makes numbers generated by former more independent of each other.
6. Conclusions
The discussions of the findings indicate that Gaussian Random Number Generator Algorithm is more uniform
than the Fibonacci Random Number Generator Algorithm. Consequently, Gaussian Random Number Generator
algorithm is less secure than the Fibonacci Random Number Generator Algorithm, and therefore makes the
Fibonacci Random Number Generator more efficient than the Gaussian Random Number Generator.
It is therefore recommended that the Fibonacci Random Number Generator Algorithm, instead of the
Gaussian Random Number Generator, is used for better data security of enterprise software applications in a
cryptographic system.
References
Andrew, R., Juan, S., James, N., Miles, S., Elaine, B., & Stefan, L. (2010). A statistical test suite for random
and pseudorandom number generators for cryptographic application, Revision 1a, USA. Special
Publication 800-22 (http://csrc.nist.gov/publications/nistpubs/800-22- rev1a/SP800-22rev1a.pdf.
Accessed 2012, September 1).
AuthenTec Embedded Security Solutions (2010). The importance of true randomness in cryptography.
(http://www.authentec.com/Portals/5/Documents/TRNG%20Whitepaper_91411.pdf. Accessed 2012,
January 14).
Biege,
T.
(2006).
Analysis
of
a
strong
pseudo
random
number
generator.
(
http://www.suse.de/~thomas/papers/random-analysis.pdf. Accessed 2012, February).
Christophe, D., & Diethelm, W. (2003).
A note on random number generation. (http://cran.r
project.org/web/packages/ randtoolbox/ vignettes/fullpres.pdf. Accessed 2012, September 7).
Eastlake, D., Schiller, J. & Crocker, S. (2005). RFC 4086. (http://www.ietf.org/ rfc/rfc4086.txt. Accessed 2012,
June 10).
Fisnik, H. (2011). Safe internet banking. (http://www.itknowledge24.com /blog/safe-internet-banking/ Accessed
2012, June 10).
Gary, C. K. (2012). An overview of cryptography. (http://www.garykeSecure Socket Layerer.
net/
library/crypto.html. Accessed 2012, August 10).
Justin,
A.
(2012).
Progressing
past
poor
pseudo-randomness,
Cosmos
Cluster
4.
(http://cosmos.ucdavis.edu/archives/2012/cluster4/Adsuara,%20Justin. pdf. Accessed 2012, August
14).
Mike, H., Paul, K., & Mark, E. M.(2012). Analysis of Intel’s Ivy Bridge digital random number generator.
(http://www.cryptography.com/public /pdf/Intel_TRNG_Report_20120312.pdf. Accessed 2012, August
20.)
Mohammed, A., & Annapurna, P., P. (2012.). Implementing a secure key issuing scheme for communication in
p2p networks. M.S.Ramiah Institute of Technology,Department of Computer Science and Engineering,
Bangalore- 560054. India.
Yehuda, L. (2006). Introduction to cryptography, 89-656. (http://u.cs.biu.ac.il/~lindell/89-656/Intro-to-crypto89-656.pdf. Accessed 2012, August 1).
Yuval, I. (2011). Theory of cryptography. 8th Theory of Cryptography Conference, TCC 2011 Providence, RI,
USA.

57
This academic article was published by The International Institute for Science,
Technology and Education (IISTE). The IISTE is a pioneer in the Open Access
Publishing service based in the U.S. and Europe. The aim of the institute is
Accelerating Global Knowledge Sharing.
More information about the publisher can be found in the IISTE’s homepage:
http://www.iiste.org
CALL FOR JOURNAL PAPERS
The IISTE is currently hosting more than 30 peer-reviewed academic journals and
collaborating with academic institutions around the world. There’s no deadline for
submission. Prospective authors of IISTE journals can find the submission
instruction on the following page: http://www.iiste.org/journals/
The IISTE
editorial team promises to the review and publish all the qualified submissions in a
fast manner. All the journals articles are available online to the readers all over the
world without financial, legal, or technical barriers other than those inseparable from
gaining access to the internet itself. Printed version of the journals is also available
upon request of readers and authors.
MORE RESOURCES
Book publication information: http://www.iiste.org/book/
Recent conferences: http://www.iiste.org/conference/
IISTE Knowledge Sharing Partners
EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open
Archives Harvester, Bielefeld Academic Search Engine, Elektronische
Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial
Library , NewJour, Google Scholar

More Related Content

What's hot

IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET Journal
 
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...paperpublications3
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsConference Papers
 
Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology IJECEIAES
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysissneha penmetsa
 
Project sentiment analysis
Project sentiment analysisProject sentiment analysis
Project sentiment analysisBob Prieto
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
 
A Probabilistic Approach towards the Prevention of Error Propagation Effect o...
A Probabilistic Approach towards the Prevention of Error Propagation Effect o...A Probabilistic Approach towards the Prevention of Error Propagation Effect o...
A Probabilistic Approach towards the Prevention of Error Propagation Effect o...IDES Editor
 
A SURVEY ON DATA ANONYMIZATION FOR BIG DATA SECURITY
A SURVEY ON DATA ANONYMIZATION FOR BIG DATA SECURITYA SURVEY ON DATA ANONYMIZATION FOR BIG DATA SECURITY
A SURVEY ON DATA ANONYMIZATION FOR BIG DATA SECURITYJournal For Research
 
Randomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsRandomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsijcisjournal
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Journals
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageeSAT Publishing House
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Countsacijjournal
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataIRJET Journal
 
Authentication techniques in smart grid: a systematic review
Authentication techniques in smart grid: a systematic reviewAuthentication techniques in smart grid: a systematic review
Authentication techniques in smart grid: a systematic reviewTELKOMNIKA JOURNAL
 
A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...IJCNCJournal
 
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...IJCNCJournal
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network IJECEIAES
 

What's hot (20)

IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using PysparkIRJET- Analysis and Detection of E-Mail Phishing using Pyspark
IRJET- Analysis and Detection of E-Mail Phishing using Pyspark
 
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
PUBLIC INTEGRIYT AUDITING FOR SHARED DYNAMIC DATA STORAGE UNDER ONTIME GENERA...
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology
 
project sentiment analysis
project sentiment analysisproject sentiment analysis
project sentiment analysis
 
Project sentiment analysis
Project sentiment analysisProject sentiment analysis
Project sentiment analysis
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 
A Probabilistic Approach towards the Prevention of Error Propagation Effect o...
A Probabilistic Approach towards the Prevention of Error Propagation Effect o...A Probabilistic Approach towards the Prevention of Error Propagation Effect o...
A Probabilistic Approach towards the Prevention of Error Propagation Effect o...
 
A SURVEY ON DATA ANONYMIZATION FOR BIG DATA SECURITY
A SURVEY ON DATA ANONYMIZATION FOR BIG DATA SECURITYA SURVEY ON DATA ANONYMIZATION FOR BIG DATA SECURITY
A SURVEY ON DATA ANONYMIZATION FOR BIG DATA SECURITY
 
Randomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithmsRandomness evaluation framework of cryptographic algorithms
Randomness evaluation framework of cryptographic algorithms
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
A model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakageA model to find the agent who responsible for data leakage
A model to find the agent who responsible for data leakage
 
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support CountsSymmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
Symmetric-Key Based Privacy-Preserving Scheme For Mining Support Counts
 
Review
ReviewReview
Review
 
J1802035460
J1802035460J1802035460
J1802035460
 
Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
 
Authentication techniques in smart grid: a systematic review
Authentication techniques in smart grid: a systematic reviewAuthentication techniques in smart grid: a systematic review
Authentication techniques in smart grid: a systematic review
 
A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...
 
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
THE METHOD OF DETECTING ONLINE PASSWORD ATTACKS BASED ON HIGH-LEVEL PROTOCOL ...
 
A new hybrid text encryption approach over mobile ad hoc network
A new hybrid text encryption approach over mobile  ad hoc network A new hybrid text encryption approach over mobile  ad hoc network
A new hybrid text encryption approach over mobile ad hoc network
 

Similar to Comparative analysis of efficiency of fibonacci random number generator algorithm and gaussian random number generator algorithm in a cryptographic system.

IRJET- Enhanced Security using Genetic Algorithm in Cryptography
IRJET-  	  Enhanced Security using Genetic Algorithm in CryptographyIRJET-  	  Enhanced Security using Genetic Algorithm in Cryptography
IRJET- Enhanced Security using Genetic Algorithm in CryptographyIRJET Journal
 
Intel Random Number Generator
Intel Random Number GeneratorIntel Random Number Generator
Intel Random Number GeneratorXequeMateShannon
 
Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...butest
 
Working with cryptographic key information
Working with cryptographic key informationWorking with cryptographic key information
Working with cryptographic key informationIJECEIAES
 
Genetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionGenetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionMajedahAlkharji
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity InnovationPete Burnap
 
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...IJNSA Journal
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyacijjournal
 
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...AJSERJournal
 
Comparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmComparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmKhubaib Ahmad Kunjahi
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...Ulf Mattsson
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 
Titles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdfTitles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdfinfo751436
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET Journal
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachIJERA Editor
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorIRJET Journal
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...AnirbanBhowmik8
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewIJERA Editor
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...IJECEIAES
 

Similar to Comparative analysis of efficiency of fibonacci random number generator algorithm and gaussian random number generator algorithm in a cryptographic system. (20)

IRJET- Enhanced Security using Genetic Algorithm in Cryptography
IRJET-  	  Enhanced Security using Genetic Algorithm in CryptographyIRJET-  	  Enhanced Security using Genetic Algorithm in Cryptography
IRJET- Enhanced Security using Genetic Algorithm in Cryptography
 
Intel Random Number Generator
Intel Random Number GeneratorIntel Random Number Generator
Intel Random Number Generator
 
Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...
 
Working with cryptographic key information
Working with cryptographic key informationWorking with cryptographic key information
Working with cryptographic key information
 
H42063743
H42063743H42063743
H42063743
 
Genetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryptionGenetic algorithm based key generation for fully homomorphic encryption
Genetic algorithm based key generation for fully homomorphic encryption
 
AI for Cybersecurity Innovation
AI for Cybersecurity InnovationAI for Cybersecurity Innovation
AI for Cybersecurity Innovation
 
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
 
Behavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison studyBehavioural biometrics and cognitive security authentication comparison study
Behavioural biometrics and cognitive security authentication comparison study
 
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
 
Comparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption AlgorithmComparative Analysis of Encryption Algorithm
Comparative Analysis of Encryption Algorithm
 
New enterprise application and data security challenges and solutions apr 2...
New enterprise application and data security challenges and solutions   apr 2...New enterprise application and data security challenges and solutions   apr 2...
New enterprise application and data security challenges and solutions apr 2...
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
Titles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdfTitles with Abstracts_2023-2024_Data Mining.pdf
Titles with Abstracts_2023-2024_Data Mining.pdf
 
IRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine LearningIRJET- Detecting Phishing Websites using Machine Learning
IRJET- Detecting Phishing Websites using Machine Learning
 
Improving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approachImproving the accuracy of fingerprinting system using multibiometric approach
Improving the accuracy of fingerprinting system using multibiometric approach
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
 
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...An Approach on Data Security with the Combination of Symmetric and Asymmetric...
An Approach on Data Security with the Combination of Symmetric and Asymmetric...
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In Labview
 
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
Revealing AES Encryption Device Key on 328P Microcontrollers with Differentia...
 

More from Alexander Decker

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Alexander Decker
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inAlexander Decker
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesAlexander Decker
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksAlexander Decker
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dAlexander Decker
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceAlexander Decker
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifhamAlexander Decker
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaAlexander Decker
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenAlexander Decker
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksAlexander Decker
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget forAlexander Decker
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabAlexander Decker
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...Alexander Decker
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalAlexander Decker
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesAlexander Decker
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbAlexander Decker
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloudAlexander Decker
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveragedAlexander Decker
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenyaAlexander Decker
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health ofAlexander Decker
 

More from Alexander Decker (20)

Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...Abnormalities of hormones and inflammatory cytokines in women affected with p...
Abnormalities of hormones and inflammatory cytokines in women affected with p...
 
A validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale inA validation of the adverse childhood experiences scale in
A validation of the adverse childhood experiences scale in
 
A usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websitesA usability evaluation framework for b2 c e commerce websites
A usability evaluation framework for b2 c e commerce websites
 
A universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banksA universal model for managing the marketing executives in nigerian banks
A universal model for managing the marketing executives in nigerian banks
 
A unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized dA unique common fixed point theorems in generalized d
A unique common fixed point theorems in generalized d
 
A trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistanceA trends of salmonella and antibiotic resistance
A trends of salmonella and antibiotic resistance
 
A transformational generative approach towards understanding al-istifham
A transformational  generative approach towards understanding al-istifhamA transformational  generative approach towards understanding al-istifham
A transformational generative approach towards understanding al-istifham
 
A time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibiaA time series analysis of the determinants of savings in namibia
A time series analysis of the determinants of savings in namibia
 
A therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school childrenA therapy for physical and mental fitness of school children
A therapy for physical and mental fitness of school children
 
A theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banksA theory of efficiency for managing the marketing executives in nigerian banks
A theory of efficiency for managing the marketing executives in nigerian banks
 
A systematic evaluation of link budget for
A systematic evaluation of link budget forA systematic evaluation of link budget for
A systematic evaluation of link budget for
 
A synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjabA synthetic review of contraceptive supplies in punjab
A synthetic review of contraceptive supplies in punjab
 
A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...A synthesis of taylor’s and fayol’s management approaches for managing market...
A synthesis of taylor’s and fayol’s management approaches for managing market...
 
A survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incrementalA survey paper on sequence pattern mining with incremental
A survey paper on sequence pattern mining with incremental
 
A survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniquesA survey on live virtual machine migrations and its techniques
A survey on live virtual machine migrations and its techniques
 
A survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo dbA survey on data mining and analysis in hadoop and mongo db
A survey on data mining and analysis in hadoop and mongo db
 
A survey on challenges to the media cloud
A survey on challenges to the media cloudA survey on challenges to the media cloud
A survey on challenges to the media cloud
 
A survey of provenance leveraged
A survey of provenance leveragedA survey of provenance leveraged
A survey of provenance leveraged
 
A survey of private equity investments in kenya
A survey of private equity investments in kenyaA survey of private equity investments in kenya
A survey of private equity investments in kenya
 
A study to measures the financial health of
A study to measures the financial health ofA study to measures the financial health of
A study to measures the financial health of
 

Recently uploaded

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Recently uploaded (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Comparative analysis of efficiency of fibonacci random number generator algorithm and gaussian random number generator algorithm in a cryptographic system.

  • 1. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.10, 2013 www.iiste.org Comparative Analysis of Efficiency of Fibonacci Random Number Generator Algorithm and Gaussian Random Number Generator Algorithm in a Cryptographic System. Dr. Ing. Edward Opoku-Mensah1, Abilimi A. Christopher2, Francis Ohene Boateng3 1. Department of Information Technology Education, University of Education Winneba, P.O.Box 1277, Kumasi, Ghana, Email : ingeopm@gmail.com 2. Department of Computer Science, Christian Service University College, P.O. Box 3110, Kumasi, Ghana, Email: cabilimia@gmail.com 3. Department of Information Technology Education, University of Education Winneba, P.O.Box 1277, Kumasi, Ghana. Email : fanbotgh@yahoo.com Abstract Random Numbers determine the security level of Cryptographic Applications as they are used to generate padding schemes in the encryption and decryption process as well as used to generate cryptographic keys. The more randomness in the numbers a generator generates the more effective the cryptographic algorithm, and the more secured it is to be used for protecting confidential data. Sometimes developers find it difficult to determine which Random Number Generators (RNGs) can provide a much secured Cryptographic System for secured enterprise application implementations. Two of such random number generators include the Fibonacci Random Number Generator and the Gaussian Random Generator. The researchers sought to determine, between these two, the better to be used for improving data security in cryptographic software systems. The researchers employed statistical tests like Frequency test, Chi-Square test, Kolmogorov-Smirnov test on the first 100 random numbers between 0 and 1000 generated using the above generators. The research concluded that Fibonacci Random Number Generator is more efficient than the Gaussian Random Number Generator and therefore recommended the choice of Fibonacci Random Number Generator when choosing between the two for use in a cryptographic system for better data security. Keywords: Cryptographic Algorithms, Random Number Generators, encryption, decryption 1. Introduction According to Kessler (2012), in the information security world, it is repeatedly examining statements like ‘protected via 128-bit Advance Encryption Standard’ or ‘sheltered by 2048 bit validation’. Invariably people would want to know the data security or safety power of various cryptographic algorithms. Some cryptographic algorithms like Rivest, Shamir Adleman, Elliptic curve cryptography and Advance Encryption Standard contain a confirmation evidence of not being easy to crack. These cryptographic algorithms are mostly used in protocols to take care of data that need to be protected for their confidentially, integrity and identity. As an illustration think about using Secure Socket Layer (SSL) or Transport Layer Security (TLS) while a book is bought from an online market like the Amazon, or when a sum of money will have to be transferred to your bank account by a bond (Hasani, 2011). Another example can be seen in how Internet Protocol Security (IPsec) and Internet Key Exchange (IKE) are used while a computer is connected to a network in order to access information on the World Wide Web. AuthenTec Embedded Security Solutions (2010) stated that some of the things that are not often seen are random number generator strengths and their use by security applications. The most important thing software designers are concerned with is the controlled use of bits and their creation rate, but not much of the real randomness associated with the bits produced. The security level of a cryptographic application is dependent on the importance of the random numbers used in the application. Furthermore, how intricate it is to crack a cryptographic system is dependent on the quality of random numbers used in the cryptography (Biege, 2006). High security cryptographic system can be achieved if researchers can understand cryptographic systems are developed based on the principle of cryptographic algorithms design called Kerckhoff Principle which states that “The security of the system must depend solely on the key material, and not on the design of the system”(AuthenTec Embedded Security Solutions, 2010). This is due to the fact that before an attacker can break modern cryptographic systems, the attacker needs to deduce the keys used in developing the algorithms as well as the protocol used. The strength of a cryptographic application is expressed with the assumption that the attacker has no idea of the bits and its pattern used in the key formation and used in the cryptographic systems. An enhanced attack against cryptographic system exposes extra key bits that can be computed by looking at the (inadequate sum of) output data, and that diminishes the ‘valuable strength’ of an algorithm. 50
  • 2. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.10, 2013 www.iiste.org A manual prepared by the Internet Engineering Task Force (IETF) and named a ‘Best Practices’ document is used to describe the significance of true randomness in cryptographic applications, and these serve as guidelines on how random numbers are created (Eastlake, Schiller & Crocker, 2005). The National Institute of Standard and Technology provides a subdivision on Random Number Creation in their Cryptographic Toolbox pages, and a number of standards organizations like International Standard Organisation (ISO), Institute of Electrical and Electronic Engineers (IEEE), IETF, and American National Standards Institute (ANSI), are working on, standards associated to random number generation. This goes to show the importance of proper random number generation. This research therefore compares the effectiveness of Pseudo Random Number Generator so as to get a secured cryptographic system, when implemented in cryptography. 2. Random numbers in Cryptography A high-quality Cryptographic System needs good-quality random numbers (Mike, Paul, & Mark, 2012). This paper evaluates software security based on Pseudo Random Number Generator Algorithms (PRNGA) needed for Cryptographic Applications. Nearly each and every cryptographic protocol needs the exploit and creation of furtive ethics that attackers should not know. Algorithms for the generation of random numbers are requisites for generation of private keys or public key pairs for symmetry and hybrid cryptosystems as well as asymmetric encryption algorithms like Diffie-Hellman, Rivest Shamir Adleman and Digital Signature Algorithm. Random Number Generators are considered necessary to generate blinding values, challenges, padding bytes, and nonces (salts) in cryptographic applications. The randomness of keys used in cryptographic system is the pre-requisite for security protocol; RNGs used in cryptographic systems ought to convene rigid parameters. Hiding the important patterns concerning the output of the Random Number Generator from the attackers, as well as folks who know how the Random Number Generator Algorithm is designed, is very important in every cryptographic application. For illustration, the clear entropy of the output of Random Numbers Generator must be as close up as probable to the length of the bit use. The paper compares the efficiency of two different random number generators, Fibonacci Random Number Generator Algorithm and Gaussian Random Number Generator Algorithm, in Cryptographic Algorithm to see the better one to be used in cryptography. The ideal quality of high-quality pseudo random number generator is that the series should not be easy to predict by the attacker of a cryptosystem. This is because sometimes the adversary may know the cryptographic algorithm used, and this is what is called the Kerckhoff's principle (Yehuda, 2006). According to Andrew et al. (2010), an additional reason for statistical randomness of a pseudo random number generator is the basis for good pseudo random number generators. All correlations and trends in the generators should be hidden. Statistically these can be proven. The statistical component of a pseudo random number generator shows that every value or result over a given range has equal chance of incidence. Every number has a probability of ½ in the range of [0, 1]. Every couple of numbers used will have an occurrence of ¼ and a frequency of 1/8 for every triplet. That is when the basis for the numbers generated is considered not biased and consecutive output is considered not correlated. The mean and variance computation must also be included in the statistical randomness test. If the output for the Mean is closer to 0.5 and that of the variance is closer to 0.08, then the pseudo random numbers are homogeneous. According to Andrew et al. (2010), another test for the efficacy of pseudo random numbers generators is the Frequency Test also called the Monobits. The Frequency Test concentrates on the percentage of ones and zeroes in the entire series of numbers produced by the generators. This test is used to establish that the series of numbers generated or created produces the same number of ones and zeroes as should be anticipated for any true random series. That is the assessment of how close the fraction of ones is to ½, which means that, the amount of zeroes and ones in series must be almost the same when compared to each other. The Monobit Test in a Block concentrates on the percentage of ones and zeroes in the Blocks of M-bits. This assessment ascertains whether M/2 is roughly the number of ones in the block of M-bit. According to Justin (2012), the effectiveness of Pseudo Random Number Generator algorithms also depends on the period. Every algorithm has input parameters that produce an equivalent period. What happens is that any time an algorithm for generating the random numbers creates a repeated value then it will start the generation process all over again in order to ensure that the results are not correlated. Therefore it should be recognized that the seed or the value or the parameter determines the period of the algorithm used. This means that the more the repetition, the shorter the period used and vice versa. Lastly, uniformity also determines the period of the pseudo random number generator. That is every perfect generator algorithm will produce records that are consistently distributed within a certain interval. This makes it very difficult for algorithms that have smaller periods, if even they have huge intervals, to pass this kind of statistical test for randomness (Christophe & Diethelm, 2003). They also explained that if there exist correlations within the numbers generated, then the algorithms with larger period will experience massive 51
  • 3. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.10, 2013 www.iiste.org problems. Christophe and Diethelm (2003), stated that the ideal thing to do to any cryptographic application systems is to make sure that the generator used in the generation of the random numbers produces values that correlate serially. When smaller values of numbers are produced via random number generators, then algorithms that have larger periods and high-uniformity may be highly inconsistent. The security of the generator then depends on the correlation of values produced, and hence it can be explained that the more the system is secured the lesser the correlations of numbers in the generator and vice versa. 3. Methodology The researchers employed statistical tests for testing the randomness of two pseudo random numbers generators, namely Fibonacci Random Number Generator and Gaussian random number generator algorithms, in order to determine whether a set of data has a recognizable pattern to it or not. These tests are Chi-Square Test and Kolmogorov-Smirnov test (KS-test). 3.1 Chi-square Test The Chi-Square Test has shown to conform to the errors of pseudo random series generators sensitivity. The distribution of the Chi-Square is a non-negative value and a proportion which show how often real random series should surpass a computed number or value determined as a result for collections of zeroes and ones in a certain data file. The procedures used are as follows: i. Java Programming codes are written for each of Fibonacci Random Number Generator and Gaussian Random Number Generator. ii. This test involved producing sequences of 100 random integers between 0 and 1000 using the Java codes for each of Fibonacci Random Number Generator and Gaussian Random Number Generator. iii. The generated random numbers in (ii) above is coded in Statistical Package for Social Science (SPSS) software to test for the randomness of the numbers in the generators. The procedures include: a. Go to and click on the Analyse Menu on the SPSS bar after the data has been coded. b. Choose Nonparametric Test on the submenu. c. Go to and then Click on Chi-Square Test. d. Select the two random numbers generators and move them to the variable list. e. The results generated for the Chi-Square Test. iv. For uniform distributions of random numbers from the generators, then the expectations is that there should be 1 appearance or occurrence for the number 1 or 2 or 3 and so on to the end of the dimension of the numbers, 100. Then how often each of the numbers appears will be expected to have a frequency of 1.0 or 1.1 averagely for all the numbers from 1 to 100 ranges. The observed frequency is the real frequency for every one of the numbers generated by the generator with the ranges of numbers specified. The Chi-Square value or statistics is calculated from the difference between the observed frequency of the test and that of the expected frequency of every one of the numbers generated as follows: R χ2 = ∑ i =1 (Oi − Ei ) 2 Ei R is the distinct individual random numbers likely (R = 100), the number of the observed frequencies of happenings or occurrences for the random numbers (i) is Oi and where the frequency of expectation or the expected frequency is Ei for the random integer or number i. Since the expectation is that the integer distribution must uniformly spread, then the occurrences for every random number or integer must have equal expected frequencies. Ei can then be computed with N as the total number of observations, using the equation above. There is one way to explain the above percentages namely; it explains the level of non-randomness suspicions, that is, the degree to which the series of random numbers generated is assumed of being non-random. If the percentages are between 90% and 95%, 10% and 5% shows the series is “almost suspect”. If the percentage is in the range of 99% and 95% or in the range of 1% and 5%, then the series is suspect. Finally, if the percentage is greater than 99% or less than 1%, then the series is almost certainly not random. 3.2 Kolmogorov-Smirnov Test (KS-test) The Kolmogorov-Smirnov (K-S) test is based on the Empirical Distribution Function (ECDF). Given N ordered data points Y1, Y2, ..., YN, the ECDF is defined as E N = n (i ) N where n(i) is the number of points less than Yi and the Yi are ordered from smallest to largest value. This is a step function that increases by 1/N at the value of each ordered data point. The procedures used to perform the Kolmogorov-Smirnov test (KS-test) for the two random numbers generators namely: Fibonacci Random Number Generator and Gaussian Random Number Generator are as 52
  • 4. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.10, 2013 www.iiste.org follows: i. Java Programming codes are written for each of Fibonacci Random Number Generator and Gaussian Random Number Generator. This test involved produces sequences of 100 random integers between 0 and 1000 using the Java codes for each of Fibonacci Random Number Generator and Gaussian Random Numbers Generator. The generated random numbers in (ii) above is coded in Statistical Package for Social Science (SPSS) software to test for randomness of the numbers in the generators. The procedures include: a. Go to and click on the Analyse Menu on the SPSS bar after the data has been coded. b. Choose Nonparametric Test on the submenu. c. Go to and then Click on One Sample KS-Test. d. Select the two random numbers generators and move them to the variable list and check Normal. e. Click on Exact tap and select asymptotic option and then click OK. ii. iii. 4. Results 4.1 Gaussian Random Number Generator This generator produces smaller random numbers at the beginning and at the end of the range used, while producing bigger numbers at the middle of the range of the numbers generated as shown in Figure 1. However abnormal uniformity occurs at the range of -100 to 50. The generator produces random numbers that are much skewed to the center, hence produces a substantially good standard deviation of 68.515. This standard deviation value shows that the generator obeys the normal distribution curve. Table 1 The descriptive statistics of the Random Numbers Generators Generators N Mean Std. Minimum Maximum Deviation Gaussian Random Generator Fibonacci Random Generator Number 100 5.08 68.51 Number 100 -90142675.73 975930540 -121 126 -2092787285 2.E9 Gausian Random Number Generator 150 Mean =5.08 Stdev=68.515 N = 100 50 0 1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89 93 97 Random numbers 100 -50 -100 -150 Range of generation Figure 1: The trend of randomness Gaussian Random number Generator 53
  • 5. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.10, 2013 www.iiste.org 4.2 Fibonacci Random Number Generator From the results generated, it is found out that the Fibonacci Random Number Generator started with smaller random numbers at the beginning, elevates gradually, gets to its peak at a value of 0.0E0 and declines gradually to the end of the range as in Figure 2. This result tends to obey the normal distribution curve more than all the other generators studied, with standard deviation of 9.759E8.This represents the greater deviation of individual numbers produced by the generator from each other and hence not normally distributed. Fibonacci Random Number Generator Mean =-90142675.73 Stdev=9.759E8 N=100 2.5E+09 2E+09 1E+09 500000000 0 -5E+08 1 5 9 13 17 21 25 29 33 37 41 45 49 53 57 61 65 69 73 77 81 85 89 93 97 Random numbers 1.5E+09 -1E+09 -1.5E+09 -2E+09 -2.5E+09 Range of Generation Figure 2: The trend of randomness in Fibonacci Random Number Generator The researchers compared the two Pseudo Random Number Generators (PRNGs) studied namely, Fibonacci Random Number Generator (FRNG) and Gaussian Random Number Generator (GRNG). The results of the repetition of the two generators were used to draw a line graph as shown in Figure 3. The figure shows a line graph of frequencies for the two random numbers generators. It was found out that the random number generator with the highest number of repeated numbers is Gaussian Random Number Generator, while Fibonacci Random Number Generator had no repeated numbers in the random numbers. This means that numbers were more likely to be random with Fibonacci Random Number Generator compared with the Gaussian Random Number Generator algorithm as shown in Figure 3. 54
  • 6. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.10, 2013 www.iiste.org Numbers Repetition 4.5 4 frequency 3.5 3 2.5 2 GRNG 1.5 FRNG 1 0.5 0 1 6 11 16 21 26 31 36 41 46 51 56 61 66 71 76 81 86 91 96 Random numbers generated Figure 3: The number of repetitions in Pseudo Random Number Generators 4.3 The Chi-Square Test for Independence of Random Numbers The analysis of the factors responsible for randomness in a random number generator showed that factors tend to give many considerations to Fibonacci Random Number Generator than the Gaussian Random Number Generators compared with. This is because the Chi-Square analysis for the independence of numbers in the generators showed that numbers were more independent to each other in the Fibonacci Random Number Generator (Chi-Square Value = 0.000) than the Gaussian Random Number Generators under studied. This is because independence of numbers increases with the decrease in Chi-Square Value and vice versa. However, the worse generator in terms of independence is Gaussian Random Number Generator (ChiSquare value = 14.400) as shown in Table 2. This is because it produces a higher Chi-Square Value from the test. This also means that numbers in the GRNG were more likely to depend on each other than the Fibonacci Random Number Generator. Table 2 represents the descriptive statistics of the analysis (Standard Deviation, Minimum, and Maximum & Mean). Standard deviation of numbers increases with decreasing normality and vice versa. This means the higher the standard deviation value, the higher the deviation from the normal and vice versa. Therefore Fibonacci Random Number Generator is more deviated from the normal distribution, while Gaussian Random Number Generator produces numbers that obeys the normal distribution far more than the Fibonacci Random Generator as shown in Table 2. Table 2 The Chi-Square Test Result for Pseudo-Random Number Generator Test Statistics Gaussian Random Fibonacci Random Number Generator Number Generator 14.400a .000b Chi-Square 87 99 Df 1.000 1.000 Asymp.Sig. 1. 000a 1.000b Monte Carlo Sig. 99% Confidence Interval 1.000 1.000 Lower Bound 1.000 1.000 Upper Bound a. 88 cells (100.0%) have expected frequencies less than 5. The minimum expected cell frequency is 1.1. b. . 100 cells (100.0%) have expected frequencies less than 5. The minimum expected cell frequency is 1.0. 4.4 The Kolmogorov-Smirnov Test for Uniformity of random numbers In Kolmogorov-Smirnov, the more the z-value falls in between the lower and upper bound of the Monte 55
  • 7. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.10, 2013 www.iiste.org carlo Significance.(2-tailed) Value, the more uniform the numbers generated by the random number generator is and vice versa. From Table 3, the Gaussian Random Number Generator produces more uniform numbers than its counterpart Fibonacci Random Number Generator. This is because Gaussian Random Number Generator produces z-value that fall closer between the lower and upper bounds of z-value, while Fibonacci Random Number Generator produces z-value that fall outside the range of lower and upper bounds z-value as shown in Table 3. The factors responsible for decision also showed that factors tend to give more considerations to Fibonacci Random Numbers Generator (K-S value = 2.020) than the Gaussian Random Number Generator compared with in this paper. This therefore makes Fibonacci Random Number Generator less uniform than the Gaussian Random Number Generator (K-S value = 0.725) as shown in Table 3. However, the lesser the uniformity of numbers produced, the more independent numbers are and vice versa. This accounts for why Fibonacci Random Number Generator is more independent of the two generators. Table 3 The Kolmogorov-Smirnov Test for Uniformity of random numbers Gaussian Random Statistics Number Generator Minimum 100 -121 Maximum Absolute N Uniform Parameters 126 0.072 Fibonacci Random Number Generator 100 2092787285 2144908973 0.202 Most Extreme Differences Positive Negative Kolmogorov-Smirnov Z Asymp.Sig. (2-tailed) Sig. Monte carlo.Sig.(2- 90%Confidence tailed) Interval 0.072 -0.060 Lower Bound Upper Bound 5. 0.202 -0.164 0.725 0.670 0.640 0.561 2.020 0.001 0.000 0.000 0.719 0.23 Discussions The analysis of factors for uniformity also shows that factors tend to give more considerations to Gaussian Random Number Generator than the Fibonacci generator. This therefore makes Fibonacci random Number Generator less uniform and more secure than Gaussian Random Numbers Generator. A good PRNG will produce a sequence of numbers that cannot be easily guessed or determined by an adversary. The general assumption is that the opponent knows the algorithm being used. This is usually referred to as Kerckhoff's principle (Yehuda, 2006). This assertion is evidenced in the findings relating to Fibonacci Random Number Generator and the Gaussian Random Number Generator. The Chi-Square analysis for the independence of numbers in the generators showed that numbers were more independent to each other in the Fibonacci Random Number Generator than the other generator under study and therefore less likely to be guessed by an adversary. According to Andrew et al. (2010), another factor to be considered for a good PRNG is that the series generated should be statistically random. It should be able to hide all patterns and correlations. This can be tested by some statistical tests. A PRNG should have the statistical property that each value over the interval has an equally likely occurrence. In the case of the interval [0,1] each number would appear with the frequency 1/2 in a long run. Each pair of numbers would appear with frequency 1/4, and each triplet with frequency 1/8. This would form a basis of observation that the numbers being generated are unbiased and successive outcomes are uncorrelated (James et al., 2003). Mean should be close to 0.5 and variance 1/12 or 0.08 for uniformly distributed pseudorandom numbers. This is also evidenced more in Gaussian Random Number Generator with lower Variance (square root of standard deviation) compared with that of Fibonacci Random Number Generator. Again, Andrew et al. (2010) stated that Frequency (Monobits) Test is also another test for efficiency. The focus of the test is the proportion of zeroes and ones for the entire sequence. The purpose of this test is to determine whether that number of ones and zeros in a sequence are approximately the same as would be 56
  • 8. Computer Engineering and Intelligent Systems ISSN 2222-1719 (Paper) ISSN 2222-2863 (Online) Vol.4, No.10, 2013 www.iiste.org expected for a truly random sequence. The test assesses the closeness of the fraction of ones to ½, that is, the number of ones and zeroes in a sequence should be about the same. Test for Frequency within a Block: the focus of the test is the proportion of zeroes and ones within M-bit blocks. This test also determines whether the frequency of ones in an M-bit block is approximately M/2. In the analysis of the factors responsible for decision to be taken on the two random number generators revealed that Fibonacci Random Number Generator produces random numbers that have less number of ones and zeroes to be about the same than the Gaussian Random Number Generator and hence makes numbers generated by former more independent of each other. 6. Conclusions The discussions of the findings indicate that Gaussian Random Number Generator Algorithm is more uniform than the Fibonacci Random Number Generator Algorithm. Consequently, Gaussian Random Number Generator algorithm is less secure than the Fibonacci Random Number Generator Algorithm, and therefore makes the Fibonacci Random Number Generator more efficient than the Gaussian Random Number Generator. It is therefore recommended that the Fibonacci Random Number Generator Algorithm, instead of the Gaussian Random Number Generator, is used for better data security of enterprise software applications in a cryptographic system. References Andrew, R., Juan, S., James, N., Miles, S., Elaine, B., & Stefan, L. (2010). A statistical test suite for random and pseudorandom number generators for cryptographic application, Revision 1a, USA. Special Publication 800-22 (http://csrc.nist.gov/publications/nistpubs/800-22- rev1a/SP800-22rev1a.pdf. Accessed 2012, September 1). AuthenTec Embedded Security Solutions (2010). The importance of true randomness in cryptography. (http://www.authentec.com/Portals/5/Documents/TRNG%20Whitepaper_91411.pdf. Accessed 2012, January 14). Biege, T. (2006). Analysis of a strong pseudo random number generator. ( http://www.suse.de/~thomas/papers/random-analysis.pdf. Accessed 2012, February). Christophe, D., & Diethelm, W. (2003). A note on random number generation. (http://cran.r project.org/web/packages/ randtoolbox/ vignettes/fullpres.pdf. Accessed 2012, September 7). Eastlake, D., Schiller, J. & Crocker, S. (2005). RFC 4086. (http://www.ietf.org/ rfc/rfc4086.txt. Accessed 2012, June 10). Fisnik, H. (2011). Safe internet banking. (http://www.itknowledge24.com /blog/safe-internet-banking/ Accessed 2012, June 10). Gary, C. K. (2012). An overview of cryptography. (http://www.garykeSecure Socket Layerer. net/ library/crypto.html. Accessed 2012, August 10). Justin, A. (2012). Progressing past poor pseudo-randomness, Cosmos Cluster 4. (http://cosmos.ucdavis.edu/archives/2012/cluster4/Adsuara,%20Justin. pdf. Accessed 2012, August 14). Mike, H., Paul, K., & Mark, E. M.(2012). Analysis of Intel’s Ivy Bridge digital random number generator. (http://www.cryptography.com/public /pdf/Intel_TRNG_Report_20120312.pdf. Accessed 2012, August 20.) Mohammed, A., & Annapurna, P., P. (2012.). Implementing a secure key issuing scheme for communication in p2p networks. M.S.Ramiah Institute of Technology,Department of Computer Science and Engineering, Bangalore- 560054. India. Yehuda, L. (2006). Introduction to cryptography, 89-656. (http://u.cs.biu.ac.il/~lindell/89-656/Intro-to-crypto89-656.pdf. Accessed 2012, August 1). Yuval, I. (2011). Theory of cryptography. 8th Theory of Cryptography Conference, TCC 2011 Providence, RI, USA. 57
  • 9. This academic article was published by The International Institute for Science, Technology and Education (IISTE). The IISTE is a pioneer in the Open Access Publishing service based in the U.S. and Europe. The aim of the institute is Accelerating Global Knowledge Sharing. More information about the publisher can be found in the IISTE’s homepage: http://www.iiste.org CALL FOR JOURNAL PAPERS The IISTE is currently hosting more than 30 peer-reviewed academic journals and collaborating with academic institutions around the world. There’s no deadline for submission. Prospective authors of IISTE journals can find the submission instruction on the following page: http://www.iiste.org/journals/ The IISTE editorial team promises to the review and publish all the qualified submissions in a fast manner. All the journals articles are available online to the readers all over the world without financial, legal, or technical barriers other than those inseparable from gaining access to the internet itself. Printed version of the journals is also available upon request of readers and authors. MORE RESOURCES Book publication information: http://www.iiste.org/book/ Recent conferences: http://www.iiste.org/conference/ IISTE Knowledge Sharing Partners EBSCO, Index Copernicus, Ulrich's Periodicals Directory, JournalTOCS, PKP Open Archives Harvester, Bielefeld Academic Search Engine, Elektronische Zeitschriftenbibliothek EZB, Open J-Gate, OCLC WorldCat, Universe Digtial Library , NewJour, Google Scholar