Cryptology ePrint Archive: Report 2022/005

Pseudorandom Bit Generation with Asymmetric Numeral Systems

Josef Pieprzyk and Marcin Pawlowski and Pawel Morawiecki and Arash Mahboubi and Jarek Duda and Seyit Camtepe

Abstract: The generation of pseudorandom binary sequences is of a great importance in numerous applications stretching from simulation and gambling to cryptography. Pseudorandom bit generators (PRBGs) can be split into two classes depending on their claimed security. The first includes PRBGs that are provably secure (such as the Blum-Blum-Shub one). Security of the second class rests on heuristic arguments. Sadly, PRBG from the first class are inherently inefficient and some PRBG are insecure against quantum attacks. While, their siblings from the second class are very efficient, but security relies on their resistance against known cryptographic attacks.

This work presents a construction of PRBG from the asymmetric numeral system (ANS) compression algorithm. We define a family of PRBGs for $2^R$ ANS states and prove that it is indistinguishable from a truly random one for a big enough $R$. To make our construction efficient, we investigate PRBG built for smaller $R=7,8,9$ and show how to remove local correlations from output stream. We permute output bits using rotation and Keccak transformations and show that permuted bits pass all NIST tests. Our PRBG design is provably secure (for a large enough $R$) and heuristically secure (for a smaller $R$). Besides, we claim that our PRBG is secure against quantum adversaries.

Category / Keywords: secret-key cryptography / Pseudorandomness, Entropy Encoding, Compression, Asymmetric Numeral Systems, Indistinguishability, ANS, PRBG, PRNG, Keccak

Date: received 2 Jan 2022

Contact author: josef pieprzyk at gmail com

Available format(s): PDF | BibTeX Citation

Version: 20220107:165104 (All versions of this report)

Short URL: ia.cr/2022/005


[ Cryptology ePrint archive ]