LLMpediaThe first transparent, open encyclopedia generated by LLMs

pseudorandom generators

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: Oded Goldreich Hop 5
Expansion Funnel Raw 82 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted82
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
pseudorandom generators
Namepseudorandom generators
TypeAlgorithmic construct
FieldComputer science, Cryptography, Mathematics
Introduced1970s
NotableBlum–Micali, Linear congruential generator, Mersenne Twister

pseudorandom generators are deterministic algorithms that expand short, uniformly random seeds into long sequences that appear random to limited observers. They bridge theoretical frameworks from Alan Turing-era computation and practical systems deployed by institutions like National Institute of Standards and Technology, informing protocols used by organizations such as Internet Engineering Task Force, RSA Security, and European Union Agency for Cybersecurity. Their study connects figures and works including Michael Rabin, Leonard Adleman, Silvio Micali, Manuel Blum, and results from conferences like CRYPTO and STOC.

Definition and basic concepts

A pseudorandom generator (PRG) is formally a function G: {0,1}^s → {0,1}^n with n > s that is computationally indistinguishable from uniform by efficient distinguishers; foundational definitions trace to papers by Mihir Bellare, Oded Goldreich, Shafi Goldwasser, and Andrew Yao. Core parameters include seed length, expansion factor, and statistical distance; related constructs and comparisons involve one-way functions, hard-core predicates, random oracle model, and complexity classes like P and NP. Early practical instances such as the Linear congruential generator and later algorithms like Mersenne Twister illustrate tradeoffs between theoretical security and empirical behavior emphasized in works by Ronald Rivest and Whitfield Diffie.

Construction methods and complexity-theoretic foundations

Constructions of PRGs often reduce their existence to assumptions about primitives studied by Stephen Cook, Leslie Valiant, and Richard Karp, including proofs that one-way functions imply PRGs via techniques from Yao and Blum–Micali. Complexity-theoretic foundations exploit hardness amplifications, extractors developed by Noam Nisan, David Zuckerman, and derandomization frameworks advanced by Nisan, Sanjeev Arora, and Avi Wigderson; these connect to pseudorandomness notions in BPP versus P separations and the Hardness vs Randomness paradigm articulated by Noam Nisan and Avi Wigderson. Algebraic and number-theoretic constructions reference results by Évariste Galois-related finite field methods, Carl Friedrich Gauss-style residues, and reductions to lattice problems tied to work by Miklós Ajtai and Oded Regev.

Cryptographic pseudorandom generators

Cryptographic PRGs demand unpredictability and forward/backward secrecy and underpin protocols standardized by IETF and algorithms designed at IBM and Microsoft Research. Constructions such as the Blum–Micali generator, generators based on the RSA assumption, and those deriving security from discrete logarithm problem link to practitioners like Taher Elgamal and standards committees at NIST. Security proofs connect to reductions used in papers by Goldreich–Micali–Wigderson and modern lattice-based constructions leverage hardness conjectures evaluated by Chris Peikert and Daniele Micciancio.

Statistical properties and testing

Statistical properties include uniformity, autocorrelation, period, and spectral characteristics; empirical batteries such as Diehard tests and NIST Statistical Test Suite were developed by teams including George Marsaglia and Donald Knuth. Testing regimes employed in evaluation reports from NIST and academic benchmarks presented at USENIX and IEEE Symposium on Security and Privacy compare outputs from generators like Mersenne Twister, Xorshift, and cryptographic stream ciphers evaluated by authors such as Bruce Schneier and Ronald Rivest. Metrics tie back to measure-theoretic foundations associated with Andrey Kolmogorov and algorithmic randomness notions influenced by Per Martin-Löf.

Applications

PRGs are embedded across protocols and systems: secure key generation in Transport Layer Security and IPsec, simulation workloads in projects at Los Alamos National Laboratory, randomized algorithms taught in courses at MIT and Stanford University, and Monte Carlo methods used in CERN experiments and finance platforms at firms like Goldman Sachs. They support stream ciphers in standards influenced by National Security Agency analyses, randomized consensus in blockchain implementations such as Bitcoin and Ethereum, and randomized constructions in complexity-theoretic proofs presented at venues like FOCS and ICALP.

Security assumptions and attacks

Security rests on assumptions including existence of one-way functions, hardness of integer factorization, and lattice problems from Learning with Errors explored by Oded Regev; adversarial models reference capabilities studied by researchers like Adi Shamir and Daniel Bleichenbacher. Attacks range from statistical distinguishers developed in cryptanalysis by Alex Biryukov and Jean-Philippe Aumasson to algebraic and side-channel attacks reported by teams at University of Cambridge and École Polytechnique Fédérale de Lausanne. Historical breaks in widely deployed generators prompted standards revisions by NIST and academic responses from conferences such as Eurocrypt and CRYPTO.

Category:Computer science