Abstract
In our paper we study practical aspects of random and pseudorandom number generation in mobile environments. We examine and analyze several sources of randomness available in current mobile phones and other mobile devices at the application level. We identify good physical sources of randomness that are capable of generating data with high entropy in reasonable time and we investigate some relevant aspects (such as security, energy requirements, performance) of integrating selected pseudorandom number generators in the Symbian OS environment. The main contribution of this paper is the identification and analysis of randomness sources in mobile devices and a practical proposal for their post-processing, including a prototype implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Kennedy, J.: Digital camera fundamentals. Andor Technology, http://www.andor.com/pdfs/Digital%20Camera%20Fundamentals.pdf
Eastlake, D., Cybercash, S.C., Schiller, J.: RFC1750: Randomness Recommendations for Security. MIT Press, Cambridge (1994)
Ferguson, N., Schneier, B.: Practical Cryptography. John Wiley & Sons, Chichester (2003)
Gutmann, P.: Software generation of practically strong random numbers. In: Proc. of the 7th USENIX Security Symposium, pp. 243–257. USENIX Association (1998)
Henkel, P.: Port of Rijndael Block Cipher to Symbian OSs (2005), http://www.newlc.com/AES-Encryption.html
Krhovjak, J., Svenda, P., Matyas, V.: The sources of randomness in mobile devices. In: Proc. of the 12th Nordic Workshop on Secure IT System, pp. 73–84. Reykjavik University (2007)
Krhovjak, J., Svenda, P., Matyas, V., Smolik, L.: The sources of randomness in smartphones with Symbian OS. In: Security and Protection of Information 2007, pp. 87–98. University of Defence (2007)
Keller, S.S.: NIST-recommended random number generator based on ANSI X9.31 Appendix A.2.4 using the 3-key triple DES and AES algorithms. NIST (2005)
Kelsey, J., Schneier, B., Wagner, D., Hall, C.: Cryptanalytic attacks on pseudorandom number generators. In: Vaudenay, S. (ed.) FSE 1998. LNCS, vol. 1372, pp. 168–188. Springer, Heidelberg (1998)
Rukhin, A., Soto, J., Nechvatal, J.: A statistical test suite for random and pseudorandom number generators for cryptographic applications. In: NIST Special Publication 800-22 (2001)
Shaltiel, R.: Recent developements in explicit constructions of extractors. In: Bulletin of the EATCS, pp. 67–95 (2002)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2009 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering
About this paper
Cite this paper
Krhovjak, J., Matyas, V., Zizkovsky, J. (2009). Generating Random and Pseudorandom Sequences in Mobile Devices. In: Schmidt, A.U., Lian, S. (eds) Security and Privacy in Mobile Information and Communication Systems. MobiSec 2009. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 17. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-04434-2_11
Download citation
DOI: https://doi.org/10.1007/978-3-642-04434-2_11
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-04433-5
Online ISBN: 978-3-642-04434-2
eBook Packages: Computer ScienceComputer Science (R0)