Overview of the RandomTools[BlumBlumShub] Subpackage
|
Calling Sequence
|
|
RandomTools[BlumBlumShub][function](arguments)
function(arguments)
|
|
Description
|
|
•
|
The RandomTools[BlumBlumShub] subpackage contains functions for creating pseudo-random number generators using the Blum, Blum, and Shub algorithm. The integers x[1], x[2], ... are generated using the quadratic recurrence
|
|
where is a product of two primes and , the seed, may be specified by the user. They use the least significant bits of the x's to form the random numbers.
|
•
|
The Blum, Blum, and Shub generator is intended to be used for cryptographic applications. For this purpose it uses very large primes, primes of length 308, 462 or 616 digits so that n cannot be factored. It extracts the log[2](log[2](n)) least significant bits of the x's which are known to be cryptographically secure. The primes used have certain properties so that can be chosen so that the sequence of bits generated will have a provably very long period.
|
•
|
Each command in the RandomTools[BlumBlumShub] subpackage can be accessed by using either the long form or the short form of the command name in the command calling sequence.
|
|
As the underlying implementation of the RandomTools[BlumBlumShub] subpackage is a module, it is also possible to use the form BlumBlumShub:-command to access a command from the package. For more information, see Module Members.
|
|
|
List of RandomTools[BlumBlumShub] Subpackage Commands
|
|
|
|
Examples
|
|
>
|
|
| (1) |
The NewBitGenerator command outputs cryptographically secure random bits. It takes as input a random seed S which can be used as a secret key in an encryption protocol.
>
|
|
>
|
|
>
|
|
| (2) |
>
|
|
| (3) |
Suppose Alice wants to send a message M to Bob and suppose Alice wants to encrypt the message so that no one else can read it. Suppose
>
|
|
| (4) |
is the 20 bit message Alice wants to encrypt. If Alice and Bob both know S then Alice can do the following. First she creates 20 random bits Z as follows.
>
|
|
>
|
|
| (5) |
Now the ciphertext C is formed by adding Z to M modulo 2 (equivalent to an exclusive or of the bits).
>
|
|
| (6) |
Now Alice sends C to Bob. Bob, who knows S, can determine M from C as follows.
>
|
|
>
|
|
| (7) |
>
|
|
| (8) |
>
|
|
| (9) |
The security of the Blum, Blum, and Shub generator depends on the size of the primes used. Choices available are 512, 768, and 1024 bit primes. See NewBitGenerator for further details, examples and other options.
|
|
Download Help Document
Was this information helpful?