<?xml version="1.0" encoding="ISO-8859-1"?><article xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance">
<front>
<journal-meta>
<journal-id>1405-5546</journal-id>
<journal-title><![CDATA[Computación y Sistemas]]></journal-title>
<abbrev-journal-title><![CDATA[Comp. y Sist.]]></abbrev-journal-title>
<issn>1405-5546</issn>
<publisher>
<publisher-name><![CDATA[Instituto Politécnico Nacional, Centro de Investigación en Computación]]></publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id>S1405-55462013000100007</article-id>
<title-group>
<article-title xml:lang="en"><![CDATA[A Novel Approach for Pseudo-Random Seed Generation]]></article-title>
<article-title xml:lang="es"><![CDATA[Un nuevo procedimiento de generación seudo aleatoria de semillas]]></article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Pelaiz]]></surname>
<given-names><![CDATA[Sacha]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
<contrib contrib-type="author">
<name>
<surname><![CDATA[Tejera]]></surname>
<given-names><![CDATA[Renier]]></given-names>
</name>
<xref ref-type="aff" rid="A01"/>
</contrib>
</contrib-group>
<aff id="A01">
<institution><![CDATA[,Complejo de Investigaciones Tecnológicas Integradas (CITI)  ]]></institution>
<addr-line><![CDATA[La Habana ]]></addr-line>
<country>Cuba</country>
</aff>
<pub-date pub-type="pub">
<day>00</day>
<month>03</month>
<year>2013</year>
</pub-date>
<pub-date pub-type="epub">
<day>00</day>
<month>03</month>
<year>2013</year>
</pub-date>
<volume>17</volume>
<numero>1</numero>
<fpage>63</fpage>
<lpage>68</lpage>
<copyright-statement/>
<copyright-year/>
<self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_arttext&amp;pid=S1405-55462013000100007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_abstract&amp;pid=S1405-55462013000100007&amp;lng=en&amp;nrm=iso"></self-uri><self-uri xlink:href="http://www.scielo.org.mx/scielo.php?script=sci_pdf&amp;pid=S1405-55462013000100007&amp;lng=en&amp;nrm=iso"></self-uri><abstract abstract-type="short" xml:lang="en"><p><![CDATA[Random sequences play an important role in all aspects of Cryptography. All cryptographic systems and protocols are based on secrets and can only be as strong as the random sequence generators they use to generate those secrets. The best cryptographic scheme becomes insecure once its secrets can be predicted or determined. In modern cryptography random sequences are used (1) to generate session keys and initialization vectors for symmetric block ciphers, (2) to generate random values for various digital signature schemes such as DSA and (3) to produce seeds which are used in math routines to get values such as large prime numbers for RSA and also in security protocols. This paper presents the design of RAMG, a pseudorandom seed generator, using a secure symmetric block cipher algorithm. We describe the design principles used for the development of the generator as well as its principal components. We also discuss the idea of using it as a pseudo-random bit generator (DRBG).]]></p></abstract>
<abstract abstract-type="short" xml:lang="es"><p><![CDATA[Las sucesiones aleatorias juegan un papel importante en todos los aspectos de la criptografía. Todos los sistemas y protocolos criptográficos se basan en el secreto y solo pueden ser tan fuertes como lo sean los generadores aleatorios de sucesiones empleados para generar esos secretos. El mejor esquema criptográfico deviene inseguro una vez se puedan determinar o predecir sus secretos. En la criptografía moderna se emplean las sucesiones aleatorias para: generar llaves de sesión e inicializar vectores para esquemas simétricos de cifrado en bloques; generar valores aleatorios para diversos esquemas de firma digital tales como DSA y ECDSA; generar semillas que se empleen en rutinas matemáticas para obtener valores tales como números primos grandes para esquemas como RSA y ElGamal, entre otras aplicaciones. En este trabajo se describe el diseño de RAMG, un generador seudo-aleatorio de semillas (GSSA) empleando un algoritmo simétrico seguro de cifrado en bloques. Se describen los principios de diseño utilizados para su desarrollo así como sus componentes principales y se analiza la idea de emplearlo como un generador de sucesiones de bits seudo-aleatorios (GBSA).]]></p></abstract>
<kwd-group>
<kwd lng="en"><![CDATA[DRGB]]></kwd>
<kwd lng="en"><![CDATA[seed]]></kwd>
<kwd lng="en"><![CDATA[symmetric encryption cipher]]></kwd>
<kwd lng="es"><![CDATA[Semilla]]></kwd>
<kwd lng="es"><![CDATA[cifrado simétrico en bloques]]></kwd>
</kwd-group>
</article-meta>
</front><body><![CDATA[  	    <p align="justify"><font face="verdana" size="4">Art&iacute;culos</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="4"><b>A Novel Approach for Pseudo&#45;Random Seed Generation</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>      <p align="center"><font face="verdana" size="3"><b>Un nuevo procedimiento de generaci&oacute;n seudo aleatoria de semillas</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="center"><font face="verdana" size="2"><b>Sacha Pelaiz and Renier Tejera</b></font></p>  	    <p align="center"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><i>Complejo de Investigaciones Tecnol&oacute;gicas Integradas CITI, La Habana, Cuba</i> <a href="mailto:spelaiz@udio.cujae.edu.cu">spelaiz@udio.cujae.edu.cu</a>, <a href="mailto:rtejera@udio.cujae.edu.cu">rtejera@udio.cujae.edu.cu</a></font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2">Article received on 11/10/2012    <br> 	Accepted on 09/01/2013.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Abstract</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Random sequences play an important role in all aspects of Cryptography. All cryptographic systems and protocols are based on secrets and can only be as strong as the random sequence generators they use to generate those secrets. The best cryptographic scheme becomes insecure once its secrets can be predicted or determined. In modern cryptography random sequences are used (1) to generate session keys and initialization vectors for symmetric block ciphers, (2) to generate random values for various digital signature schemes such as DSA and (3) to produce seeds which are used in math routines to get values such as large prime numbers for RSA and also in security protocols. This paper presents the design of RAMG, a pseudorandom seed generator, using a secure symmetric block cipher algorithm. We describe the design principles used for the development of the generator as well as its principal components. We also discuss the idea of using it as a pseudo&#45;random bit generator (DRBG).</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Keywords:</b> DRGB, seed, symmetric encryption cipher.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>Resumen</b></font></p>  	    <p align="justify"><font face="verdana" size="2">Las sucesiones aleatorias juegan un papel importante en todos los aspectos de la criptograf&iacute;a. Todos los sistemas y protocolos criptogr&aacute;ficos se basan en el secreto y solo pueden ser tan fuertes como lo sean los generadores aleatorios de sucesiones empleados para generar esos secretos. El mejor esquema criptogr&aacute;fico deviene inseguro una vez se puedan determinar o predecir sus secretos. En la criptograf&iacute;a moderna se emplean las sucesiones aleatorias para: generar llaves de sesi&oacute;n e inicializar vectores para esquemas sim&eacute;tricos de cifrado en bloques; generar valores aleatorios para diversos esquemas de firma digital tales como DSA y ECDSA; generar semillas que se empleen en rutinas matem&aacute;ticas para obtener valores tales como n&uacute;meros primos grandes para esquemas como RSA y ElGamal, entre otras aplicaciones. En este trabajo se describe el dise&ntilde;o de RAMG, un generador seudo&#45;aleatorio de semillas (GSSA) empleando un algoritmo sim&eacute;trico seguro de cifrado en bloques. Se describen los principios de dise&ntilde;o utilizados para su desarrollo as&iacute; como sus componentes principales y se analiza la idea de emplearlo como un generador de sucesiones de bits seudo&#45;aleatorios (GBSA).</font></p>  	    ]]></body>
<body><![CDATA[<p align="justify"><font face="verdana" size="2"><b>Palabras clave:</b> Semilla, cifrado sim&eacute;trico en bloques.</font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><a href="/pdf/cys/v17n1/v17n1a7.pdf">DESCARGAR ART&Iacute;CULO EN FORMATO PDF</a></font></p>  	    <p align="justify"><font face="verdana" size="2">&nbsp;</font></p>  	    <p align="justify"><font face="verdana" size="2"><b>References</b></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>1. Barak, B. and S. Halevi (2005).</b> A model and architecture for pseudo&#45;random generation with applications to /dev/random." <i>CCS'05 Proceedings of the 12th ACM conference on Computer and communications security:</i> 203&#45;212.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059245&pid=S1405-5546201300010000700001&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>2. GOST28147&#45;89 (1989).</b> National Soviet Bureau of Standards. Information Processing Systems. <i>Cryptographic Protection. Cryptographic Algorithm.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059247&pid=S1405-5546201300010000700002&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></i></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>3.&nbsp;Gutmann, P.</b> Software Generation of Practically Strong Random Numbers. <i>7th USENIX Security Symposium, San Antonio, Texas, USA</i></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059249&pid=S1405-5546201300010000700003&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2"><b>4. Kelsey, J., B. Schneier, et al. (1999).</b> Yarrow 160 Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator. <i>LNCS 1758: 13&#45;33</i></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059250&pid=S1405-5546201300010000700004&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2"><b>5. Kelsey, J., B. Schneier, et al. (1998).</b> "Cryptanalytic Attacks on Pseudorandom number generators." <i>FSE 1372(Springer): 168&#45;188</i></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059251&pid=S1405-5546201300010000700005&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2"><b>6. Lidia. A</b> library for computational number theory., Available from <a href="http://www.informatik.tu-darmstadt.de/TI/LiDIA/Welcome.html" target="_blank">http://www.informatik.tu&#45;darmstadt.de/TI/LiDIA/Welcome.html</a></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059252&pid=S1405-5546201300010000700006&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2"><b>7. LÃ³pez, J. C. and R. Monroy (2008).</b> Formal Support to Security Protocol Development: A Survey. <i>Computaci&oacute;n y Sistemas 12</i></font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059253&pid=S1405-5546201300010000700007&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2"><b>8. Menezes, A., P. v. Oorschot, et al. (2001).</b> Handbook of Applied Cryptography, CRC Press New York</font>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059254&pid=S1405-5546201300010000700008&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --><!-- ref --><p align="justify"><font face="verdana" size="2"><b>9.&nbsp;NIST (2007).</b> Recommendation for random number generation using deterministic random bit generators. NIST Special Publication 800&#45;90A.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059255&pid=S1405-5546201300010000700009&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>10. NIST (2010).</b> A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (Revised). NIST Special Publication 800&#45;22.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059257&pid=S1405-5546201300010000700010&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>  	    <!-- ref --><p align="justify"><font face="verdana" size="2"><b>11. Pieprzyk, J. and L. Tombak (1994).</b> Soviet Encryption Algorithm.    &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;[&#160;<a href="javascript:void(0);" onclick="javascript: window.open('/scielo.php?script=sci_nlinks&ref=2059259&pid=S1405-5546201300010000700011&lng=','','width=640,height=500,resizable=yes,scrollbars=1,menubar=yes,');">Links</a>&#160;]<!-- end-ref --></font></p>      ]]></body><back>
<ref-list>
<ref id="B1">
<label>1</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Barak]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
<name>
<surname><![CDATA[Halevi]]></surname>
<given-names><![CDATA[S.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[A model and architecture for pseudo-random generation with applications to /dev/random]]></article-title>
<source><![CDATA[CCS'05 Proceedings of the 12th ACM conference on Computer and communications security]]></source>
<year>2005</year>
<page-range>203-212</page-range></nlm-citation>
</ref>
<ref id="B2">
<label>2</label><nlm-citation citation-type="">
<collab>National Soviet Bureau of Standards</collab>
<source><![CDATA[Information Processing Systems. Cryptographic Protection. Cryptographic Algorithm]]></source>
<year>1989</year>
</nlm-citation>
</ref>
<ref id="B3">
<label>3</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Gutmann]]></surname>
<given-names><![CDATA[P.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Software Generation of Practically Strong Random Numbers]]></article-title>
<source><![CDATA[7th USENIX Security Symposium]]></source>
<year></year>
<publisher-loc><![CDATA[San Antonio^eTexas Texas]]></publisher-loc>
</nlm-citation>
</ref>
<ref id="B4">
<label>4</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kelsey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Schneier]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Yarrow 160 Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator]]></source>
<year>1999</year>
<page-range>13-33</page-range></nlm-citation>
</ref>
<ref id="B5">
<label>5</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Kelsey]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Schneier]]></surname>
<given-names><![CDATA[B.]]></given-names>
</name>
</person-group>
<source><![CDATA[Cryptanalytic Attacks on Pseudorandom number generators]]></source>
<year>1998</year>
<page-range>168-188</page-range><publisher-name><![CDATA[Springer]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B6">
<label>6</label><nlm-citation citation-type="">
<source><![CDATA[]]></source>
<year></year>
</nlm-citation>
</ref>
<ref id="B7">
<label>7</label><nlm-citation citation-type="journal">
<person-group person-group-type="author">
<name>
<surname><![CDATA[López]]></surname>
<given-names><![CDATA[J. C.]]></given-names>
</name>
<name>
<surname><![CDATA[Monroy]]></surname>
<given-names><![CDATA[R.]]></given-names>
</name>
</person-group>
<article-title xml:lang="en"><![CDATA[Formal Support to Security Protocol Development: A Survey]]></article-title>
<source><![CDATA[Computación y Sistemas]]></source>
<year>2008</year>
<volume>12</volume>
</nlm-citation>
</ref>
<ref id="B8">
<label>8</label><nlm-citation citation-type="book">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Menezes]]></surname>
<given-names><![CDATA[A.]]></given-names>
</name>
<name>
<surname><![CDATA[Oorschot]]></surname>
<given-names><![CDATA[P. v.]]></given-names>
</name>
</person-group>
<source><![CDATA[Handbook of Applied Cryptography]]></source>
<year>2001</year>
<publisher-loc><![CDATA[New York ]]></publisher-loc>
<publisher-name><![CDATA[CRC Press]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B9">
<label>9</label><nlm-citation citation-type="book">
<collab>NIST</collab>
<source><![CDATA[Recommendation for random number generation using deterministic random bit generators]]></source>
<year>2007</year>
<publisher-name><![CDATA[NIST]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B10">
<label>10</label><nlm-citation citation-type="book">
<collab>NIST</collab>
<source><![CDATA[A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications (Revised)]]></source>
<year>2010</year>
<publisher-name><![CDATA[NIST]]></publisher-name>
</nlm-citation>
</ref>
<ref id="B11">
<label>11</label><nlm-citation citation-type="">
<person-group person-group-type="author">
<name>
<surname><![CDATA[Pieprzyk]]></surname>
<given-names><![CDATA[J.]]></given-names>
</name>
<name>
<surname><![CDATA[Tombak]]></surname>
<given-names><![CDATA[L.]]></given-names>
</name>
</person-group>
<source><![CDATA[Soviet Encryption Algorithm]]></source>
<year>1994</year>
</nlm-citation>
</ref>
</ref-list>
</back>
</article>
