CFP last date
20 January 2025
Reseach Article

Windows and Linux Random Number Generation Process: A Comparative Analysis

by Khudran Alzhrani, Amer Aljaedi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 113 - Number 8
Year of Publication: 2015
Authors: Khudran Alzhrani, Amer Aljaedi
10.5120/19847-1710

Khudran Alzhrani, Amer Aljaedi . Windows and Linux Random Number Generation Process: A Comparative Analysis. International Journal of Computer Applications. 113, 8 ( March 2015), 17-25. DOI=10.5120/19847-1710

@article{ 10.5120/19847-1710,
author = { Khudran Alzhrani, Amer Aljaedi },
title = { Windows and Linux Random Number Generation Process: A Comparative Analysis },
journal = { International Journal of Computer Applications },
issue_date = { March 2015 },
volume = { 113 },
number = { 8 },
month = { March },
year = { 2015 },
issn = { 0975-8887 },
pages = { 17-25 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume113/number8/19847-1710/ },
doi = { 10.5120/19847-1710 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:50:25.996596+05:30
%A Khudran Alzhrani
%A Amer Aljaedi
%T Windows and Linux Random Number Generation Process: A Comparative Analysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 113
%N 8
%P 17-25
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we explore and analyze the structure and functions of Random Number Generator (RNG) in Windows and Linux opreating systems. And compare the capabilities of their RNGs. It expected that this research would contribute to awareness of the quality and security of the random number generators implemented in Linux and Windows operating systems. It provides unbiased academic research in facilitating informed decision.

References
  1. I. Goldberg and D. Wagner, "Randomness and the Netscape browser," Dr. Dobb's Journal, January 1996. [Online]. Available:http://www. cs. berkeley. edu/~daw/papers/ddj-netscape. html.
  2. Z. Gutterman and D. Malkhi, "Hold Your Sessions: An Attack on Java Session-Id Generatio," in A. J. Menezes, (Ed. ): CT-RSA 2005, LNCS 3376, pp. 44–57, 2005. [Online]. Available:http://research. microsoft. com/pubs/64680/gm05. pdf.
  3. CVE-2008-0166, "Debian generated SSH-Keys working exploit," [Online]. Available: http://www. securityfocus. com/archive/1/archive/1/492112/100/0/threaded
  4. M. Howard, D. LeBlanc, Writing secure code, Second Ed, Microsoft Press, 2002.
  5. M. Howard, D. Leblanc, and J. Viega. 24 Deadly Sins of Software Security: Programming Flaws and How to Fix Them. McGraw-Hill, New York City, NY, USA, 2009.
  6. L. Dorrendorf, Z. Gutterman, and B. Pinkas. 2007. Cryptanalysis of the windows random number generator. In Proceedings of the 14th ACM conference on Computer and communications security (CCS '07). ACM, New York, NY, USA, 476-485. DOI=10. 1145/1315245. 1315304.
  7. K. Lee, Y. Lee, J. Park, K. Yim, and I. You, "Security Issues on the CNG Cryptography Library (Cryptography API: Next Generation)," Innovative Mobile and Internet Services in Ubiquitous Computing (IMIS), 2013 Seventh International Conference on , pp. 709,713, July 2013.
  8. Z. Gutterman and B. Pinkas, and T Reinman, "Analysis of the Linux random number generator," In IEEE Symposium on Security and Privacy (2006), IEEE Computer Society, pp. 371–385.
  9. P. Lacharme, A. Röck, V. Strubel, and M. Videau, "The Linux pseudorandom number generator revisited," Cryptology ePrint Archive, Report 2012/251, 2012, [Online]. Available: http://eprint. iacr. org/2012/251. pdf
  10. Y. Dodis, D. Pointcheval, S. Ruhault, D. Vergnaud, and D. Wichs, "Security Analysis of Pseudo-Random Number Generators with Input: /dev/random is not Robust," The 2013 ACM SIGSAC conference on Computer & communications security, pp. 647-658.
  11. B. Barak and S. Halevi. A model and architecture for pseudo-random generation with applications to /dev/random. In ACM Conf. on Comp. and Communications Sec. - CCS 2005, pages 203–212, 2005.
  12. Randomness Requirements for Security, RFC 4086, June 2005.
  13. E. Barker and J. Kelsey. Recommendation for Random Number Generation Using Deterministic Random Bit Generators, NIST Special Publication 800-90A, January 2012.
  14. Kernel Mode Cryptographic Primitives Library (CNG. SYS), v. 1. 1 , Security Policy for FIPS 140-2 Validation, July17, 2013.
  15. Implementation Guidance for FIPS PUB 140-2 and the Cryptographic Module Validation Program. NIST- Communication Security Established Canada. April,2014.
  16. BitLocker® Windows OS Loader (WINLOAD), v. 1. 1 , Security Policy for FIPS 140-2 Validation , July17, 2013.
  17. Intel Corporation. 2012. Intel Digital Random Number Generator (DRNG) Software Implementation Guide. [Online]. Available: http://software. intel. com/en-us/articles/inteldigital- random-number-generator-drng-softwareimplementation- guide. (Aug. 2012).
  18. Cryptographic Primitives Library (BCRYPTPRIMITIVES. DLL), v. 1. 1 , Security Policy for FIPS 140-2 Validation , July17,2013.
  19. Microsoft, "Cryptography API: Next Generation", Microsoft Developer Network . [Online]. Available: http://msdn. microsoft. com/enus/
  20. Linux Cross Reference, [Online]. Available: http://lxr. free-electrons. com/source/drivers/char/random. c
  21. M. Matsumoto and Y. Kurita. Twisted GFSR generators. ACM Transactions on Modeling and Computer Simulation, 2(3):179–194, 1992.
  22. M. Matsumoto and Y. Kurita. Twisted GFSR generators II. ACM Transactions on Modeling and Computer Simulation, 4(3):254–266, 1994.
  23. A. Suciu and T. Carean, "Benchmarking the True Random Number Generator of TPM Chips. " CoRRabs/1008. 2223 (2010) . [Online]. Available: http://arxiv. org/abs/1008. 2223.
  24. T. Vuillemin, F. Goichon, C. Lauradoux, and G. Salagnac. " Entropy transfers in the Linux Random Number Generator". hal-00738638, version 1 - 4, 2012.
  25. Linux programmer's Manual. [Online]. Available: http://man7. org/linux/man-pages/man4/random. 4. html
Index Terms

Computer Science
Information Sciences

Keywords

Windows CNG True Random Bits Linux RNG