Skip to main content

Blum–Blum–Shub Pseudorandom Bit Generator

  • Reference work entry
Encyclopedia of Cryptography and Security
  • 611 Accesses

Related Concepts

Pseudorandom Number Generator

Definition

The Blum–Blum–Shub (BBS) pseudorandom bit generator [1] is one of the most efficient pseudorandom number generators known that is provably secure under the assumption that factoring large composites is intractable (integer factoring).

Theory

The generator makes use of modular arithmetic and works as follows:

Setup. Given a security parameter \(\tau \in \mathbb{Z}\) as input, generate two random \(\tau \)-bit primes p,  q where p = q = 3 mod 4. Set \(N = {\it { pq}} \in Z\). Integers N of this type (where both prime factors are distinct and are 3 mod 4) are called Blum integers. Next pick a random y in the group \({\mathbb{Z}}_{N}^{{_\ast}}\) and set \(s = {y}^{2} \in {\mathbb{Z}}_{N}^{{_\ast}}\). The secret seed is (N,  s). As we will see below, there is no need to keep the number N secret.

Generate. Given an input \(\ell \in \mathbb{Z}\) and a seed (N,  s) we generate a pseudorandom sequence of length \(\ell\). First, set \({x}_{1}...

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 799.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 949.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Recommended Reading

  1. Blum L, Blum M, Shub M (1983) Comparison of two pseudo-random number generators. In: Chaum PD, Rivest RL, Sherman AT (eds) Advances in cryptology – CRYPTO’82. Springer, Berlin, pp 61–78

    Google Scholar 

  2. Blum M, Micali S (1982) How to generate cryptographically strong sequences of pseudorandom bits. In: Proceedings of FOCS’82, Chicago, pp 112–117

    Google Scholar 

  3. Vazirani U, Vazirani V (1984) Efficient and secure pseudo-random number generation. In: Proceedings of FOCS’84, West Palm Beach, pp 458–463

    Google Scholar 

  4. Hastad J, Naslund M (2004) The security of all RSA and discrete log bits. J Assoc Comput Mach. Extended abstract in Proceedings of FOCS’98, Palo Alto, pp 510–521

    Google Scholar 

  5. Hastad J, Schrift A, Shamir A (1993) The discrete logarithm modulo a composite hides O(n) bits. J Comput Syst Sci (JCSS) 47:376–404

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer Science+Business Media, LLC

About this entry

Cite this entry

Boneh, D. (2011). Blum–Blum–Shub Pseudorandom Bit Generator. In: van Tilborg, H.C.A., Jajodia, S. (eds) Encyclopedia of Cryptography and Security. Springer, Boston, MA. https://doi.org/10.1007/978-1-4419-5906-5_141

Download citation

Publish with us

Policies and ethics