Ahmad Gaeini

Work place: Imam Husein Comprehensive University, Iran

E-mail: againi@ihu.ac.ir


Research Interests: Information Security, Information Systems, Information Retrieval, Multimedia Information System


Ahmad Gaeini is a Ph.D. candidate at Imam Hussein University. He has A B.Sc. in Mathematics, M.Sc. in Statistics and is studying Ph.D. in Cryptography.

His main interests are statistical methods and pseudorandom algorithm and their applications in information security.

(city, state: publisher name, year) similar to a reference. Current and previous research interests end the paragraph.

The third paragraph begins with the author’s title and last name (e.g., Dr. Smith, Prof. Jones, Mr. Kajor, Ms. Hunter). List any memberships in professional societies like the IEEE. Finally, list any awards and work for professional committees and publications. Personal hobbies should not be included in the biography.

Author Articles
Comparing Some Pseudo-Random Number Generators and Cryptography Algorithms Using a General Evaluation Pattern

By Ahmad Gaeini Abdolrasoul Mirghadri Gholamreza Jandaghi Behbod Keshavarzi

DOI: https://doi.org/10.5815/ijitcs.2016.09.04, Pub. Date: 8 Sep. 2016

Since various pseudo-random algorithms and sequences are used for cryptography of data or as initial values for starting a secure communication, how these algorithms are analyzed and selected is very important. In fact, given the growingly extensive types of pseudo-random sequences and block and stream cipher algorithms, selection of an appropriate algorithm needs an accurate and thorough investigation. Also, in order to generate a pseudo-random sequence and generalize it to a cryptographer algorithm, a comprehensive and regular framework is needed, so that we are enabled to evaluate the presented algorithm as quick as possible. The purpose of this study is to use a number of pseudo-random number generators as well as popular cryptography algorithms, analyze them in a standard framework and observe the results obtained in each stage. The investigations are like a match between different algorithms, such that in each stage, weak algorithms are eliminated using a standard method and successful algorithms enter the next stage so that the best algorithms are chosen in the final stage. The main purpose of this paper is to certify the approved algorithm.

[...] Read more.
Other Articles