RANDOM NUMBER GENERATION IN MODERN COMPUTING
Keywords:
Random number generation, TRNG, PRNGAbstract
Random number generation plays a crucial role in modern computing, especially in cryptography, simulations, statistical analysis, and secure communication. This paper reviews two major approaches to generating randomness: true random number generators (TRNGs), which rely on unpredictable physical phenomena, and pseudo-random number generators (PRNGs), which produce deterministic sequences through mathematical algorithms. While TRNGs offer high-quality entropy required for security-critical tasks, PRNGs provide speed and reproducibility for general-purpose applications. By examining their mechanisms, strengths, and limitations, this study highlights the importance of choosing appropriate RNG models for secure system design.
Downloads
References
Chan, W. K. (2009). Random Number Generation in Simulation.
Gutterman, Z., Pinkas, B., & Reinman, T. (2006). Analysis of the Linux Random Number Generator.
Haahr, M. (2011). Introduction to Randomness and Random Numbers.
Marsaglia, G. (2005). Random Number Generators.
Schneier, B. (2007). Dual_EC_DRBG: A Case Study in Backdoors.
Sunar, B., Martin, W., & Stinson, D. (2006). A Provably Secure True Random Number Generator.
Barker, E., & Kelsey, J. (2015). Recommendation for Random Number Generation Using Deterministic Random Bit Generators (Revised). NIST Special Publication 800-90A Rev. 1. https://doi.org/10.6028/NIST.SP.800-90Ar1
Eastlake, D., Schiller, J., & Crocker, S. (2005). Randomness Requirements for Security. RFC 4086. https://www.rfc-editor.org/rfc/rfc4086
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Nuriddin Safoev

This work is licensed under a Creative Commons Attribution 4.0 International License.
The content published on the International Scientific and Current Research Conferences platform, including conference papers, abstracts, and presentations, is made available under an open-access model. Users are free to access, share, and distribute this content, provided that proper attribution is given to the original authors and the source.
