- Pseudorandom generator
In
theoretical computer science , a pseudorandom generator is a deterministic method of generating a large amount of pseudorandom, or apparently random, data, from a small amount of initial random data. The initial data is commonly known as arandom seed .Formal definition
Let "G" be a deterministic
polynomial time function from N<ω to N<ω with "stretch function":"l": N → N,
so that if "x" has length "n" then "G"("x") has length "l"("n"). Then let "Gn" be the distribution on strings of length "l"("n") defined by the output of "G" on a randomly selected string of length "n" selected by the
uniform distribution .Then "G" is a pseudorandom generator if
:{"Gn"}"n ∈ "N
is pseudorandom.
In effect, "G" translates a random input of length "n" to a pseudorandom output of length "l"("n"). Assuming
:"l"("n") > "n",
this expands a random sequence (and can be applied multiple times, since "Gn" can be replaced by the distribution of "G"("G"("x"))).
Often, the subject of concern is not with the behavior of "G" on all strings, but only on strings of some prescribed length. This case allows a slightly easier definition:
A function with is a pseudorandom generator if
* can be computed in time, and
* is pseudorandom.It is an open problem whether or not pseudorandom generators exist. It is known that if
one-way function s orhard-core predicate s exist, then pseudorandom generators exist. It is also known that if:"l"("n") > "n",
there is some other pseudorandom generator with
:"l"("n") > "p"("n")
for any polynomial, "p"("n"). This follows from the following theorem:
Theorem: If there is a pseudorandom generator:::then for any , there is a pseudorandom generator:::
Applications
Pseudorandom generators have numerous applications. In
cryptography , a simple application is providing an efficient analog of `one time pads '. It is well known that in order to encrypt a message m in a way that the cipher text provides no information on the plaintext,the key k used should be random over strings of length |m|. Then m can be encrypted via . This operation is very costly in terms of key length. Key length can be reduced if we compromise onsemantic security . Then, given G, which expands by a polynomial , then a sequence of messages of length n can be encrypted by xor-ing each with the corresponding area of G(k) (inspired the idea ofstream cipher s).Pseudorandom generators may also be used to construct symmetric key cryptosystems, where any polynomial number of messages can be `safely' encrypted under the same key, that is, the polynomial is not apriority known at time of key generation. Such a construction can be based on a generalization of pseudo random generators, called pseudorandom functions. A family of
pseudorandom function s (PRF's) is a collection of efficiently computable keyed functions, which `act randomly' in the scene that no efficient algorithm can distinguish between an oracle to a function corresponding to a random key, and an oracle to a random function.It's known that if PRG's exist, then so do PRF's (for more details see
pseudorandom function ). One application of PRF's is to understanding learning theory. Loosely speaking, given a sequence of examples e.t.c, the goal is to efficiently find a succinct representation of a function f out of a given class of functions consistent with the examples. PRF families (if exist) are a natural example of a class of functions with small representation size, but are not learnable.Another application is to derandomizing algorithms. A "nice" pseudorandom generator is a pseudorandom number generator,
:
with
:.
If a nice pseudorandom generator exists, then P=
BPP .In fact, this strong derandomization result follows assuming the existence of a weaker type ofpseudorandom generators, Nisan-Wigderson type generator with exponential stretch. Their definition weakens the definition of PRG above in two essential ways. First, it allows to run in exponential in n time. Another important difference is that the output distribution is only required to be indistinguishable from uniform for circuits of size S'(n) for some fixed exponential S' which is smaller than S, as opposed to generators as in the definition above. It's easy to see that the existence of "nice" pseudorandom generators of this kind for some polynomial S(n) is sufficient to imply P=BPP , and follows from plausible hardness assumptions (that some problems inEXP don't have sub exponential circuits). In a nutshell, the idea is to replace the randomness used by a BPP algorithm A,by G(s), where s is a short (O(log(n))) random string. By pseudorandomness of G, the behaviorof A on any given x will not change much, so we can count the number of 1's output by A obtained iterating over the s, and answer according to the majority. That is, can be viewed as a non uniform distinguisher of proper size.ee also
*
BPP (describing Bounded-error, Probabilistic, Polynomial time derandomization algorithms)Further reading
* For more on these and other applications of PRG's, see chapters 10,17 in a draft of a book by Arora and Barak: [http://www.cs.princeton.edu/theory/complexity/]
Wikimedia Foundation. 2010.