Open Access iconOpen Access

REVIEW

An Overview and Comparative Study of Traditional, Chaos-Based and Machine Learning Approaches in Pseudorandom Number Generation

Issah Zabsonre Alhassan1,2,*, Gaddafi Abdul-Salaam1, Michael Asante1, Yaw Marfo Missah1, Alimatu Sadia Shirazu1

1 Department of Computer Science, Kwame Nkrumah University of Science and Technology, Kumasi, 233, Ghana
2 Department of Medical Imaging, University for Development Studies, P.O. Box TL1350, Tamale, 233, Ghana

* Corresponding Author: Issah Zabsonre Alhassan. Email: email

Journal of Cyber Security 2025, 7, 165-196. https://doi.org/10.32604/jcs.2025.063529

Abstract

Pseudorandom number generators (PRNGs) are foundational to modern cryptography, yet existing approaches face critical trade-offs between cryptographic security, computational efficiency, and adaptability to emerging threats. Traditional PRNGs (e.g., Mersenne Twister, LCG) remain widely used in low-security applications despite vulnerabilities to predictability attacks, while machine learning (ML)-driven and chaos-based alternatives struggle to balance statistical robustness with practical deployability. This study systematically evaluates traditional, chaos-based, and ML-driven PRNGs to identify design principles for next-generation systems capable of meeting the demands of high-security environment like blockchain and IoT. Using a framework that quantifies cryptographic robustness (via NIST SP 800-22 compliance), computational efficiency (throughput in numbers/sec), and resilience to adversarial attacks, we compare various PRNG architectures. Results show that ML-based models (e.g., GANs, RL agents) achieve near-perfect statistical randomness (99% NIST compliance) but suffer from high computational costs (10³ numbers/sec) and vulnerabilities to model inversion. Chaos-based systems (e.g., Lorenz attractor) offer moderate security (97%–98% NIST scores) with faster generation rates (1.5–2 ms/number), while traditional PRNGs prioritize speed (106 numbers/sec) at the expense of cryptographic strength (70%–95% NIST pass rates). To address these limitations, we propose hybrid architectures integrating classical algorithms with lightweight ML components (e.g., TinyGANs), reducing training time by 40% while maintaining 98% NIST compliance. This work provides three key contributions. These include a quantitative security-speed trade-off analysis across PRNG paradigms, cryptanalytic insights into ML-PRNG vulnerabilities (e.g., overfitting to training data), and actionable guidelines for optimizing hybrid designs in resource-constrained settings. By bridging deterministic and stochastic methodologies, this study advances a roadmap for developing adaptable, attack-resistant PRNGs tailored for evolving cryptographic standards.

Keywords

Cryptography; pseudorandom number generator; generative adversarial network; reinforcement learning; randomness quality; computational efficiency

Cite This Article

APA Style
Alhassan, I.Z., Abdul-Salaam, G., Asante, M., Missah, Y.M., Shirazu, A.S. (2025). An Overview and Comparative Study of Traditional, Chaos-Based and Machine Learning Approaches in Pseudorandom Number Generation. Journal of Cyber Security, 7(1), 165–196. https://doi.org/10.32604/jcs.2025.063529
Vancouver Style
Alhassan IZ, Abdul-Salaam G, Asante M, Missah YM, Shirazu AS. An Overview and Comparative Study of Traditional, Chaos-Based and Machine Learning Approaches in Pseudorandom Number Generation. J Cyber Secur. 2025;7(1):165–196. https://doi.org/10.32604/jcs.2025.063529
IEEE Style
I. Z. Alhassan, G. Abdul-Salaam, M. Asante, Y. M. Missah, and A. S. Shirazu, “An Overview and Comparative Study of Traditional, Chaos-Based and Machine Learning Approaches in Pseudorandom Number Generation,” J. Cyber Secur., vol. 7, no. 1, pp. 165–196, 2025. https://doi.org/10.32604/jcs.2025.063529



cc Copyright © 2025 The Author(s). Published by Tech Science Press.
This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
  • 1031

    View

  • 511

    Download

  • 0

    Like

Share Link