Open Access
REVIEW
An Overview and Comparative Study of Traditional, Chaos-Based and Machine Learning Approaches in Pseudorandom Number Generation
1 Department of Computer Science, Kwame Nkrumah University of Science and Technology, Kumasi, 233, Ghana
2 Department of Medical Imaging, University for Development Studies, P.O. Box TL1350, Tamale, 233, Ghana
* Corresponding Author: Issah Zabsonre Alhassan. Email:
Journal of Cyber Security 2025, 7, 165-196. https://doi.org/10.32604/jcs.2025.063529
Received 17 January 2025; Accepted 05 June 2025; Issue published 07 July 2025
Abstract
Pseudorandom number generators (PRNGs) are foundational to modern cryptography, yet existing approaches face critical trade-offs between cryptographic security, computational efficiency, and adaptability to emerging threats. Traditional PRNGs (e.g., Mersenne Twister, LCG) remain widely used in low-security applications despite vulnerabilities to predictability attacks, while machine learning (ML)-driven and chaos-based alternatives struggle to balance statistical robustness with practical deployability. This study systematically evaluates traditional, chaos-based, and ML-driven PRNGs to identify design principles for next-generation systems capable of meeting the demands of high-security environment like blockchain and IoT. Using a framework that quantifies cryptographic robustness (via NIST SP 800-22 compliance), computational efficiency (throughput in numbers/sec), and resilience to adversarial attacks, we compare various PRNG architectures. Results show that ML-based models (e.g., GANs, RL agents) achieve near-perfect statistical randomness (99% NIST compliance) but suffer from high computational costs (10³ numbers/sec) and vulnerabilities to model inversion. Chaos-based systems (e.g., Lorenz attractor) offer moderate security (97%–98% NIST scores) with faster generation rates (1.5–2 ms/number), while traditional PRNGs prioritize speed (106 numbers/sec) at the expense of cryptographic strength (70%–95% NIST pass rates). To address these limitations, we propose hybrid architectures integrating classical algorithms with lightweight ML components (e.g., TinyGANs), reducing training time by 40% while maintaining 98% NIST compliance. This work provides three key contributions. These include a quantitative security-speed trade-off analysis across PRNG paradigms, cryptanalytic insights into ML-PRNG vulnerabilities (e.g., overfitting to training data), and actionable guidelines for optimizing hybrid designs in resource-constrained settings. By bridging deterministic and stochastic methodologies, this study advances a roadmap for developing adaptable, attack-resistant PRNGs tailored for evolving cryptographic standards.Keywords
Cite This Article
Copyright © 2025 The Author(s). Published by Tech Science Press.This work is licensed under a Creative Commons Attribution 4.0 International License , which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.


Submit a Paper
Propose a Special lssue
View Full Text
Download PDF
Downloads
Citation Tools