Your new experience awaits. Try the new design now and help us make it even better

REVIEW article

Front. Comput. Sci.

Sec. Computer Security

Volume 7 - 2025 | doi: 10.3389/fcomp.2025.1649256

BROWNIAN MOTION MODELS: CRYPTOGRAPHIC APPLICATIONS, CAPABILITIES, AND LIMITATIONS

Provisionally accepted
Abduljameel  ZainalabideenAbduljameel Zainalabideen1,2Khaled  SuwaisKhaled Suwais1*Hazem  El-BakryHazem El-Bakry2Islam  AbdelmaksoudIslam Abdelmaksoud2
  • 1Arab Open University, Riyadh, Saudi Arabia
  • 2Mansoura University, Mansoura, Egypt

The final, formatted version of the article will be published soon.

Abstract: Brownian motion (BM) is a stochastic model that has been extensively studied in physics, finance, and engineering. However, its potential use in cryptographic applications remains underexplored. This paper presents a comprehensive review of the capabilities, limitations, and cryptographic properties of various BM models, including the Wiener process, geometric BM, fractional BM, Ornstein–Uhlenbeck process, multidimensional BM, and reflected BM. We reviewed the mathematics of these models, simulate their random evolutions, and compare their cryptanalytic properties. A comparison of these sources highlights unique characteristics that can provide cryptographic resilience, including long-range dependence, multidimensional modeling of noise, and constraints on randomness. We also describe the main limitations and potential weaknesses of each model. This paper addresses gaps in the application of stochastic process to cryptographic design and provides a foundational guideline for the continued development of secure systems based on Brownian dynamics.

Keywords: Brownian Motion, stochastic, cryptography, information security, Pseudorandom number generator

Received: 18 Jun 2025; Accepted: 28 Aug 2025.

Copyright: © 2025 Zainalabideen, Suwais, El-Bakry and Abdelmaksoud. This is an open-access article distributed under the terms of the Creative Commons Attribution License (CC BY). The use, distribution or reproduction in other forums is permitted, provided the original author(s) or licensor are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.

* Correspondence: Khaled Suwais, Arab Open University, Riyadh, Saudi Arabia

Disclaimer: All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article or claim that may be made by its manufacturer is not guaranteed or endorsed by the publisher.