A new method for generating key for cryptography using Deterministic random number generator
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 9
Abstract
Now a day’s communication has played a key role in each and every aspect of life. In communication the main problem is security and privacy of sensitive data. The data should be transmitted from sender to receiver without any loss of original information. There are many ways of secure communication. One of those techniques is Cryptography. In cryptography there are mainly two mechanisms. They are Encryption and Decryption. In Encryption the sender will convert the original message called plain text into cipher text which is unreadable. Encryption needs encryption key. This cipher text will be send through communication channel to receiver. The receiver needs to decrypt the cipher text into plain text by using decryption key. Here key plays main role. The security of the encrypted message depends on key (encryption and decryption keys, in symmetric encryption both keys are same). The key should be unpredictable, random, and nonlinear and hardware cost for generating key should be less. There are many ways to generate random keys. In this paper we are proposing a technique called Reseeding mixing Pseudo Random number generator simply RM-PRNG. Advantages of this RM-PRNG are low hardware cost, non linearity, and high throughput. This technique can be used in digital electronics & embedded testing, debugging, stimulation of digital signal processing hardware and digital to analog converters stimulations.
Authors and Affiliations
P PAVAN KUMAR1 , J MADAN KUMAR2 , M NEELIMA
Content Based Image Retrieval: Survey and Comparison between RGB and HSV model
Content based image Retrieval is an active research field in past decades. Against the traditional system where the images are retrieved based on the keyword search, CBIR system retrieve the images based on the vis...
Red Tacton - A Human Area Networking Technology
Now a day’s electronic devices become smaller and lower in power Requirements, and they are less expensive. we have begun to adorn our bodies with personal information and communication appliances. Such devices inc...
An Empirical Study on Privacy Preserving Data Mining
In modern years, advances in hardware expertise have lead to an increase in the competence to store and record personal data about consumers and individuals. This has lead to concerns that the personal data may be...
Contingency Ranking and Analysis Using Mipower
Maintaining power system security is one of the challenging tasks for the power system engineers. The security assessment is an essential task as it gives the knowledge about the system state in the event of a contingenc...
Text Summarization using Clustering Technique
A summarization system consists of reduction of a text document to generate a new form which conveys the key meaning of the contained text.Due to the problem of information overload, access to sound and correctly-d...