A new method for generating key for cryptography using Deterministic random number generator
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2013, Vol 4, Issue 9
Abstract
Now a day’s communication has played a key role in each and every aspect of life. In communication the main problem is security and privacy of sensitive data. The data should be transmitted from sender to receiver without any loss of original information. There are many ways of secure communication. One of those techniques is Cryptography. In cryptography there are mainly two mechanisms. They are Encryption and Decryption. In Encryption the sender will convert the original message called plain text into cipher text which is unreadable. Encryption needs encryption key. This cipher text will be send through communication channel to receiver. The receiver needs to decrypt the cipher text into plain text by using decryption key. Here key plays main role. The security of the encrypted message depends on key (encryption and decryption keys, in symmetric encryption both keys are same). The key should be unpredictable, random, and nonlinear and hardware cost for generating key should be less. There are many ways to generate random keys. In this paper we are proposing a technique called Reseeding mixing Pseudo Random number generator simply RM-PRNG. Advantages of this RM-PRNG are low hardware cost, non linearity, and high throughput. This technique can be used in digital electronics & embedded testing, debugging, stimulation of digital signal processing hardware and digital to analog converters stimulations.
Authors and Affiliations
P PAVAN KUMAR1 , J MADAN KUMAR2 , M NEELIMA
Hardware Implementation of a Single Phase Inverter
Three Phase Inverters find various applications in variable speed a.c Induction Motors. The PS21765 Inverter module reduces the complexity of the circuit. It is designed to incorporate the inverter circuit using IG...
A Novel Image Compression Scheme with Wavelet Packets Optimization Using Artificial Bee Colony Algorithm
With advance in technology many applications came up which requires images in compressed form. Compression is necessary since storage of images required large space and money. Also transmission of such images can t...
High secured and area optimized Online Memory Testing for efficient Fault Diagnostic Systems
The main intention of this project is to recommend a fault diagnoses structure for revealing of any software or hardware or permanent failures in the embedded read only memories. BIST controller, along with row...
Design and Modelling of PV system and Different MPPT algorithms
Photovoltaic (PV) is a technical name in which radiant (photon) energy from the sun is converted to direct current (dc) Electrical Energy. PV power output is still low, continuous efforts are taken to develop the P...
Combined RFID-Biometric based MIS for student information
RFID (Radio Frequency Identifier) and Biometric now a days are one of the most popular technologies in use today. This paper focuses on creating a MIS (Management Information System) system of student using both RF...