Pseudo Random Number Generator Using Reseeding Module
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 12
Abstract
In cryptography encoding, is the process of encrypting messages or knowledge in a way such that hackers cannot read it. In an encoding scheme the message or knowledge is encoded by using an encryption method, which turns into an unreadable cipher text. This is done usually with the help of an encrypted key. Any antagonist which can see the cipher text should know nothing about the primary communication. To decrypt the cipher text with the help of an algorithm that actually needs, an undisclosed decoding key. An encoding algorithm actually uses a key generating algorithm to unsystematically generate keys. Pseudo Random Number Generator (PRNG) is an algorithm used for generating a series of numbers. Because of speed in number generation pseudo random numbers are very crucial. The outflow output series of RM-PRNG is used for key to the encoding and decoding modules. In this we used the encryption and decryption mechanisms due to lack of data privacy now a days. So we used encryption and decryption of codes. Here a single key is generated which cannot be identified by the encrypter or decrypter. This generated key for encoding decoding for communication of messages safely.
Authors and Affiliations
Adabala Ashok, Adabala Jaya Vani
Performance of Patch Antenna In Air And Fresh Water
This paper examines the performance of a Microstrip fed rectangular patch antenna in air and water. Antennas are designed and simulated with the help of HFSS (High Frequency Structure Simulator) software. The antenna w...
Analysis of a SIMO transceiver system for Rayleigh fading environment with maximal ratio combining
To achieve the desired goal of increasing the SNR and reducing BER in wireless communication, it is required to mitigate fading of signal during transmission. If more than one antenna is used for transmission and rece...
Shared Assessing For Distributed Data with Proficient Client Revocation in Cloud
Cloud gives administrations like information stockpiling and information partaking in a gathering. Clients can remotely store their information on cloud and appreciate the on-interest brilliant applications and admin...
Comparing Tesseract results with and without Character localization for Smartphone application
Tesseract is considered the most accurate free OCR engine in existence. Android operating system based Smartphones application where images taken from camera of mobile device or browsed from gallery are preprocessed....
Protective Speculation Clouds With Valuable Cost
In this paper, we propose Protective Speculation Clouds With Valuable Cost constraint based approach to identify which datasets need to be encrypted and which do not, so that privacy preserving cost can be saved whil...