Pseudo Random Number Generator Using Reseeding Module

Abstract

In cryptography encoding, is the process of encrypting messages or knowledge in a way such that hackers cannot read it. In an encoding scheme the message or knowledge is encoded by using an encryption method, which turns into an unreadable cipher text. This is done usually with the help of an encrypted key. Any antagonist which can see the cipher text should know nothing about the primary communication. To decrypt the cipher text with the help of an algorithm that actually needs, an undisclosed decoding key. An encoding algorithm actually uses a key generating algorithm to unsystematically generate keys. Pseudo Random Number Generator (PRNG) is an algorithm used for generating a series of numbers. Because of speed in number generation pseudo random numbers are very crucial. The outflow output series of RM-PRNG is used for key to the encoding and decoding modules. In this we used the encryption and decryption mechanisms due to lack of data privacy now a days. So we used encryption and decryption of codes. Here a single key is generated which cannot be identified by the encrypter or decrypter. This generated key for encoding decoding for communication of messages safely.

Authors and Affiliations

Adabala Ashok, Adabala Jaya Vani

Keywords

Related Articles

A Stochastic Model to Evaluate The Performance of An IAAS Cloud System

Cloud systems are different from usual distributed systems.First of all; they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation assessment of cloud...

Verification of Metadata by Encryption for Data Storage Security in Cloud

Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus...

SELECTIVE JAMMING ATTACKS PREVENTION SCHEMES IN WIRELESS NETWORKS USING COMBINED CRYPTOGRAPHIC PRIMITIVES

The open nature of the wireless average greeneries it susceptible to intended interfering attacks, typically referred to as blocking. This intended interfering with wireless transmissions can be used as a Launch pad...

Design of Parallel MAC Based On Radix-4 & Radix-8 Modified Booth Algorithm

This paper focused on a combined process of multiplication and accumulation based on radix-4 & radix-8 booth encodings. In this Paper, we investigate the method of implementing the Parallel MAC with the smallest possi...

Monitoring the efficiency of workflow in industry and secure access using NFC and Ethernet

Mobile phones have evolved from their usual function of calling to a lot more in the last decade, the 4G networks are being used for microwave access, But the use of mobile in field of Tele-monitoring is still a open...

Download PDF file
  • EP ID EP28126
  • DOI -
  • Views 272
  • Downloads 1

How To Cite

Adabala Ashok, Adabala Jaya Vani (2014). Pseudo Random Number Generator Using Reseeding Module. International Journal of Research in Computer and Communication Technology, 3(12), -. https://europub.co.uk/articles/-A-28126