Pseudo Random Number Generator Using Reseeding Module
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 12
Abstract
In cryptography encoding, is the process of encrypting messages or knowledge in a way such that hackers cannot read it. In an encoding scheme the message or knowledge is encoded by using an encryption method, which turns into an unreadable cipher text. This is done usually with the help of an encrypted key. Any antagonist which can see the cipher text should know nothing about the primary communication. To decrypt the cipher text with the help of an algorithm that actually needs, an undisclosed decoding key. An encoding algorithm actually uses a key generating algorithm to unsystematically generate keys. Pseudo Random Number Generator (PRNG) is an algorithm used for generating a series of numbers. Because of speed in number generation pseudo random numbers are very crucial. The outflow output series of RM-PRNG is used for key to the encoding and decoding modules. In this we used the encryption and decryption mechanisms due to lack of data privacy now a days. So we used encryption and decryption of codes. Here a single key is generated which cannot be identified by the encrypter or decrypter. This generated key for encoding decoding for communication of messages safely.
Authors and Affiliations
Adabala Ashok, Adabala Jaya Vani
A Stochastic Model to Evaluate The Performance of An IAAS Cloud System
Cloud systems are different from usual distributed systems.First of all; they are branded by an extremely big numeral of resources that can distance different administrative domains. Presentation assessment of cloud...
Verification of Metadata by Encryption for Data Storage Security in Cloud
Cloud Computing provides the way to share distributed resources and services that belong to different organizations or sites. Since Cloud Computing share distributed resources via network in the open environment thus...
SELECTIVE JAMMING ATTACKS PREVENTION SCHEMES IN WIRELESS NETWORKS USING COMBINED CRYPTOGRAPHIC PRIMITIVES
The open nature of the wireless average greeneries it susceptible to intended interfering attacks, typically referred to as blocking. This intended interfering with wireless transmissions can be used as a Launch pad...
Design of Parallel MAC Based On Radix-4 & Radix-8 Modified Booth Algorithm
This paper focused on a combined process of multiplication and accumulation based on radix-4 & radix-8 booth encodings. In this Paper, we investigate the method of implementing the Parallel MAC with the smallest possi...
Monitoring the efficiency of workflow in industry and secure access using NFC and Ethernet
Mobile phones have evolved from their usual function of calling to a lot more in the last decade, the 4G networks are being used for microwave access, But the use of mobile in field of Tele-monitoring is still a open...