Random Key Generation For Advanced Encryption System (Aes) Using Rm-Prng Algotihm
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
The advent of electronics have played a vital role in the development of communication system. One of the major issues in the field of communications is maintaining security and privacy of the data transmitted and received. Secured communications means transmission of data between the sender and receiver without any loss of original information. One of the methods for secured transmission is cryptography. Cryptography consists of two techniques-encryption and decryption. In encryption the original message is converted into unreadable cipher text with the help of an encryption key. The transmitted encrypted data will be decrypted on the sender side with the same key used at the transmitter side. Hence the key generated at the transmitted side is also send through the communication channel to the receiver. The receiver decrypts the cipher text into plain text using the decryption key. The security of the transmitted data depends on the key generated. The key used should be nonlinear and random. The cost of the hardware generating the key should also be less. This paper proposes RM-PRNG which reduces the cost of hardware, provides non-linearity and high throughput.
Authors and Affiliations
Ch Ravi Sankar, P Rambabu
Edge Detection to Enhance Definite Range Image Segmentation by Clustering Algorithms
Edges of an image are considered a type of crucial information that can be extracted by applying detectors with different methodologies. However, edge detection provides rich information about the scene being observed...
A Trusted Identity Acknowledgement Protocol for Security Enhancement in MANET
Identifying trusted node for secure communication is a very important point in mobile adhoc network. It makes a node to compromise for a service and causes uncertainty of node behaviour. Computing a node trust and ma...
Shared Assessing For Distributed Data with Proficient Client Revocation in Cloud
Cloud gives administrations like information stockpiling and information partaking in a gathering. Clients can remotely store their information on cloud and appreciate the on-interest brilliant applications and admin...
Implementation of MIMO Technique in Vehicular Adhoc Network for Different Mobility Patterns
VANETs (Vehicular ad-hoc network) is a special type if intelligent system used for road safety which is characterized by a very dynamic topology with partial infrastructure support, patterned mobility, and mobile nod...
Data Possession Using Shipment Equilibrium Model And Mechanism on Multi cloud Environment
Shipment equilibrium mechanism is the main building blocks for cloud computing applications which is based on the Map Reduce programming concept. Shipment equilibrium is essential for efficient operations in distribu...