Random Key Generation For Advanced Encryption System (Aes) Using Rm-Prng Algotihm
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 11
Abstract
The advent of electronics have played a vital role in the development of communication system. One of the major issues in the field of communications is maintaining security and privacy of the data transmitted and received. Secured communications means transmission of data between the sender and receiver without any loss of original information. One of the methods for secured transmission is cryptography. Cryptography consists of two techniques-encryption and decryption. In encryption the original message is converted into unreadable cipher text with the help of an encryption key. The transmitted encrypted data will be decrypted on the sender side with the same key used at the transmitter side. Hence the key generated at the transmitted side is also send through the communication channel to the receiver. The receiver decrypts the cipher text into plain text using the decryption key. The security of the transmitted data depends on the key generated. The key used should be nonlinear and random. The cost of the hardware generating the key should also be less. This paper proposes RM-PRNG which reduces the cost of hardware, provides non-linearity and high throughput.
Authors and Affiliations
Ch Ravi Sankar, P Rambabu
Noise Analysis of Multi input Quasi Floating Gate Using CMOS Inveter
In this paper the multiinput Quasi Floating gate is used for low voltage application.The Noise effect in the multi-input combined signal is somehow reuced by using Quasi Floating FET gates and by CMOS inverter. The N...
Comparison Study Among Various Anomaly Detection Techniques
Many approaches are implemented for the detection of anomalies on the system. Anomalies based approaches are considered as efficient from that user intention based approach is preferred for the implementation of anom...
Slicing :A Proficient Scheme For Sustain And Publicize
The Privacy Preserving on a microdata publishing different anonymization techniques nameing as generalization and bucketization have been proposes. In generalization amount of information loses on high dimensional da...
Method To Enhance The Capacity Of Embedding Data In Jpeg Images
A novel method of reversible data hiding is proposed here. The technique relies on data hiding in encrypted JPEG images is used. As we know that encryption is an effective method of privacy protection .All previous m...
A Review on Anti Discrimination Methods with Privacy Preservation
Discrimination is very important issue in the current social environment. Many people in the world are not like to be discriminated because of their gender, religion, sex, race etc. there are many anti discrimination...