To see the other types of publications on this topic, follow the link: Pseudo Random Key Generator.

Journal articles on the topic 'Pseudo Random Key Generator'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Pseudo Random Key Generator.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Saini, Neha, and Kirti Bhatia. "Pseudo Random Generator Based Public Key Cryptography." International Journal of Advanced engineering, Management and Science 3, no. 5 (2017): 453–57. http://dx.doi.org/10.24001/ijaems.3.5.8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Journal, Baghdad Science. "Stochastic Non-Linear Pseudo-Random Sequence Generator." Baghdad Science Journal 7, no. 2 (2010): 1042–46. http://dx.doi.org/10.21123/bsj.7.2.1042-1046.

Full text
Abstract:
Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
APA, Harvard, Vancouver, ISO, and other styles
3

Shamran, Mahmood A. "Stochastic Non-Linear Pseudo-Random Sequence Generator." Baghdad Science Journal 7, no. 2 (2010): 1042–46. http://dx.doi.org/10.21123/bsj.2010.7.2.1042-1046.

Full text
Abstract:
Many of the key stream generators which are used in practice are LFSR-based in the sense that they produce the key stream according to a rule y = C(L(x)), where L(x) denotes an internal linear bit stream, produced by small number of parallel linear feedback shift registers (LFSRs), and C denotes some nonlinear compression function. In this paper we combine between the output sequences from the linear feedback shift registers with the sequences out from non linear key generator to get the final very strong key sequence
APA, Harvard, Vancouver, ISO, and other styles
4

Semenkov, Alexey, Dmitry Bragin, Yakov Usoltsev, Anton Konev, and Evgeny Kostuchenko. "Generation of an EDS Key Based on a Graphic Image of a Subject’s Face Using the RC4 Algorithm." Information 12, no. 1 (2021): 19. http://dx.doi.org/10.3390/info12010019.

Full text
Abstract:
Modern facial recognition algorithms make it possible to identify system users by their appearance with a high level of accuracy. In such cases, an image of the user’s face is converted to parameters that later are used in a recognition process. On the other hand, the obtained parameters can be used as data for pseudo-random number generators. However, the closeness of the sequence generated by such a generator to a truly random one is questionable. This paper proposes a system which is able to authenticate users by their face, and generate pseudo-random values based on the facial image that w
APA, Harvard, Vancouver, ISO, and other styles
5

Hadeer, Hussein Ali, T. Ziboon Hadi, and Q. Hameed Ashwaq. "Implementation and performance evaluation of multi level pseudo random sequence generator." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 822~834. https://doi.org/10.11591/eei.v12i2.3363.

Full text
Abstract:
In this paper, introduce a proposed multi-level pseudo-random sequence generator (MLPN). Characterized by its flexibility in changing generated pseudo noise (PN) sequence according to a key between transmitter and receiver. Also, introduce derive of the mathematical model for the MLPN generator. This method is called multi-level because it uses more than PN sequence arranged as levels to generation the pseudo-random sequence. This work introduces a graphical method describe the data processing through MLPN generation. This MLPN sequence can be changed according to changing the key between tran
APA, Harvard, Vancouver, ISO, and other styles
6

Avinash, Krishnan Raghunath, Bharadwaj Dimple, Prabhuram M, and D. Aju. "Designing a secured audio based key generator for cryptographic symmetric key algorithms." Computer Science and Information Technologies 2, no. 2 (2021): 87–94. https://doi.org/10.11591/csit.v2i2.p87-94.

Full text
Abstract:
Cryptography is a technique to secure data transmissions and ensure confiden-tiality, authenticity and integrity of data exchanged over the digital networks by utilizing mathematical algorithms to transform the plain text (original message) to cipher text (encrypted message) using a key or seed value. The general con-sensus regarding the use of non-deterministic true random numbers (TRN) which are generated from the physical environment such as entropy keys, at-mospheric noise, etc., as a public or private key has received limited encour-agement due to the demanding hardware requirements neede
APA, Harvard, Vancouver, ISO, and other styles
7

Ali, Hadeer Hussein, Hadi T. Ziboon, and Ashwaq Q. Hameed. "Implementation and performance evaluation of multi level pseudo random sequence generator." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 822–34. http://dx.doi.org/10.11591/eei.v12i2.3363.

Full text
Abstract:
In this paper, introduce a proposed multi-level pseudo-random sequence generator (MLPN). Characterized by its flexibility in changing generated pseudo noise (PN) sequence according to a key between transmitter and receiver. Also, introduce derive of the mathematical model for the MLPN generator. This method is called multi-level because it uses more than PN sequence arranged as levels to generation the pseudo-random sequence. This work introduces a graphical method describe the data processing through MLPN generation. This MLPN sequence can be changed according to changing the key between tran
APA, Harvard, Vancouver, ISO, and other styles
8

Wang, Luyao, and Hai Cheng. "Pseudo-Random Number Generator Based on Logistic Chaotic System." Entropy 21, no. 10 (2019): 960. http://dx.doi.org/10.3390/e21100960.

Full text
Abstract:
In recent years, a chaotic system is considered as an important pseudo-random source to pseudo-random number generators (PRNGs). This paper proposes a PRNG based on a modified logistic chaotic system. This chaotic system with fixed system parameters is convergent and its chaotic behavior is analyzed and proved. In order to improve the complexity and randomness of modified PRNGs, the chaotic system parameter denoted by floating point numbers generated by the chaotic system is confused and rearranged to increase its key space and reduce the possibility of an exhaustive attack. It is hard to spec
APA, Harvard, Vancouver, ISO, and other styles
9

Barbone, Marco, Georgi Gaydadjiev, Alexander Howard, et al. "Fast, high-quality pseudo random number generators for heterogeneous computing." EPJ Web of Conferences 295 (2024): 11010. http://dx.doi.org/10.1051/epjconf/202429511010.

Full text
Abstract:
Random number generation is key to many applications in a wide variety of disciplines. Depending on the application, the quality of the random numbers from a particular generator can directly impact both computational performance and critically the outcome of the calculation. High-energy physics applications use Monte Carlo simulations and machine learning widely, which both require high-quality random numbers. In recent years, to meet increasing performance requirements, many high-energy physics workloads leverage GPU acceleration. While on a CPU, there exist a wide variety of generators with
APA, Harvard, Vancouver, ISO, and other styles
10

Anusha, .T, and R. Venkatesan. "PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORITHM FOR IMAGE ENCRYPTION." International Journal of Network Security & Its Applications (IJNSA) 15, no. 3 (2023): 23–32. https://doi.org/10.5281/zenodo.8019742.

Full text
Abstract:
Cryptographic applications such as online banking, and securing medical and military data require the usage of random keys, which should remain unpredictable by adversaries. This paper focuses on the strengths and limitations of the techniques and algorithms that are used in the generation of random keys and a new method to generate random keys is proposed using fractals. Fractals are generated using the Sierpinski triangle and fed as input for Non-Deterministic Finite Automata (NDFA) to generate an Initial Vector (IV). Trellis Coded Genetic Algorithm (TCGA) code generator generates seed value
APA, Harvard, Vancouver, ISO, and other styles
11

N, Bharatesh, and Rohith S. "FPGA Implementation of Park-Miller Algorithm to Generate Sequence of 32-Bit Pseudo Random Key for Encryption and Decryption of Plain Text." International Journal of Reconfigurable and Embedded Systems (IJRES) 2, no. 3 (2013): 99. http://dx.doi.org/10.11591/ijres.v2.i3.pp99-105.

Full text
Abstract:
There are many problems arises in randomized algorithms whose solutions are fundamentally based on assumptions that pure random numbers exist, so pseudo-random number generators can imitate randomness sufficiently well for most applications. The proposed scheme is a FPGA implementation of Park-Miller Algorithm for generating sequence of Pseudo-Random keys. The properties like High speed, low power and flexibility of designed PRNG(Pseudo Random Number Generator) makes any digital circuit faster and smaller. The algorithm uses a PRNG Module, it contains 32-bit Booth Multiplier, 32-bit Floating p
APA, Harvard, Vancouver, ISO, and other styles
12

H, Soumya Babu, and Gopakumar K. "ELECTRONIC CIRCUIT REALISATION OF A CHAOTIC PSEUDO RANDOM BIT GENERATOR." ICTACT Journal on Microelectronics 7, no. 2 (2021): 1121–26. https://doi.org/10.21917/ijme.2021.0195.

Full text
Abstract:
Most of the properties of chaotic systems like sensitivity to initial conditions, deterministic dynamics, mixing property, structural complexity can be considered as analogous to diffusion and confusion with small changes in plain text or the secret key, deterministic pseudo randomness and complex properties of cryptographic systems. The interesting relationship between cryptography and chaos leads to new, highly secure cryptographic techniques. The development of chaotic stream ciphers in cryptography requires the need for the generation of pseudo random bits and hence the need for pseudo ran
APA, Harvard, Vancouver, ISO, and other styles
13

Hana, Ali-Pacha, Hadj-Said Naima, Ali-Pacha Adda, Afendee Mohamed Mohamad, and Mamat Mustafa. "Cryptographic adaptation of the middle square generator." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5615–27. https://doi.org/10.11591/ijece.v9i6.pp5615-5627.

Full text
Abstract:
Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and
APA, Harvard, Vancouver, ISO, and other styles
14

Bourekouche, Hadjer, Samia Belkacem, and Noureddine Messaoudi. "Efficient image encryption scheme using a nonlinear shift register and chaos." Journal of Information and Optimization Sciences 45, no. 1 (2024): 157–80. http://dx.doi.org/10.47974/jios-1399.

Full text
Abstract:
Powerful cryptographic systems require a qualified random number generator. This research purposes to provide a comprehensive comparative analysis done on several of the well-known pseudo-random number generators (PRNGs) regarding their efficiency and resilience against crypto-analytical threats. These generators consist of the basic 8-bit Non-Linear Feedback Shift Register (NLFSR), the logistic map (LM), and our proposed hybrid random number generator named NLFSR-LM, which combines through XOR operation the sequences of the NLFSR with the LM to achieve a high quality of randomness. The perfor
APA, Harvard, Vancouver, ISO, and other styles
15

Raghunath, Avinash Krishnan, Dimple Bharadwaj, M. Prabhuram, and Aju D. "Designing a secured audio based key generator for cryptographic symmetric key algorithms." Computer Science and Information Technologies 2, no. 2 (2021): 87–94. http://dx.doi.org/10.11591/csit.v2i2.p87-94.

Full text
Abstract:
ryptography is a technique to secure data transmissions and ensure confiden-tiality, authenticity and integrity of data exchanged over the digital networks by utilizing mathematical algorithms to transform the plain text (original message) to cipher text (encrypted message) using a key or seed value. The general con-sensus regarding the use of non-deterministic true random numbers (TRN) which are generated from the physical environment such as entropy keys, at-mospheric noise, etc., as a public or private key has received limited encour-agement due to the demanding hardware requirements needed
APA, Harvard, Vancouver, ISO, and other styles
16

Avinash Krishnan Raghunath, Dimple Bharadwaj, M. Prabhuram, and Aju D. "Designing a secured audio based key generator for cryptographic symmetric key algorithms." Computer Science and Information Technologies 2, no. 2 (2021): 87–94. http://dx.doi.org/10.11591/csit.v2i2.pp87-94.

Full text
Abstract:
Cryptography is a technique to secure data transmissions and ensure confiden-tiality, authenticity and integrity of data exchanged over the digital networks by utilizing mathematical algorithms to transform the plain text (original message) to cipher text (encrypted message) using a key or seed value. The general con-sensus regarding the use of non-deterministic true random numbers (TRN) which are generated from the physical environment such as entropy keys, at-mospheric noise, as a public or private key has received limited encour-agement due to the demanding hardware requirements needed to e
APA, Harvard, Vancouver, ISO, and other styles
17

G. M., Vishwas C., R. Sanjeev Kunte, and Varun Yarehalli Chandrappa. "Encryption Using Binary Key Sequences in Chaotic Cryptosystem." International Journal of Computer Network and Information Security 15, no. 4 (2023): 48–60. http://dx.doi.org/10.5815/ijcnis.2023.04.05.

Full text
Abstract:
Transmission of images on the network is considered insecure which has security-related issues. In this paper, to provide security to digital images, an encryption system that uses four chaotic maps for binary key sequence generation is proposed. The system consists of stages namely, confusion, generation of random binary chaotic key sequence, pseudo-random number generation (RN), and diffusion. Keys for encryption are chosen randomly based on a pseudo random generator from the selected chaotic maps by the linear feedback shift register (LFSR). The algorithm achieves good results in terms of N
APA, Harvard, Vancouver, ISO, and other styles
18

T, Anusha, and Venkatesan R. "PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORITHM FOR IMAGE ENCRYPTION." International Journal of Network Security & Its Applications 15, no. 03 (2023): 23–32. http://dx.doi.org/10.5121/ijnsa.2023.15302.

Full text
Abstract:
Cryptographic applications such as online banking, and securing medical and military data require the usage of random keys, which should remain unpredictable by adversaries. This paper focuses on the strengths and limitations of the techniques and algorithms that are used in the generation of random keys and a new method to generate random keys is proposed using fractals. Fractals are generated using the Sierpinski triangle and fed as input for Non-Deterministic Finite Automata (NDFA) to generate an Initial Vector (IV). Trellis Coded Genetic Algorithm (TCGA) code generator generates seed value
APA, Harvard, Vancouver, ISO, and other styles
19

Ali-Pacha, Hana, Naima Hadj-Said, Adda Ali-Pacha, Mohamad Afendee Mohamed, and Mustafa Mamat. "Cryptographic adaptation of the middle square generator." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 6 (2019): 5615. http://dx.doi.org/10.11591/ijece.v9i6.pp5615-5627.

Full text
Abstract:
<span lang="EN-US">Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications su
APA, Harvard, Vancouver, ISO, and other styles
20

Al-Suffar, Ahmed. "Implementing A New Serial Control As Nonlinear Function for Key Stream Pseudo-Random Number Generator." Journal of Al-Rafidain University College For Sciences ( Print ISSN: 1681-6870 ,Online ISSN: 2790-2293 ), no. 1 (October 14, 2021): 223–45. http://dx.doi.org/10.55562/jrucs.v35i1.271.

Full text
Abstract:
Nonlinear behavior seems to be the rule rather than exception in nature, so the progressing in security and cryptography scope is very wide needed in the world.Problem: Cryptographically, there is potential needs to produce the nonlinear products or to complicate the linear system constrains to be as nonlinear system.Problem Solving:Hence, to solve this problem a new nonlinear scheme for general-purpose pseudorandom number generator (Implementing a New Serial Control as Nonlinear Function for Key Stream Pseudo-Random Number Generator) is presented by this research which comprises two parts; th
APA, Harvard, Vancouver, ISO, and other styles
21

WANG, XING-YUAN, and LEI YANG. "DESIGN OF PSEUDO-RANDOM BIT GENERATOR BASED ON CHAOTIC MAPS." International Journal of Modern Physics B 26, no. 32 (2012): 1250208. http://dx.doi.org/10.1142/s0217979212502086.

Full text
Abstract:
In order to solve the problem of degradation of dynamical properties caused by finite states of computer, a new binary stream-cipher algorithm based on dual one-dimensional chaotic maps is proposed in this paper. In the process of generation, we employ a parameter of one chaotic map to perturb the other chaotic map's trajectory to lengthen the cycle-length of the other chaotic map's trajectory. In addition, we design a nonlinear principle to generate a pseudo-random chaotic bit sequence as key stream. Statistic proprieties show that the sequence is of high randomness.
APA, Harvard, Vancouver, ISO, and other styles
22

Riyadi, Eko, Tri Priyambodo, and Agfianto Putra. "The Dynamic Symmetric Four-Key-Generators System for Securing Data Transmission in the Industrial Control System." International Journal of Intelligent Engineering and Systems 14, no. 1 (2021): 376–86. http://dx.doi.org/10.22266/ijies2021.0228.35.

Full text
Abstract:
Most of the communication protocols in the Industrial Control System (ICS) are vulnerable to cyber-attacks. Initially, the network protocol was designed for reliable performance, and thus did not incorporate data transmission security features. Therefore, ICS requires adequate data transmission security. This paper suggests improving the security of data transmission through a dynamic symmetric four-key-generators system, wherein the system anticipates cyberattacks by generating four keys before encryption. It involves four generators: a random initial key generator, a keystream generator, a k
APA, Harvard, Vancouver, ISO, and other styles
23

G S, Pushpalatha, and Ramesh S. "Pseudo Random Binary Sequences Obtained Using Novel Chaos Based Key Stream Generator and their Auto-correlation Properties." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 5 (2023): 141–47. http://dx.doi.org/10.17762/ijritcc.v11i5.6588.

Full text
Abstract:
In this paper, psuedo random binary sequences are generated from the “Chaos Based Key Stream Generator- using novel Permutation technique with two dimensional patterns and substitution technique with Z4 mapping” and investigation of auto correlation property for the generated seuwnces is presented. Initially a chaotic function, considering Logistic map is used to generate a Pseudo Random Numbers (PRNs). Then these numbers are converted into binary sequences using binary mapping. These sequences are further modified by novel permutation techniques defined using 2-Dimensional patterns, and subst
APA, Harvard, Vancouver, ISO, and other styles
24

Zaurbek, A., and D. Z. Dzhuruntaev. "DIGITAL OSCILLATOR CIRCUIT WITH AN EXTENDED REPETITION PERIOD OF A PSEUDO-RANDOM PULSE SEQUENCE." BULLETIN Series of Physics & Mathematical Sciences 69, no. 1 (2020): 210–14. http://dx.doi.org/10.51889/2020-1.1728-7901.36.

Full text
Abstract:
In this paper, we consider the issue of upgrading the circuit of a digital generator of a pseudo-random pulse sequence, which can be used to create cryptographic encryption algorithms. The need to modernize the digital generator circuit is associated with an increase in the number of pseudorandom pulse train sequences generated at its output and with pseudorandom intervals between them. To achieve this, a small number of additional elements are included in the circuit of a digital pseudorandom sequence of pulses based on a five-digit shift register with linear feedback. Based on the modernized
APA, Harvard, Vancouver, ISO, and other styles
25

Kordov, Krasimir. "A Novel Audio Encryption Algorithm with Permutation-Substitution Architecture." Electronics 8, no. 5 (2019): 530. http://dx.doi.org/10.3390/electronics8050530.

Full text
Abstract:
In this paper, a new cryptographic method is proposed, designed for audio files’ security. The encryption algorithm is based on classic symmetric models using pseudo-random number generator composed with chaotic circle map and modified rotation equations. The scheme of a new pseudo-random generator is presented and used as basis for chaotic bit-level permutations and substitutions applied to audio files structure for successful encryption. The audio encryption and decryption algorithms are described and explained. Proving the high level of security we provide extensive cryptographic analysis i
APA, Harvard, Vancouver, ISO, and other styles
26

A. Shawkat, Shihab, Najiba Tagougui, and Monji Kherallah. "Optimization-based pseudo random key generation for fast encryption scheme." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1007–18. http://dx.doi.org/10.11591/eei.v12i2.4953.

Full text
Abstract:
Data encryption is being widely employed to secure data in order to provide confidentiality, authenticity and data privacy. In proposed method a novel method for (encryption, decryption) message through optimization using genetic algorithm (GA) is presented which aims to maintain the security of the message via increasing the complexity of the key used in the encryption. The proposed method is named stream cipher randomization using GA (SCRGA). It is characterized by its secrecy by hiding the statistical properties for the input message. The GA increases the key diffusion in order to eliminate
APA, Harvard, Vancouver, ISO, and other styles
27

Shihab, A. Shawkat, Tagougui Najiba, and Kherallah Monji. "Optimization-based pseudo random key generation for fast encryption scheme." Bulletin of Electrical Engineering and Informatics 12, no. 2 (2023): 1007~1018. https://doi.org/10.11591/eei.v12i2.4953.

Full text
Abstract:
Data encryption is being widely employed to secure data in order to provide confidentiality, authenticity and data privacy. In proposed method a novel method for (encryption, decryption) message through optimization using genetic algorithm (GA) is presented which aims to maintain the security of the message via increasing the complexity of the key used in the encryption. The proposed method is named stream cipher randomization using GA (SCRGA). It is characterized by its secrecy by hiding the statistical properties for the input message. The GA increases the key diffusion in order to eliminate
APA, Harvard, Vancouver, ISO, and other styles
28

Elizalde-Canales, Francisca Angélica, Iván de Jesus Rivas-Cambero, Lucio Fidel Rebolledo-Herrera, and Cesar Joel Camacho-Bello. "Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in Data Protection of Electric Power Consumption." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (2019): 1399–409. https://doi.org/10.11591/ijece.v9i2.pp1399-1409.

Full text
Abstract:
Cryptographic algorithms have played an important role in information security for protecting privacy. The literature provides evidence that many types of chaotic cryptosystems have been proposed. These chaotic systems encode information to obviate its orbital instability and ergodicity. In this work, a pseudo pseudo-random cryptographic generator algorithm with a symmetric key, based on chaotic functions, is proposed. Moreover, the algorithm exploits dynamic simplicity and synchronization to generate encryption sub-keys using unpredictable seeds, extracted from a chaotic zone, in order to inc
APA, Harvard, Vancouver, ISO, and other styles
29

Sokolov, A. V., and D. A. Isakov. "Authenticated encryption mode with blocks skipping." «System analysis and applied information science», no. 3 (October 4, 2021): 59–65. http://dx.doi.org/10.21122/2309-4923-2021-3-59-65.

Full text
Abstract:
Block symmetric ciphers are one of the most important components of modern information security systems. At the same time, in addition to the structure of the applied block symmetric cipher, the cryptographic strength and performance of the information protection system is largely determined by the applied encryption mode. In addition to high performance and high-quality destruction of block statistics, modern encryption modes should also protect encrypted information from occurred or intentionally introduced errors. In this paper, we have developed an encryption mode with blocks skipping and
APA, Harvard, Vancouver, ISO, and other styles
30

Lambic, Dragan, and Mladen Nikolic. "New pseudo-random number generator based on improved discrete-space chaotic map." Filomat 33, no. 8 (2019): 2257–68. http://dx.doi.org/10.2298/fil1908257l.

Full text
Abstract:
In this paper, a new pseudo-random number generator (PRNG) based on improved onedimensional discrete-space chaotic map is proposed. Like the original, the improved map relies on bijective mapping of permutations and natural numbers. Instead of using standard Lehmer code, we use a mapping computable in linear time, which significantly speeds up the PRNG. Results of NIST 800-22 test suite and TestU01 test suite confirm that the proposed approach can be used for generation of pseudo-random numbers. Due to discrete nature of used chaotic map, the proposed PRNG is not influenced by dynamical degrad
APA, Harvard, Vancouver, ISO, and other styles
31

Vybornova, Y. D. "Password-based key derivation function as one of Blum-Blum-Shub pseudo-random generator applications." Procedia Engineering 201 (2017): 428–35. http://dx.doi.org/10.1016/j.proeng.2017.09.669.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Jafari Barani, Milad, Peyman Ayubi, Milad Yousefi Valandar, and Behzad Yosefnezhad Irani. "A new Pseudo random number generator based on generalized Newton complex map with dynamic key." Journal of Information Security and Applications 53 (August 2020): 102509. http://dx.doi.org/10.1016/j.jisa.2020.102509.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Baldanzi, Luca, Luca Crocetti, Francesco Falaschi, et al. "Cryptographically Secure Pseudo-Random Number Generator IP-Core Based on SHA2 Algorithm." Sensors 20, no. 7 (2020): 1869. http://dx.doi.org/10.3390/s20071869.

Full text
Abstract:
In the context of growing the adoption of advanced sensors and systems for active vehicle safety and driver assistance, an increasingly important issue is the security of the information exchanged between the different sub-systems of the vehicle. Random number generation is crucial in modern encryption and security applications as it is a critical task from the point of view of the robustness of the security chain. Random numbers are in fact used to generate the encryption keys to be used for ciphers. Consequently, any weakness in the key generation process can potentially leak information tha
APA, Harvard, Vancouver, ISO, and other styles
34

Siva Kumar, M., B. Murali Krishna, N. Sai Tejeswi, Sanath Kumar Tulasi, N. Srinivasulu, and K. Hari Kishore. "FPGA implementation of tunable arbitrary sequencer for key generation mechanism." International Journal of Engineering & Technology 7, no. 1.5 (2017): 237. http://dx.doi.org/10.14419/ijet.v7i1.5.9154.

Full text
Abstract:
In the present scenario information security has become a predominant issue. Cryptography is the process used for the purpose of information security. In cryptography message is encrypted with key produces cipher and decrypts the original message from cipher uses variety mechanisms and permutations. This paper presents a key generation mechanism suitable in cryptography applications which plays a vital role in data security. Random key generation techniques are multiplexed and configured in FPGA. In run time based on priority of section inputs randomly one method selectively produces a key whi
APA, Harvard, Vancouver, ISO, and other styles
35

Tamrkar, Sonam, Mr Rajneesh Pachouri, and Mr Anurag Jain. "“Password Authentication Key Exchange Protocol using Fish Tank Image based True Random Number Generator”." International Journal for Research in Applied Science and Engineering Technology 10, no. 12 (2022): 1450–56. http://dx.doi.org/10.22214/ijraset.2022.48232.

Full text
Abstract:
Abstract: We employ a straightforward configuration of a fish tank as the changeable environment, recording its photos over time, in order to limit the computational complexity. To create the initial seed, the image data is then submitted to a reduction method and hash function. In order to get true random numbers, we suggest a method for economically removing the true seed from the image data and applying it to a pseudo-random generator, in this case, a Linear Congruential Generator (LCG). The need for information security is increasing across a range of industries, and security concerns are
APA, Harvard, Vancouver, ISO, and other styles
36

Elizalde-Canales, Francisca Angélica, Iván De Jesus Rivas-Cambero, Lucio Fidel Rebolledo-Herrera, and Cesar Joel Camacho-Bello. "Pseudo-Random Bit Generator Using Chaotic Seed for Cryptographic Algorithm in Data Protection of Electric Power Consumption." International Journal of Electrical and Computer Engineering (IJECE) 9, no. 2 (2019): 1399. http://dx.doi.org/10.11591/ijece.v9i2.pp1399-1409.

Full text
Abstract:
<p>Cryptographic algorithms have played an important role in information security for protecting privacy. The literature provides evidence that many types of chaotic cryptosystems have been proposed. These chaotic systems encode information to obviate its orbital instability and ergodicity. In this work, a pseudo-random cryptographic generator algorithm with a symmetric key, based on chaotic functions, is proposed. Moreover, the algorithm exploits dynamic simplicity and synchronization to generate encryption sub-keys using unpredictable seeds, extracted from a chaotic zone, in order to i
APA, Harvard, Vancouver, ISO, and other styles
37

Zhao, Wenbo, and Caochuan Ma. "Modification of Intertwining Logistic Map and a Novel Pseudo Random Number Generator." Symmetry 16, no. 2 (2024): 169. http://dx.doi.org/10.3390/sym16020169.

Full text
Abstract:
Chaotic maps have been widely studied in the field of cryptography for their complex dynamics. However, chaos-based cryptosystems have not been widely used in practice. One important reason is that the following requirements of practical engineering applications are not taken into account: computational complexity and difficulty of hardware implementation. In this paper, based on the demand for information security applications, we modify the local structure of the three-dimensional Intertwining Logistic chaotic map to improve the efficiency of software calculation and reduce the cost of hardw
APA, Harvard, Vancouver, ISO, and other styles
38

Lee, Sehoon, Myungseo Park, and Jongsung Kim. "Magniber v2 Ransomware Decryption: Exploiting the Vulnerability of a Self-Developed Pseudo Random Number Generator." Electronics 10, no. 1 (2020): 16. http://dx.doi.org/10.3390/electronics10010016.

Full text
Abstract:
With the rapid increase in computer storage capabilities, user data has become increasingly important. Although user data can be maintained by various protection techniques, its safety has been threatened by the advent of ransomware, defined as malware that encrypts user data, such as documents, photographs and videos, and demands money to victims in exchange for data recovery. Ransomware-infected files can be recovered only by obtaining the encryption key used to encrypt the files. However, the encryption key is derived using a Pseudo Random Number Generator (PRNG) and is recoverable only by
APA, Harvard, Vancouver, ISO, and other styles
39

WANG, XING-YUAN, and XIAO-JUAN WANG. "DESIGN OF CHAOTIC PSEUDO-RANDOM BIT GENERATOR AND ITS APPLICATIONS IN STREAM-CIPHER CRYPTOGRAPHY." International Journal of Modern Physics C 19, no. 05 (2008): 813–20. http://dx.doi.org/10.1142/s0129183108012479.

Full text
Abstract:
Because of the sensitivity of chaotic systems on initial conditions/control parameters, when chaotic systems are realized in a discrete space with finite states, the dynamical properties will be far different from the ones described by the continuous chaos theory, and some degradation will arise. This problem will cause the chaotic trajectory eventually periodic. In order to solve the problem, a new binary stream-cipher algorithm based on one-dimensional piecewise linear chaotic map is proposed in this paper. In the process of encryption and decryption, we employ a secret variant to perturb th
APA, Harvard, Vancouver, ISO, and other styles
40

Suhad Fakhri Hussein. "A Lightweight Image Encryption based on Improving LED using Rossler Attractor." Journal of the College of Basic Education 30, no. 126 (2024): 10–29. http://dx.doi.org/10.35950/cbej.v30i126.12224.

Full text
Abstract:
Lightweight image encryption refers to the use of encryption algorithms designed to secure images while considering the limitations of resources, such as processing power and memory, typically found in devices like IoT devices, mobile phones, and embedded systems. This paper proposes a lightweight image encryption based on an LED encryption algorithm and a method for a pseudo number generator called Rossler attractor. Image is split into their three-color bands (RGB) and then partitioned into a block for encryption, a three-equations model (Rossler Attractor) is used for a pseudo number genera
APA, Harvard, Vancouver, ISO, and other styles
41

Gnatyuk, Sergiy, Yuliia Burmak, Rat Berdibayev, Marek Aleksander, and Dinara Ospanova. "METHOD FOR DEVELOPING PSEUDO-RANDOM NUMBER GENERATORS FOR CRYPTOGRAPHIC APPLICATIONS IN 5G NETWORKS." Cybersecurity: Education, Science, Technique 12, no. 4 (2021): 151–62. http://dx.doi.org/10.28925/2663-4023.2021.12.151162.

Full text
Abstract:
Today, pseudo-random number generators are used in various systems and applications, including as key generators in stream ciphers. The implementation of the latest information and communication technologies (in particular, 5G networks) strengthens the requirements for ensuring the confidentiality of critical data and forces the development of new methods and means for cryptographic protection. Existing generators, like other cryptographic algorithms, do not meet the requirements for processing speed and security against known types of attacks. From this position, in the paper a method for con
APA, Harvard, Vancouver, ISO, and other styles
42

I.M., Karimova. "METHODS FOR GENERATING KEYS FOR SYMMETRIC ENCRYPTION ALGORITHMS AND THEIR ANALYSIS." Results of National Scientific Research International Journal 4, no. 5 (2025): 180–90. https://doi.org/10.5281/zenodo.15581900.

Full text
Abstract:
<em>This article presents a classification and analysis of algorithms for generating random and pseudo-random numbers used in key generation for symmetric encryption systems. A comparative study has led to the development of an improved key generation method, addressing the limitations of existing algorithms. The analysis focuses on the cryptographic strength of pseudo-random number generators (PRNGs) and their application in symmetric and asymmetric cryptosystems, emphasizing the importance of randomness testing.</em>
APA, Harvard, Vancouver, ISO, and other styles
43

Sameeh, Abdulghafour Jassim, and Kadhim Farhan Alaa. "Combined Chebyshev and logistic maps to generate pseudorandom number generator for internet of things." International Journal of Electrical and Computer Engineering (IJECE) 12, no. 3 (2022): 3287–97. https://doi.org/10.11591/ijece.v12i3.pp3287-3297.

Full text
Abstract:
Sensitive data exchanging among things over the internet must be protected by a powerful cryptographic system. Conventional cryptographic such as advanced encryption standard (AES), and respiratory sinus arrhythmia (RSA) are not effective enough to protect internet of things (IoT) because of certain inveterate IoT properties like limited memory, computation, and bandwidth. Nowadays, chaotic maps with high sensitivity to initial conditions, strong ergodicity, and non-periodicity have been widely used in IoT security applications. So, it is suitable for IoT. Also, in a stream cipher method, the
APA, Harvard, Vancouver, ISO, and other styles
44

Yu, Hoyoung, and Youngmin Kim. "New RSA Encryption Mechanism Using One-Time Encryption Keys and Unpredictable Bio-Signal for Wireless Communication Devices." Electronics 9, no. 2 (2020): 246. http://dx.doi.org/10.3390/electronics9020246.

Full text
Abstract:
Applying the data encryption method used in conventional personal computers (PC) to wireless communication devices such as IoT is not trivial. Because IoT equipment is extremely slow in transferring data and has a small hardware area compared with PCs, it is difficult to transfer large data and perform complicated operations. In particular, it is difficult to apply the RSA encryption method to wireless communication devices because it guarantees the stability of data encryption because it is difficult to factor extremely large prime numbers. Furthermore, it has become even more difficult to ap
APA, Harvard, Vancouver, ISO, and other styles
45

Qiu, Jin, and Ping Wang. "Color Image Encryption Scheme Based on Chaotic Map." Applied Mechanics and Materials 182-183 (June 2012): 1800–1804. http://dx.doi.org/10.4028/www.scientific.net/amm.182-183.1800.

Full text
Abstract:
In this paper, a chaos-based image encryption scheme with stream cipher structure is proposed. The key component of the encryption system is a pseudo-random bit generator (PRBG) based on a chaotic map and a linear feedback shift register. The proposed PRBG is not only passes the statistical tests, but also improve the security. The overall design of the image encryption scheme is to be explained while detail cryptanalysis is given.
APA, Harvard, Vancouver, ISO, and other styles
46

Wang, Zuxi, Siyang Wang, Zhong Chen, and Boyun Zhou. "A Novel Parameter-Variabled and Coupled Chaotic System and Its Application in Image Encryption with Plaintext-Related Key Concealment." Entropy 26, no. 10 (2024): 832. http://dx.doi.org/10.3390/e26100832.

Full text
Abstract:
The design of a chaotic system and pseudo-random sequence generation method with excellent performance and its application in image encryption have always been attractive and challenging research fields. In this paper, a new model of parameter-variabled coupled chaotic system (PVCCS) is established by interaction coupling between parameters and states of multiple low-dimensional chaotic systems, and a new way to construct more complex hyperchaotic systems from simple low-dimensional systems is obtained. At the same time, based on this model and dynamical DNA codings and operations, a new pseud
APA, Harvard, Vancouver, ISO, and other styles
47

Ghosh, Sagarika, Marzia Zaman, Gary Sakauye, and Srinivas Sampalli. "An Intrusion Resistant SCADA Framework Based on Quantum and Post-Quantum Scheme." Applied Sciences 11, no. 5 (2021): 2082. http://dx.doi.org/10.3390/app11052082.

Full text
Abstract:
The rapid emergence of quantum computing threatens current Supervisory Control and Data Acquisition (SCADA) security standards, mainly, American Gas Association (AGA)-12. Therefore, researchers are developing various security schemes based on either quantum or post-quantum algorithms. However, the efficiency of quantum algorithms impacts the security of the post-quantum digital signature scheme. We propose an intrusion resistant algorithm exploiting and applying quantum principles in the post-quantum signature algorithm. We use the Bennett 1992 (B92) protocol, a quantum key distribution scheme
APA, Harvard, Vancouver, ISO, and other styles
48

Saradhi, M. Pardha, M. Tiny Serina, K. Sai Sravya, M. Pavithra, and P. Ankitha. "Enhanced Self-Test and Fault Localization in VLSI Circuit Using a 32-bit LFSR." International Scientific Journal of Engineering and Management 04, no. 04 (2025): 1–9. https://doi.org/10.55041/isjem02744.

Full text
Abstract:
An Enhanced Self-Test and Fault Localization System (STFLS) improves fault detection accuracy in digital circuits. A 32-bit LFSR-based Pseudo-Random Pattern Generator generated test patterns, establishing a fault-free reference for precise comparison. Faults were identified by detecting deviations from the stored baseline outputs to ensure accurate localization. The system was implemented in Verilog HDL and simulated using Xilinx Vivado, thereby enhancing traditional self-test techniques. This approach is highly effective for VLSI testing, hardware verification, and fault analysis, and ensures
APA, Harvard, Vancouver, ISO, and other styles
49

WANG, XINGYUAN, WEI LIU, NINI GU, and HUAGUANG ZHANG. "DIGITAL STREAM CIPHER BASED ON SCS-PRBG." International Journal of Modern Physics B 23, no. 25 (2009): 5085–92. http://dx.doi.org/10.1142/s0217979209053539.

Full text
Abstract:
Limitations caused by degeneration of dynamics characteristics may exist in the traditional single chaotic system. The authors propose a method i.e., switch controller chaos and pseudo random bit generator (it is called SCS-PRBG for short), which is based on multiple chaotic systems and switch control. By the theoretic analysis of random key stream and performance of SCS-PRBG, we can see that its digital stream cipher has better randomicity and security. And if using hardware parallel computation, the speed of encryption can be improved sharply. The results of the experiments also present bett
APA, Harvard, Vancouver, ISO, and other styles
50

Hafman, Sari Agustini, and Arif Fachru Rozi. "Analisis Teoritis dan Empiris Uji Craps dari Diehard Battery of Randomness Test untuk Pengujian Pembangkit Bilangan Acaksemu." CAUCHY 2, no. 4 (2013): 216. http://dx.doi.org/10.18860/ca.v2i4.3118.

Full text
Abstract:
According to Kerchoffs (1883), the security system should only rely on cryptographic keys which is used in that system. Generally, the key sequences are generated by a Pseudo Random Number Generator (PRNG) or Random Number Generator (RNG). There are three types of randomness sequences that generated by the RNG and PRNG i.e. pseudorandom sequence, cryptographically secure pseudorandom sequences, and real random sequences. Several statistical tests, including diehard battery of tests of randomness, is used to check the type of randomness sequences that generated by PRNG or RNG. Due to its purpos
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!