Home > CSC-OpenAccess Library > Manuscript Information
EXPLORE PUBLICATIONS BY COUNTRIES |
EUROPE | |
MIDDLE EAST | |
ASIA | |
AFRICA | |
............................. | |
United States of America | |
United Kingdom | |
Canada | |
Australia | |
Italy | |
France | |
Brazil | |
Germany | |
Malaysia | |
Turkey | |
China | |
Taiwan | |
Japan | |
Saudi Arabia | |
Jordan | |
Egypt | |
United Arab Emirates | |
India | |
Nigeria |
A Proposed Approach for Unique Random Key Generation
Dalal N. Hamood, Abdulrahman Q. Hammod
Pages - 69 - 84 | Revised - 30-11-2022 | Published - 31-12-2022
Published in International Journal of Security (IJS)
MORE INFORMATION
KEYWORDS
Random Number Generator, Randomness, Binary Tree List, Ranges, Time Generation.
ABSTRACT
Regarding network security, many cryptographic techniques use random numbers. To boost its
robustness, a precise quantity of randomness must be used to make encryption and decryption
unexpected. This paper offered a mechanism that chooses a distinctive number based on data
instead of a temporal seed, which is what the bulk of applications now do. The suggested method
is the basis for Unique Random Generation and uses the parallel technique. This approach has
been tried, and the findings demonstrate that it is easy to use and yields the best results because
it chooses a distinct number based purely on data. The random key is better than regular keys
since it is dynamic whereas regular keys are static. After testing the proposed work, concluded
when using seeds with the appropriate levels of entropy, this method can generate sequences
whose randomness cannot be distinguished from that of an ideal random generator, with a
confidence level of 99%. Additionally, the proposed method used base=2 to produce the highest
entropy, the lowest space complexity, and the highest time complexity than methods based time
seed.the proposed method success in all NIST tests (high randomness) and has a short time in
generation (faster method). This method appropriates for high security applications.
Adi N. R. K and Vishnuvardhan B., (2014), Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution, International Journal of Security (IJS), Vol (8), No (3), PP:24-32. | |
Challita K., andFarhat H., (2011), Combining steganography and cryptography: new directions, International Journal of New Computer Architectures and their Applications (IJNCAA), Volume 1, Issue 1, pp.199-208. | |
Chatterjee D.,Nath J.,Dasgupta S., andNath A., (2011), A new Symmetric Key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm. Paper presented at the Communication Systems and Network Technologies (CSNT), 2011 International Conference on. | |
Chavan P. V.,Atiquedan M., andMalik L.,(2014), Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares, International Journal of Network Security, vol. 6, no. 1, pp. 91-102. | |
Crocetti L., Matteo S. D., Nannipieri P., Fanucci L. and Saponara S., (2022),†Design and Test of an Integrated Random Number Generator with All-Digital Entropy Source. | |
Das K. and Bandyopadhyay S. K., (2016), A REVIEW PAPER ON VARIOUS VISUAL CRYPTOGRAPHY SCHEMES, International Journal of Current Research Vol. 8, Issue, 06, pp.32445-32449. | |
Gamil R.S.Q. and Sanjay N. T., (2012), Encryption and Decryption of Digital Image Using Color signal, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2. | |
Jyoti T., Anu S., Kishan, Nikhil, Shazad, (2020),Enhanced Visual Cryptography: An Augmented Model for Image Security, International Conference on Computational Intelligence and Data Science (ICCIDS 2019), Elsevier B.V. | |
Leach P., (2005), A Universally Unique IDentifier (UUID) URN Namespac, LLC R. SalzDataPower Technology. | |
MangiH.. and YoungminK. , (2017), Unpredictable 16 bits LFSR-based true random number generator. | |
Maxim integrated, (2019), https://www.maximintegrated.com/en/appnotes/index.mvp/id/4400, last accessed 2019/02/11. | |
Panda S. and Kavana B. R., (2018), Electronic Document Verification using Visual Cryptography, International Journal of Innovative Science and Research Technology, Volume 3, Issue 11. | |
Raphael A. J., and Sundaram V., (2011), “Cryptography and Steganography- A Surveyâ€, International Journal of Computer Technology and Applications, Volume 2, Issue 3. | |
Ripon Patgiri, (2021), Rando: A General-purpose True Random Number Generator for Conventional Computers, 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, DOI:10.1109/TrustCom53373.2021.00032. | |
Ross A. and Othmen A., (2011), Visual Cryptography for Biometric Privacyâ€, IEEE Transactions on Information forensics and security, vol. 6, no. 1, pp. 70- 81. | |
Rukhin A., Soto J., Smid M., E. Barker, S. Leigh, M. Levenson., M. Vangel, D. Banks, A. Heckert, J.DrayAnd S. Vo,(2010), A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Speical Publication 800-22. | |
Salih E. and Sercan T., (2018), Random Number Generation Using Dual Oscillator Architecture and Discrete-Time Chaos, Conference: 2018 international Symposium on Electronics and Smart Devices (ISESD), DOI: 10.1109/ISESD.2018.8605452. | |
Selman Y., Taner T., Ahmet B. O., (2019), Secure and Efficient Hybrid Random Number Generator Based on Sponge Constructions for Cryptographic Applications. | |
Shyu S. J., (2013), Visual Cryptography of Random Grids for General Access Strctures, IEEE, vol. 23. no. 3. | |
Simona B.,Róbert L., FilipK., and JirÃB. , (2016), True Random Number Generator Based on ROPUF Circuit, Published in: 2017 International SoC Design Conference (ISOCC). | |
Srivatsan I. and Tejas A., (2014), Multi-part Dynamic Key Generation For Secure Data Encryption, International Journal of Security (IJS), Vol (8), No (4), PP:37-46. | |
Stalling W., (2013), Cryptography And Network Security, 5th Edition. | |
Wang D., Yi F., Li X., (2009), On General Construction For Extended Visual Cryptography Schemes, Pattern Recognition 42(2009), pp 3071– 3082. | |
Yadagiri Rao R. and Swetha R., (2013),SECURE VISUAL CRYPTOGRAPHY, International Journal of Scientific & Engineering Research Vol(4), No (3). | |
Yaprak G. D. and Muhammet K., (2019),A computational method for large-scale differential symmetric Stein equation, Special Issue: ICOMATH2018 - International Conference on Mathematics: An Istanbul Meeting for World Mathematicians 2018, Vol(42), No (16). | |
Yicheng S., Brenda C. and Christian K., (2016), Random numbers from vacuum fluctuations, Published in: 2016 Euromicro Conference on Digital System Design (DSD). | |
Yutaka S., (2020), Unpredictable random number generator,Cite as: AIP Conference Proceedings 2286, 040004 (2020); https://doi.org/10.1063/5.0029701 Published Online: 03 December 2020. | |
Dr. Dalal N. Hamood
Computer Department/College of Science, University AL-Nahrain, Baghdad, 10001 - Iraq
dalal.naeem@nahrainuniv.edu.iq
Mr. Abdulrahman Q. Hammod
Computer Department/College of Science, University AL-Nahrain, Baghdad, 10001 - Iraq
|
|
|
|
View all special issues >> | |
|
|