Home   >   CSC-OpenAccess Library   >    Manuscript Information
A Proposed Approach for Unique Random Key Generation
Dalal N. Hamood, Abdulrahman Q. Hammod
Pages - 69 - 84     |    Revised - 30-11-2022     |    Published - 31-12-2022
Volume - 13   Issue - 3    |    Publication Date - December 2022  Table of Contents
MORE INFORMATION
KEYWORDS
Random Number Generator, Randomness, Binary Tree List, Ranges, Time Generation.
ABSTRACT
Regarding network security, many cryptographic techniques use random numbers. To boost its robustness, a precise quantity of randomness must be used to make encryption and decryption unexpected. This paper offered a mechanism that chooses a distinctive number based on data instead of a temporal seed, which is what the bulk of applications now do. The suggested method is the basis for Unique Random Generation and uses the parallel technique. This approach has been tried, and the findings demonstrate that it is easy to use and yields the best results because it chooses a distinct number based purely on data. The random key is better than regular keys since it is dynamic whereas regular keys are static. After testing the proposed work, concluded when using seeds with the appropriate levels of entropy, this method can generate sequences whose randomness cannot be distinguished from that of an ideal random generator, with a confidence level of 99%. Additionally, the proposed method used base=2 to produce the highest entropy, the lowest space complexity, and the highest time complexity than methods based time seed.the proposed method success in all NIST tests (high randomness) and has a short time in generation (faster method). This method appropriates for high security applications.
Adi N. R. K and Vishnuvardhan B., (2014), Secure Linear Transformation Based Cryptosystem using Dynamic Byte Substitution, International Journal of Security (IJS), Vol (8), No (3), PP:24-32.
Challita K., andFarhat H., (2011), Combining steganography and cryptography: new directions, International Journal of New Computer Architectures and their Applications (IJNCAA), Volume 1, Issue 1, pp.199-208.
Chatterjee D.,Nath J.,Dasgupta S., andNath A., (2011), A new Symmetric Key Cryptography Algorithm using extended MSA method: DJSA symmetric key algorithm. Paper presented at the Communication Systems and Network Technologies (CSNT), 2011 International Conference on.
Chavan P. V.,Atiquedan M., andMalik L.,(2014), Design and Implementation of Hierarchical Visual Cryptography with Expansionless Shares, International Journal of Network Security, vol. 6, no. 1, pp. 91-102.
Crocetti L., Matteo S. D., Nannipieri P., Fanucci L. and Saponara S., (2022),” Design and Test of an Integrated Random Number Generator with All-Digital Entropy Source.
Das K. and Bandyopadhyay S. K., (2016), A REVIEW PAPER ON VARIOUS VISUAL CRYPTOGRAPHY SCHEMES, International Journal of Current Research Vol. 8, Issue, 06, pp.32445-32449.
Gamil R.S.Q. and Sanjay N. T., (2012), Encryption and Decryption of Digital Image Using Color signal, IJCSI International Journal of Computer Science Issues, Vol. 9, Issue 2, No 2.
Jyoti T., Anu S., Kishan, Nikhil, Shazad, (2020),Enhanced Visual Cryptography: An Augmented Model for Image Security, International Conference on Computational Intelligence and Data Science (ICCIDS 2019), Elsevier B.V.
Leach P., (2005), A Universally Unique IDentifier (UUID) URN Namespac, LLC R. SalzDataPower Technology.
MangiH.. and YoungminK. , (2017), Unpredictable 16 bits LFSR-based true random number generator.
Maxim integrated, (2019), https://www.maximintegrated.com/en/appnotes/index.mvp/id/4400, last accessed 2019/02/11.
Panda S. and Kavana B. R., (2018), Electronic Document Verification using Visual Cryptography, International Journal of Innovative Science and Research Technology, Volume 3, Issue 11.
Raphael A. J., and Sundaram V., (2011), “Cryptography and Steganography- A Survey”, International Journal of Computer Technology and Applications, Volume 2, Issue 3.
Ripon Patgiri, (2021), Rando: A General-purpose True Random Number Generator for Conventional Computers, 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, DOI:10.1109/TrustCom53373.2021.00032.
Ross A. and Othmen A., (2011), Visual Cryptography for Biometric Privacy”, IEEE Transactions on Information forensics and security, vol. 6, no. 1, pp. 70- 81.
Rukhin A., Soto J., Smid M., E. Barker, S. Leigh, M. Levenson., M. Vangel, D. Banks, A. Heckert, J.DrayAnd S. Vo,(2010), A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST Speical Publication 800-22.
Salih E. and Sercan T., (2018), Random Number Generation Using Dual Oscillator Architecture and Discrete-Time Chaos, Conference: 2018 international Symposium on Electronics and Smart Devices (ISESD), DOI: 10.1109/ISESD.2018.8605452.
Selman Y., Taner T., Ahmet B. O., (2019), Secure and Efficient Hybrid Random Number Generator Based on Sponge Constructions for Cryptographic Applications.
Shyu S. J., (2013), Visual Cryptography of Random Grids for General Access Strctures, IEEE, vol. 23. no. 3.
Simona B.,Róbert L., FilipK., and JiríB. , (2016), True Random Number Generator Based on ROPUF Circuit, Published in: 2017 International SoC Design Conference (ISOCC).
Srivatsan I. and Tejas A., (2014), Multi-part Dynamic Key Generation For Secure Data Encryption, International Journal of Security (IJS), Vol (8), No (4), PP:37-46.
Stalling W., (2013), Cryptography And Network Security, 5th Edition.
Wang D., Yi F., Li X., (2009), On General Construction For Extended Visual Cryptography Schemes, Pattern Recognition 42(2009), pp 3071– 3082.
Yadagiri Rao R. and Swetha R., (2013),SECURE VISUAL CRYPTOGRAPHY, International Journal of Scientific & Engineering Research Vol(4), No (3).
Yaprak G. D. and Muhammet K., (2019),A computational method for large-scale differential symmetric Stein equation, Special Issue: ICOMATH2018 - International Conference on Mathematics: An Istanbul Meeting for World Mathematicians 2018, Vol(42), No (16).
Yicheng S., Brenda C. and Christian K., (2016), Random numbers from vacuum fluctuations, Published in: 2016 Euromicro Conference on Digital System Design (DSD).
Yutaka S., (2020), Unpredictable random number generator,Cite as: AIP Conference Proceedings 2286, 040004 (2020); https://doi.org/10.1063/5.0029701 Published Online: 03 December 2020.
Dr. Dalal N. Hamood
Computer Department/College of Science, University AL-Nahrain, Baghdad, 10001 - Iraq
dalal.naeem@nahrainuniv.edu.iq
Mr. Abdulrahman Q. Hammod
Computer Department/College of Science, University AL-Nahrain, Baghdad, 10001 - Iraq


CREATE AUTHOR ACCOUNT
 
LAUNCH YOUR SPECIAL ISSUE
View all special issues >>
 
PUBLICATION VIDEOS