IMAGE BASED MULTI-LENGTH RANDOM KEY GENERATOR

محتوى المقالة الرئيسي

Firas Ali Sabir
Sadiq Habeeb Abdulhussain

الملخص

Random Number Generators (RNGs) are an important building block for algorithms and protocols in
cryptography. They are dominant in the construction of encryption keys and other cryptographic algorithm parameters. In practice, statistical testing is employed to gather evidence that a generator indeed produces numbers that appear to be random. In this paper a new algorithm is proposed to generate variable length random binary sequence. The random sequence is generated by selecting different point from hashed digital images; the selecting process is organized in such a way to ensure randomness and to avoid regeneration of same sequence within a year. The generated sequences are tested to meet the National Institute of Standard and Technology (NIST) criteria. In proposed algorithm the traditional key exchange is not needed which gives advantage to the system from the security point of view. This proposed algorithm is capable of generating random binary sequences that can meet security requirements of cryptographic algorithms.

تفاصيل المقالة

القسم

Articles

كيفية الاقتباس

"IMAGE BASED MULTI-LENGTH RANDOM KEY GENERATOR" (2011) مجلة الهندسة, 17(03), ص 486–498. doi:10.31026/j.eng.2011.03.11.

المراجع

• Andrew Rukhin, et al "A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic

Applications", National Institute of Standard and Technology, 2008.

• Andrew W, Walter A., "Hardware comparison of seven random number generators for smart cards", In: ITG-GIGMM

Workshop of Test Methods and Reliability of Circuits and Systems, Timmendorfer Beach, pp. 55–58, 2003.

• Bruce Schneier, "Applied Cryptography", John Wiley and Sons, 2nd Edition, 1996.

• Charmaine Kenny, "Random Number Generators: An Evaluation and Comparison of Random.org and Some

Commonly Used Generators" the distributed systems group, Computer Science Department, TCD, 2005.

• Juan Soto, "Statistical Testing of Random Number Generators", Proceedings of the 22nd National Information Systems

Security Conference, 1999.

• Menezes A., van Oorschot P., and Vanstone S., "Handbook of Applied Cryptography", CRC Press, 1997.

• Nur A. Abu, and Sharin Sahib, "Random ambience key generation live on demand", Signal Processing Systems

(ICSPS), 2010 2nd International Conference on 2010, Vol. 1, pp. 110-114.

• Nur A. Abu, Nanna S. Herman, and Sharin Sahib, "An Enhancement of the statistical test for randomness", Networking and Information Technology (ICNIT), 2010 International Conference 2010, pp. 521-525.

• Peter Alfke, "Efficient Shift Registers, LFSR Counters, and Long Pseudo- Random Sequence Generators", Xilinx

application note, 1996.

• R. B. P. Dept. "The Evaluation of Randomness of RPG100 by Using NIST and DIEHARD Tests". Technical report,

FDK Corporation, 2003.

• William Stallings, "Cryptography and Network Security", Perntice Hall, Fourth Edition, 2006.

• Wong Siaw Lang, Nur Azman Abu, Shahrin Sahib, "Cryptographic Key From Webcam Image", International Journal of

Cryptology Research 2009, vol. 1, pp. 115-127.

المؤلفات المشابهة

يمكنك أيضاً إبدأ بحثاً متقدماً عن المشابهات لهذا المؤلَّف.