Professional Documents
Culture Documents
Security is the most considerable nature in the present e – world. Many applications are
based on the generation of random numbers. In the present situation, hiding the data is very
difficult. So key based encryption process is suggested to keep the secure the files. Security
of the system is depends on the key. The generation of key is more important for all the
cryptography applications, which is completely depends on the randomness. As long as many
designers can developed a many RNG based keys. Still work is going on to more secure the
data from hackers. In this work author can proposed CSTRNG. It is more secure than other
RNGs. Here, one of the most used application in marketing world is digital signature
generation. The digital signature generation can be produces with the help of several keys,
which is having the property of RNG. The most secured RNG is cryptographically secured
true random number generator (CSTRNG) than other types of RNG. It can be produces a
more unpredicted numbers. The work has been developed in Xilinx ISE simulator.
CSTRNG:
3.
References:
[1] J. S. Kim, M. Patel, H. Hassan, L. Orosa, and O. Mutlu, ‘‘D-RaNGe:
UsingcommodityDRAMdevicestogeneratetruerandomnumberswith
lowlatencyandhighthroughput,’’inProc.IEEEInt.Symp.HighPerform. Comput. Archit. (HPCA), Feb. 2019, pp. 582–595.
[2] M. Garcia-Bosque, G. Díez-Señorans, A. Pérez-Resa, C. Sánchez-Azqueta, C. Aldea, S. Celma, ” A New Lightweight CSPRNG
Implemented in a 0.18μm CMOS Technology.,” Digital Circuits and Emerging Technologies, PRIME 2019, Lausanne, Switzerland,
pp. 221-224.
[3] Ghazi Muhammad Abdullah, Quzal Mehmood and Chaudry Bilal Ahmad Khan, “ Adoption of Lamport Signature Scheme to
Implement Digital Signatures in IoT.,” 2018 International Conference on Computing, Mathematics and Engineering Technologies –
iCoMET 2018.
[4] C. Li, B. Feng, S. Li, J. Kurths y G. Chen, “Dynamic Analysis of Digital Chaotic Maps via State-Mapping Networks, ” IEEE
Transactions on Circuits and Systems I, pp. 1-14, 2018.
[5] I.Baldini,P.Castro,K.Chang,P.Cheng,S.Fink,V.Ishakian,N.Mitchell, V. Muthusamy, R. Rabbah, and A. Slominski, ‘‘Serverless
computing: Current trends and open problems,’’ in Res. Adv. Cloud Comput. Cham, Switzerland: Springer, 2017, pp. 1–20.
[6] Ahmad Baihaqi, “Implementation of RSA 2048-bit and AES 128-bit for Secure E-learning Web-based Application”, in 11th
International Conference on Telecommunication Systems Services and Applications (TSSA), 2017.
[7] G. McGrath and P. R. Brenner, ‘‘Serverless computing: Design, implementation, and performance,’’ in Proc. IEEE 37th Int. Conf.
Distrib. Comput. Syst. Workshops (ICDCSW), Jun. 2017, pp. 405–410.
[8] J. Machicao y O. M. Bruno, “Improving the pseudo-randomness properties of chaotic maps using deep-zoom”, Chaos: An
Interdisciplinary Journal of Nonlinear Science, vol. 27, nº 5, pp. 0531161 053116-14, 2017.
[9] P. Castro, V. Ishakian, V. Muthusamy, and A. Slominski, ‘‘Serverless programming (function as a service),’’ in Proc. IEEE 37th Int.
Conf. Distrib. Comput. Syst. (ICDCS), Jun. 2017, pp. 2658–2659.
[10] Q. Wang, S. Yu, C. Li, J. Lü, X. Fang, C. Guyeux y J. Bahi, “Theoretical design and FPGA-based implementations of higher-
dimensional digital chaotic systems, ” IEEE Trans. Circuits Syst. I, vol. 63, nº 10, pp. 302309, 2016.
[11] N.C.LaurenciuandS.D.Cotofana,‘‘Lowcostandenergy,thermalnoise driven, probability modulated random number generator,’’ in Proc.
IEEE Int. Symp. Circuits Syst. (ISCAS), May 2015, pp. 2724–2727.
[12] J. Bonneau, J. Clark, and S. Goldfeder, ‘‘On bitcoin as a public randomness source,’’ in Proc. IACR Cryptol. ePrint Arch., vol. 2015,
2015, p. 1015.
[13] S. Müller, ‘‘CPU time jitter based non-physical true random number generator,’’ in Proc. Ottawa Linux Symp., 2014, p. 1.
[14] ] K. Mowery, M. Wei, D. Kohlbrenner, H. Shacham, and S. Swanson, ‘‘Welcome to the entropics: Boot-time entropy in embedded
devices,’’ in Proc. IEEE Symp. Secur. Privacy, May 2013, pp. 589–603.
[15] R.N.Akram,K.Markantonakis,andK.Mayes,‘‘Pseudorandomnumber generationinsmartcards: Animplementation, performance and
randomness analysis,’’ in Proc. 5th Int. Conf. New Technol., Mobility Secur. (NTMS), May 2012, pp. 1–7.
[16] B. Grobauer, T. Walloschek, and E. Stocker, ‘‘Understanding cloud computing vulnerabilities,’’ IEEE Secur. Privacy Mag., vol. 9, no.
2, pp. 50–57, Mar. 2011.
[17] A. Berl, E. Gelenbe, M. Di Girolamo, G. Giuliani, H. De Meer, M. Q. Dang, and K. Pentikousis, ‘‘Energy-efficient cloud computing,’’
Comput. J., vol. 53, no. 7, pp. 1045–1051, 2010.
[18] B. Valtchanov, V. Fischer, A. Aubert, and F. Bernard, ‘‘Characterization of randomness sources in ring oscillator-based true random
number generators in FPGAs,’’ in Proc. 13th IEEE Symp. Design Diag. Electron. Circuits Syst., Apr. 2010, pp. 48–53.
[19] M. S. Azzaz, C. Tanougast, S. Sadoudi y A. Dandache, "Real-time FPGA implementation of Lorenz's chaotic generator for ciphering
telecommunications“, de Proceedings IEEE International Circuits and Systems and Taisa Conference, 2009.
[20] Chong Fu, “An Eficient Implementation on RSA Digital Signature”, in 4th International Conference on Wireless Communication,
Networking, and Mobile Computing, 2008.
[21] M. Bucci, L. Germani, R. Luzzi, A. Trifiletti, and M. Varanonuovo, ‘‘A high-speed oscillator-based truly random number source for
cryptographic applications on a smart card ic,’’ IEEE Trans. Comput., vol. 52, no. 4, pp. 403–409, Apr. 2003.