You are on page 1of 20

K.L.E.

SOCIETY’S
K.L.E. COLLEGE OF ENGINEERING AND TECHNOLOGY,
CHIKODI-591 201
DEPT. OF ELECTRONICS AND COMMUNICATION & ENGINEERING

Project Demo On

Fast Generation of Pseudo-Random


Cryptographic Keys implementing on IDEA
Algorithm
By
Soumya Tippannavar(2KD10EC050) Ashwini
Telsang(2KD10EC008)
Shruti Hulagabali(2KD10EC043) Kishori Patil(2KD10EC020)

Under The Guidence


Prof. Jyothi.C.K
1
contents
Literature survey.
Introduction.
Pseudo random key generator.
IDEA algorithm with Block diagram.
Software tool Required
Advantages and Disadvantages.
Applications.
Scope of future work.
References.

2
3
Introduction
Cryptography provides security to data and communication.

A new method for the fast generation of pseudo random


cryptographic keys with high degree of randomness and high
resistance to replication.

Initial key string is produced using all the components of seed


considered like system time, processes information, cursor position,
CPU register information etc.

All cryptographic algorithms need generation of secret, un-


guessable random numbers.

4
Pseudo random number
cryptographic key generator
How to generate the pseudo random cryptographic key?

Lot of work and research is done in the area of Random


Number Generators, Random Key Generators, Pseudo-
Random Keys and Numbers, Bio-metric Key generators,
Hybrid RNG etc.

5
Specification of algorithm

Generating randomness along with specified character
generation of random cryptographic key.


Computer clocks, or similar operating system or hardware
values etc.


we are considering time string obtained from system time
just to demonstrate how rotating string and a random
number generator together can be clubbed to obtain a
pseudo random cryptographic keys.

6
continued
Following are considered for the algorithm to be
presented in this paper
i. Seed.
ii. Random Number Generator.
iii. Initial key String.
iv. User Preference string .

7
Initial key string
E.g. of Initial key string: Mon Feb 09 02:25:53 2009

8
IDEA Algorithm
It operates on 64-bit plaintext and ciphertext blocks with a
128-bit key.

IDEA is somewhat different from the rest of the symmetric


key encryption algorithms in that it uses algebraic
operations completely and does without table lookup
methods.

9
continued
The project is sub-divided into 5 parts, which are the

1.IDEA core
2.The key schedulers for encryption.
3.Decryption
4. The modular multiplier
5.The modular inverter.

10
IDEA core block diagram

11
Idea core

12
Software Tool
 MATLAB 7.0

13
Advantages and Disadvantages
Advantages:
Simple
Encrypt and decrypt your own files
Fast
Uses less computer resources
Prevents widespread message security compromise

14
Disadvantages:

Need for secure channel for secret key exchange.

Too many keys.

15
Applications
Online Web based File Sharing

Email Passwords

 Folder Locks

16
Scope for future work
Future work could be done on idea concerning with
pseudo random cryptographic key generation over a
proactive symmetric key systems.
Research in this area could be performed to assess the
idea’s practicality.
Surrounding a third party relationship. Positive results in
this analysis could lead to a possible implementation of
their research in the future.

17
References
 “Robust techniques for evaluating biometric cryptographic
key generators” ISBN
 “Designing cryptographic key generators with low power
consumption” ISBN Author: M PUCZKO and V. N. YAR[1]
MediaCrypt: IDEA Technical Description
<http://web.engr.oregonstate.edu/~laige/ece575/IDEA
%20Technical%20Description_0503.pdf>
 Irwin Yoon's ECE575 Project - IDEA
Algorithm<http://islab.oregonstate.edu

18
19
QUERIES
…????

20

You might also like