Professional Documents
Culture Documents
SOCIETY’S
K.L.E. COLLEGE OF ENGINEERING AND TECHNOLOGY,
CHIKODI-591 201
DEPT. OF ELECTRONICS AND COMMUNICATION & ENGINEERING
Project Demo On
2
3
Introduction
Cryptography provides security to data and communication.
4
Pseudo random number
cryptographic key generator
How to generate the pseudo random cryptographic key?
5
Specification of algorithm
Generating randomness along with specified character
generation of random cryptographic key.
Computer clocks, or similar operating system or hardware
values etc.
we are considering time string obtained from system time
just to demonstrate how rotating string and a random
number generator together can be clubbed to obtain a
pseudo random cryptographic keys.
6
continued
Following are considered for the algorithm to be
presented in this paper
i. Seed.
ii. Random Number Generator.
iii. Initial key String.
iv. User Preference string .
7
Initial key string
E.g. of Initial key string: Mon Feb 09 02:25:53 2009
8
IDEA Algorithm
It operates on 64-bit plaintext and ciphertext blocks with a
128-bit key.
9
continued
The project is sub-divided into 5 parts, which are the
1.IDEA core
2.The key schedulers for encryption.
3.Decryption
4. The modular multiplier
5.The modular inverter.
10
IDEA core block diagram
11
Idea core
12
Software Tool
MATLAB 7.0
13
Advantages and Disadvantages
Advantages:
Simple
Encrypt and decrypt your own files
Fast
Uses less computer resources
Prevents widespread message security compromise
14
Disadvantages:
15
Applications
Online Web based File Sharing
Email Passwords
Folder Locks
16
Scope for future work
Future work could be done on idea concerning with
pseudo random cryptographic key generation over a
proactive symmetric key systems.
Research in this area could be performed to assess the
idea’s practicality.
Surrounding a third party relationship. Positive results in
this analysis could lead to a possible implementation of
their research in the future.
17
References
“Robust techniques for evaluating biometric cryptographic
key generators” ISBN
“Designing cryptographic key generators with low power
consumption” ISBN Author: M PUCZKO and V. N. YAR[1]
MediaCrypt: IDEA Technical Description
<http://web.engr.oregonstate.edu/~laige/ece575/IDEA
%20Technical%20Description_0503.pdf>
Irwin Yoon's ECE575 Project - IDEA
Algorithm<http://islab.oregonstate.edu
18
19
QUERIES
…????
20