Working with cryptographic key information

نویسندگان

چکیده

It is important to create a cryptographic system such that the encryption does not depend on secret storage of algorithm part it, but only private key kept secret. In practice, management separate area cryptography, which considered problematic area. This paper describes main characteristics working with information. that, formation keys and information are stored external media. The random-number generator for generating random numbers used generation elucidated. To initialize sensor, source entropy, mechanism “Electronic Roulette” (biological number), used. generated bits were checked basis National Institute Standards Technology (NIST) statistical tests. As result survey, sequence was obtained from tests at value P?0.01. P between 0 1, closer more generated. means based proposed can be in cryptography generate crypto-resistant keys.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Cryptographic Key Management Concepts

83.2 Key Management Myths .................................................... 1070 Myth 1: A Key Qualifies as “Randomly Generated” If One or More Persons Create the Key Components from Their Imagination † Myth 2: An “Authorized” Person Can Create or Enter Cryptographic Keys without Compromising a Key † Myth 3: Requiring a Second Person to Supervise or Observe the Key Entry Process Is Dual Cont...

متن کامل

Cryptographic schemes, key exchange, public key

General cryptographic schemes are presented where keys can be one-time or ephemeral. Processes for key exchange are derived. Public key cryptographic schemes based on the new systems are established. Authentication and signature schemes are easy to implement. The schemes may be integrated with error-correcting coding schemes so that encryption/coding and decryption/decoding may be done simultan...

متن کامل

Quantum Cryptographic Key Distribution Protocols

The application of the principles of quantum mechanics to cryptography has led to a respectable new dimension in confidential communication. As a result of these developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a incontestable guarantee of no eavesdropping should it not occur. Here several p...

متن کامل

Channel Independent Cryptographic Key Distribution

This paper presents a method of cryptographic key distribution using an ‘artificially’ noisy channel. This is an important development because, while it is known that a noisy channel can be used to generate unconditional secrecy, there are many circumstances in which it is not possible to have a noisy information exchange, such as in error corrected communication stacks. It is shown that two le...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Power Electronics and Drive Systems

سال: 2023

ISSN: ['2722-2578', '2722-256X']

DOI: https://doi.org/10.11591/ijece.v13i1.pp911-919