A New Scheme for Pseudo Random Numbers Generator Based on Secret Splitting

نویسنده

  • Ayman A. Rahim A. Rahman
چکیده

64 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Pvt. Ltd. Abstract— This paper presents a secure scheme for generating a pseudo random numbers. The scheme is based on secret splitting of a piece of secure information which is used as a seed to the generator. In this scheme the procedure of splitting the secure information is performed according to a specified weight in such a way that each segment of the information piece takes a special weight depending on the priority of each part of the random number sequence. Another important concept used in this method is the agreement strategy applied to the secure information. By comparison of this scheme with other methods of generating pseudo random generation, it is found that there are a secure complex relationships among the elements of the random number sequences which are difficult to be discovered by most active attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

New Improved and Robust Watermarking Technique based on 3 rd LSB substitution method

With the rapid development and wide use of Internet, information transmission faces a big challenge of security. People need a safe and secured way to transmit information. Encryption is a common method, which is used for encrypting information. But it is easier to attract the attention of the attackers because the information cannot be read directly. The information will be intercepted, deciph...

متن کامل

A Very Efficient Pseudo-Random Number Generator Based On Chaotic Maps and S-Box Tables

Generating random numbers are mainly used to create secret keys or random sequences. It can be carried out by various techniques. In this paper we present a very simple and efficient pseudo random number generator (PRNG) based on chaotic maps and S-Box tables. This technique adopted two main operations one to generate chaotic values using two logistic maps and the second to transform them into ...

متن کامل

Generating Chaotic Stream Ciphers Using Chaotic Systems

A new scheme for generating good pseudo-random numbers, based on the composition of chaotic maps, is studied. In this method, hereafter called the chaotic stream cipher, one first uses a known chaotic dynamical system to generate a sequence of pseudo-random bytes, then applies certain permutations to them, using the discretized version of another two-dimensional chaotic map. Standard statistica...

متن کامل

Improving the Security of Pseudo-random Sequence Generator Based on Chen Chaotic System ?

In this letter, the cause of vulnerability of the original pseudo-random sequence generator based on Chen chaotic system is analyzed, and the corresponding enhancement methods are proposed. Transient data produced by the calculation among fixed-point numbers is used to improve the performance of the original scheme. Statistical tests and security analysis indicate that the modified scheme is mo...

متن کامل

A NEW SECRET SHARING SCHEME ADVERSARY FUZZY STRUCTURE BASED ON AUTOMATA

In this paper,we introduce a new verifiable multi-use multi-secretsharing scheme based on automata and one-way hash function. The scheme has theadversary fuzzy structure and satisfy the following properties:1) The dealer can change the participants and the adversary fuzzy structure without refreshing any participants' real-shadow. 2) The scheme is based on the inversion of weakly invertible fin...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014