ABCRNG - Swarm Intelligence in Public key Cryptography for Random Number Generation

نویسنده

  • J.Sai Geetha
چکیده

Cryptography is an important tool for protecting and securing data. In public key cryptography, the key generation plays a vital role for strengthening the security. The random numbers are the seed values in key generation process in many of the public key cryptography algorithms, such as Elgamal, Rivest_Shamir_Adleman (RSA) algorithm etc. Much effort is dedicated to develop efficient Random Number Generators (RNG) with good statistical properties. In addition, many optimized functions are available for generating random numbers. Various RNG are compared against the performance of intelligent optimization algorithms. As an outcome, Intelligent optimization algorithms are very efficient to solve complex problems and also helpful for generating random numbers. The primary objective of the proposed algorithm (Artificial Bee Colony Random Number Generator ABCRNG) is to provide quick and improved performance results having practical and feasible implementation of random number generators. To evaluate the randomness of the random numbers generated by ABCRNG, the Run test is carried out in up and down method and also in above and below mean method. Thus, pure random and non-repeating final keys are obtained by using ABCRNG which increases the key strength and security. The proposed ABCRNG can be used in many applications requiring random numbers and also in the design of secured public key cryptosystem.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Public Key Cryptography Using Particle Swarm Optimization and Genetic Algorithms

This paper proposes an algorithm for Public Key Cryptography (PKC) using the hybrid concept of two evolutionary algorithms, Particle Swarm Optimization (PSO) and Genetic Algorithm (GA) respectively. PSO alone are fast and easy to implement, they follow the procedures of common evolutionary algorithm and posses memory feature which is absent in GA making it more valuable. In GA whole population ...

متن کامل

Swarm Intelligence based Faster Public- Key Cryptography in Wireless Communication (SIFPKC)

In this paper a Particle Swarm Organization guided faster version of public-key cryptography in wireless communication has been proposed by minimizing total number of modular multiplication, so that faster exponentiation can efficiently implemented which in turn progress the time requirements of the encryption / decryption of large number of plain or cipher text. Minimization of number of modul...

متن کامل

An efficient certificateless signcryption scheme in the standard model

Certificateless public key cryptography (CL-PKC) is a useful method in order to solve the problems of traditional public key infrastructure (i.e., large amount of computation, storage and communication costs for managing certificates) and ID-based public key cryptography (i.e., key escrow problem), simultaneously. A signcryption scheme is an important primitive in cryptographic protocols which ...

متن کامل

Development of a Unique Biometric-based Cryptographic Key Generation with Repeatability using Brain Signals

Network security is very important when sending confidential data through the network. Cryptography is the science of hiding information, and a combination of cryptography solutions with cognitive science starts a new branch called cognitive cryptography that guarantee the confidentiality and integrity of the data. Brain signals as a biometric indicator can convert to a binary code which can be...

متن کامل

Comparison of two Public Key Cryptosystems

Since the time public-key cryptography was introduced by Diffie andHellman in 1976, numerous public-key algorithms have been proposed. Some of thesealgorithms are insecure and the others that seem secure, many are impractical, eitherthey have too large keys or the cipher text they produce is much longer than theplaintext. This paper focuses on efficient implementation and analysis of two mostpo...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015