Design of a New Cryptography Algorithm using Reseeding-Mixing Pseudo Random Number Generator
S. Dilli Babu1, Madhu Kumar Patnala2
1S.Dilli Babu, Department of Electronics and Communication Engineering, Sree Vidyaniketan Engineering College, Tirupati (Andhra Pradesh), India.
2Madhu Kumar Patnala, Department of Electronics and Communication Engineering, Sree Vidyaniketan Engineering College, Tirupati (Andhra Pradesh), India.
Manuscript received on 15 April 2013 | Revised Manuscript received on 22 April 2013 | Manuscript Published on 30 April 2013 | PP: 284-286 | Volume-2 Issue-5, April 2013 | Retrieval Number: E0631032413/13©BEIESP
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: In this paper, we propose the application of cryptography algorithm to ensure secure communication across the virtual networks. In cryptography, encryption is the process of encoding messages or information in such a way that hackers cannot read it. In an encryption scheme the message or information is encrypted using an encryption algorithm, turning it into an unreadable cipher text. This is usually done with the use of an encryption key. Any adversary that can see the cipher text should not know anything about the original message. To decode the cipher text using an algorithm that usually requires, a secret decryption key. An encryption scheme usually needs a key generating algorithm to randomly produce keys. Pseudo Random Number Generator (PRNG) is an algorithm for generating a sequence of numbers. Due to speed in number generation pseudorandom numbers are very important. The output sequence of RM-PRNG is used as a key to the encryption and decryption modules. The simulation results are obtained by using modelsim 6.3g_p1.
Keywords: PRNG, Encryption, Reseeding, Decryption, Mixing, RM-PRNG.
Scope of the Article: Parallel and Distributed Algorithms