An Efficient approach of True Random Number Generation using A Data encryption method in Security & cryptography algorithm
True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy protocols of the data protection centre often use the real random numbers produced by the true random number generators. TRNGs were already bei...
Saved in:
| Published in: | 2023 International Conference on IoT, Communication and Automation Technology (ICICAT) pp. 1 - 8 |
|---|---|
| Main Authors: | , |
| Format: | Conference Proceeding |
| Language: | English |
| Published: |
IEEE
23.06.2023
|
| Subjects: | |
| Online Access: | Get full text |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| Abstract | True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy protocols of the data protection centre often use the real random numbers produced by the true random number generators. TRNGs were already being used to save energy in the recent times developed stochastic computing paradigm. This methodology utilizes the extended symmetric key cryptography technique, which utilizes the very same framework for both the encryption and decryption processes. The encryption and decryption keys used in traditional cryptography techniques are identical and are kept private. The technique employs a randomized numbers generator to generate keys, which increases technique performance. The algorithm uses 512-bit keys for increased security and offers the idea of intrinsic key creation at the receiving end using the 512-bit key provided by the transmitter. To avoid conventional warfare assaults as well as any damaging cyber threats, this private key will be stored in the transmitter side databases and sent to the side of the receiver in a different way. This approach performs encryption and decryption more effectively for huge information than previous techniques do. With huge documents with reduced latency, this technique offers a higher pace compared to previous methods. |
|---|---|
| AbstractList | True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy protocols of the data protection centre often use the real random numbers produced by the true random number generators. TRNGs were already being used to save energy in the recent times developed stochastic computing paradigm. This methodology utilizes the extended symmetric key cryptography technique, which utilizes the very same framework for both the encryption and decryption processes. The encryption and decryption keys used in traditional cryptography techniques are identical and are kept private. The technique employs a randomized numbers generator to generate keys, which increases technique performance. The algorithm uses 512-bit keys for increased security and offers the idea of intrinsic key creation at the receiving end using the 512-bit key provided by the transmitter. To avoid conventional warfare assaults as well as any damaging cyber threats, this private key will be stored in the transmitter side databases and sent to the side of the receiver in a different way. This approach performs encryption and decryption more effectively for huge information than previous techniques do. With huge documents with reduced latency, this technique offers a higher pace compared to previous methods. |
| Author | Agnihotri, Prateek Agarwal Mittal, Preeti |
| Author_xml | – sequence: 1 givenname: Prateek surname: Agnihotri fullname: Agnihotri, Prateek email: 200205004@hbtu.ac.in organization: HBTU,Electronics Engineering Department,Kanpur,India – sequence: 2 givenname: Preeti surname: Agarwal Mittal fullname: Agarwal Mittal, Preeti organization: HBTU,Electronics Engineering Department,Kanpur,India |
| BookMark | eNo1kE1LAzEURSPoQmv_gYvnxl1rPjqZZFlqrYWioHVdXjMvnUAnGdKZxfjrlaqrC-fC4XJv2GVMkRi7F3wqBLeP68V6Md8WZamKqeRSTQWXWmkzu2BjW1qjCq64NJJfs695hKX3wQWKHWDb5oSuhuRhm3uCd4xVauC1b_aUYUWRMnYhRehPIR5gDk_YIVB0eWjPvKGuThWECB_k-hy6AR7g3KZDxrYeAI-H9MPr5pZdeTyeaPyXI_b5vNwuXiabt9XP_s0kCGG7SaUNVo60lwXXpZw5S8YQeS89apS6MtbPDMlCey-UQLt3Uu5ROc5FpSuvRuzu1xuIaNfm0GAedv-XqG-0XV6d |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICICAT57735.2023.10263684 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 9798350302820 |
| EndPage | 8 |
| ExternalDocumentID | 10263684 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IL CBEJK RIE RIL |
| ID | FETCH-LOGICAL-i119t-d68adce6f2506724c9e88eeff2fa6a26d89f48e256ff131a9bc22ba3c001d6df3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Oct 11 05:35:27 EDT 2023 |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i119t-d68adce6f2506724c9e88eeff2fa6a26d89f48e256ff131a9bc22ba3c001d6df3 |
| PageCount | 8 |
| ParticipantIDs | ieee_primary_10263684 |
| PublicationCentury | 2000 |
| PublicationDate | 2023-June-23 |
| PublicationDateYYYYMMDD | 2023-06-23 |
| PublicationDate_xml | – month: 06 year: 2023 text: 2023-June-23 day: 23 |
| PublicationDecade | 2020 |
| PublicationTitle | 2023 International Conference on IoT, Communication and Automation Technology (ICICAT) |
| PublicationTitleAbbrev | ICICAT |
| PublicationYear | 2023 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| Score | 1.8356901 |
| Snippet | True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 1 |
| SubjectTerms | Cryptography Data Security Encryption Generators NIST Privacy Protocols Receivers Switches Symmetric key algorithm Transmitters True random number generation |
| Title | An Efficient approach of True Random Number Generation using A Data encryption method in Security & cryptography algorithm |
| URI | https://ieeexplore.ieee.org/document/10263684 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1dS8MwFA06RHxSceI3VxDfOtdmzcfjmBsKMoZO2du4y8ccuFZmJ-ivN0k7xQcffCtpk8AJyU3Se84h5EKj4SjdRDIuXPoDiohQqDSKqVEpIiodWPxPd7zfF6ORHFRk9cCFMcaE5DPT8I_hX77O1dJflbkZnjDKRGudrHPOSrLWJjmvdDOvbjuefJtyTtOGdwVvrL7_5ZwSAkdv-59d7pD6DwUPBt_BZZesmWyPfLYz6AbNB1cJVnLgkFsYLpYG7jHT-Rz6weQDSkFpjzv45PYptOEaCwTX9OIjLBRQ2kfDLIOHysYOLiG8rYSsAV-muSt_ntfJY6877NxElXlCNItjWUSaCdTKMOv2OIwnLSWNEMZYm1hkmDAtpG0J43Y81sY0RjlRSTJBqlzc0kxbuk9qWZ6ZAwJNZWWaYpNiylpcxhMrmNCe4mqEcgAdkroHbvxa6mOMV5gd_VF-TLb88PiEq4SekFrhIDolG-q9mL0tzsKofgGGfacL |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3LSgMxFA1aRV2pWPHtFcTd1M4rk1mW2tJiHYpW6a7c5lELdkbqVNCvN8lMFRcu3IWETOCEzM3jnnMIuRQoI4z1QpI6XJoDCnOQ8dBxfclDROTCsvifelGSsOEw7pdkdcuFkVLa5DNZM0X7li8yvjBXZXqFe9SnLFgla2EQePWCrrVBLkrlzOtu09Bvwyjyw5rxBa8te_zyTrGho739z0F3SPWHhAf97_CyS1Zkukc-Gym0rOqD7gRLQXDIFAzmCwn3mIpsBom1-YBCUtogDya9fQINuMEcQX96_mF_FVAYSMM0hYfSyA6uwLaWUtaAL5NM1z_PquSx3Ro0O05pn-BMXTfOHUEZCi6p0rscGnkBjyVjUirlKaToUcFiFTCp9zxKub6L8Zh73hh9riOXoEL5-6SSZqk8IFDnKg5DrPsY0iCK3bFilAlDcpWMa4AOSdUAN3otFDJGS8yO_qg_J5udwV1v1Osmt8dky0yVSb_y_BNSyTVcp2Sdv-fTt_mZneEvYV6qUg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+International+Conference+on+IoT%2C+Communication+and+Automation+Technology+%28ICICAT%29&rft.atitle=An+Efficient+approach+of+True+Random+Number+Generation+using+A+Data+encryption+method+in+Security+%26+cryptography+algorithm&rft.au=Agnihotri%2C+Prateek&rft.au=Agarwal+Mittal%2C+Preeti&rft.date=2023-06-23&rft.pub=IEEE&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FICICAT57735.2023.10263684&rft.externalDocID=10263684 |