An Efficient approach of True Random Number Generation using A Data encryption method in Security & cryptography algorithm

True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy protocols of the data protection centre often use the real random numbers produced by the true random number generators. TRNGs were already bei...

Celý popis

Uloženo v:
Podrobná bibliografie
Vydáno v:2023 International Conference on IoT, Communication and Automation Technology (ICICAT) s. 1 - 8
Hlavní autoři: Agnihotri, Prateek, Agarwal Mittal, Preeti
Médium: Konferenční příspěvek
Jazyk:angličtina
Vydáno: IEEE 23.06.2023
Témata:
On-line přístup:Získat plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo vytvoří štítek k tomuto záznamu!
Abstract True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy protocols of the data protection centre often use the real random numbers produced by the true random number generators. TRNGs were already being used to save energy in the recent times developed stochastic computing paradigm. This methodology utilizes the extended symmetric key cryptography technique, which utilizes the very same framework for both the encryption and decryption processes. The encryption and decryption keys used in traditional cryptography techniques are identical and are kept private. The technique employs a randomized numbers generator to generate keys, which increases technique performance. The algorithm uses 512-bit keys for increased security and offers the idea of intrinsic key creation at the receiving end using the 512-bit key provided by the transmitter. To avoid conventional warfare assaults as well as any damaging cyber threats, this private key will be stored in the transmitter side databases and sent to the side of the receiver in a different way. This approach performs encryption and decryption more effectively for huge information than previous techniques do. With huge documents with reduced latency, this technique offers a higher pace compared to previous methods.
AbstractList True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy protocols of the data protection centre often use the real random numbers produced by the true random number generators. TRNGs were already being used to save energy in the recent times developed stochastic computing paradigm. This methodology utilizes the extended symmetric key cryptography technique, which utilizes the very same framework for both the encryption and decryption processes. The encryption and decryption keys used in traditional cryptography techniques are identical and are kept private. The technique employs a randomized numbers generator to generate keys, which increases technique performance. The algorithm uses 512-bit keys for increased security and offers the idea of intrinsic key creation at the receiving end using the 512-bit key provided by the transmitter. To avoid conventional warfare assaults as well as any damaging cyber threats, this private key will be stored in the transmitter side databases and sent to the side of the receiver in a different way. This approach performs encryption and decryption more effectively for huge information than previous techniques do. With huge documents with reduced latency, this technique offers a higher pace compared to previous methods.
Author Agnihotri, Prateek
Agarwal Mittal, Preeti
Author_xml – sequence: 1
  givenname: Prateek
  surname: Agnihotri
  fullname: Agnihotri, Prateek
  email: 200205004@hbtu.ac.in
  organization: HBTU,Electronics Engineering Department,Kanpur,India
– sequence: 2
  givenname: Preeti
  surname: Agarwal Mittal
  fullname: Agarwal Mittal, Preeti
  organization: HBTU,Electronics Engineering Department,Kanpur,India
BookMark eNo1kE1LAzEURSPoQmv_gYvnxl1rPjqZZFlqrYWioHVdXjMvnUAnGdKZxfjrlaqrC-fC4XJv2GVMkRi7F3wqBLeP68V6Md8WZamKqeRSTQWXWmkzu2BjW1qjCq64NJJfs695hKX3wQWKHWDb5oSuhuRhm3uCd4xVauC1b_aUYUWRMnYhRehPIR5gDk_YIVB0eWjPvKGuThWECB_k-hy6AR7g3KZDxrYeAI-H9MPr5pZdeTyeaPyXI_b5vNwuXiabt9XP_s0kCGG7SaUNVo60lwXXpZw5S8YQeS89apS6MtbPDMlCey-UQLt3Uu5ROc5FpSuvRuzu1xuIaNfm0GAedv-XqG-0XV6d
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICICAT57735.2023.10263684
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9798350302820
EndPage 8
ExternalDocumentID 10263684
Genre orig-research
GroupedDBID 6IE
6IL
CBEJK
RIE
RIL
ID FETCH-LOGICAL-i119t-d68adce6f2506724c9e88eeff2fa6a26d89f48e256ff131a9bc22ba3c001d6df3
IEDL.DBID RIE
IngestDate Wed Oct 11 05:35:27 EDT 2023
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i119t-d68adce6f2506724c9e88eeff2fa6a26d89f48e256ff131a9bc22ba3c001d6df3
PageCount 8
ParticipantIDs ieee_primary_10263684
PublicationCentury 2000
PublicationDate 2023-June-23
PublicationDateYYYYMMDD 2023-06-23
PublicationDate_xml – month: 06
  year: 2023
  text: 2023-June-23
  day: 23
PublicationDecade 2020
PublicationTitle 2023 International Conference on IoT, Communication and Automation Technology (ICICAT)
PublicationTitleAbbrev ICICAT
PublicationYear 2023
Publisher IEEE
Publisher_xml – name: IEEE
Score 1.8356901
Snippet True random number generators (TRNGs) have drawn a lot of focus due to their numerous uses in data encryption and transfer. The encryption method or privacy...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Cryptography
Data Security
Encryption
Generators
NIST
Privacy
Protocols
Receivers
Switches
Symmetric key algorithm
Transmitters
True random number generation
Title An Efficient approach of True Random Number Generation using A Data encryption method in Security & cryptography algorithm
URI https://ieeexplore.ieee.org/document/10263684
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LS8NAEF5sEfGkYsU3I4i31Ca72cex1BYFKUUr9FY2-6gFm0hNBf317m5SxYMHySVsshmYSXaGzXzfh9BlSiR1B4mMFjIinGaRsEpGWWyYdfWre00CZf49Gw75ZCJGNVg9YGGMMaH5zLT9afiXrwu18ltl7gtPKKacNFCDMVqBtbbQRc2beX3X8-DblDGctr0qeHt9_y_llJA4Bjv_NLmLWj8QPBh9J5c9tGHyffTZzaEfOB_cJFjTgUNhYbxcGXiQuS4WMAwiH1ARSnu_g29un0EXbmQpwT16-REWCqjko2Gew2MtYwdXEK7WRNYgX2aFG39etNDToD_u3Ua1eEI0j2NRRppyqZWh1tU4lCVECcO5MdYm1sUmoZoLS7hxFY-1MY6lyFSSZBIrl7c01RYfoGZe5OYQQdrBGSfEdkhmCFaxcFU5I9TEKXdWUnKEWt5x09eKH2O69tnxH-MnaNuHxzdcJfgUNUvnojO0qd7L-dvyPET1CyR9po0
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV3PS8MwFA46RT2pOPG3TxBvnWuTpslxzMmGswydsNtI02QOXCuzE_SvN0k7xYMHyaUkJIH32r5H8r7vQ-gyJIKaRjyVcuERRhOPaym8xFeRNvmreU0cZX4_imM2GvFBBVZ3WBillCs-Uw376O7y01wu7FGZ-cIDiikjq2gtNKs0S7jWBrqomDOve20Lvw2jCIcNqwveWM74pZ3iQsft9j833UH1HxAeDL7Dyy5aUdke-mxl0HGsD2YSLAnBIdcwnC8UPIgszWcQO5kPKCmlreXBlrdPoAU3ohBglp5_uF8FlALSMM3gsRKygytwoxWVNYiXSW76n2d19HTbGba7XiWf4E19nxdeSplIpaLaZDk0CojkijGltA608U5AU8Y1YcrkPFr72Bc8kUGQCCxN5EppqvE-qmV5pg4QhE2cMEJ0kySKYOlzk5dHhCo_ZGaXkByiujXc-LVkyBgvbXb0R_852uwO7_vjfi--O0Zb1lW2_CrAJ6hWGHOdonX5Xkzf5mfOw1_5KanU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2023+International+Conference+on+IoT%2C+Communication+and+Automation+Technology+%28ICICAT%29&rft.atitle=An+Efficient+approach+of+True+Random+Number+Generation+using+A+Data+encryption+method+in+Security+%26+cryptography+algorithm&rft.au=Agnihotri%2C+Prateek&rft.au=Agarwal+Mittal%2C+Preeti&rft.date=2023-06-23&rft.pub=IEEE&rft.spage=1&rft.epage=8&rft_id=info:doi/10.1109%2FICICAT57735.2023.10263684&rft.externalDocID=10263684