2021
DOI: 10.11591/ijece.v11i1.pp589-595
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive key generation algorithm based on software engineering methodology

Abstract: Recently, the generation of security keys has been considered for guaranteeing the strongest of them in terms of randomness. In addition, the software engineering methodologies are adopted to ensure the mentioned goal is reached. In this paper, an adaptive key generation algorithm is proposed based on software engineering techniques. The adopted software engineering technique is self-checking process, used for detecting the fault in the underlying systems. This technique checks the generated security keys in t… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

1
3

Authors

Journals

citations
Cited by 4 publications
(5 citation statements)
references
References 12 publications
0
5
0
Order By: Relevance
“…The model presented in this paper includes six elements of goal, input, activities, output, outcomes, and performance. In [ 14 ], software engineering methodologies have been used to propose an adaptive approach for presenting a robust cipher key generation algorithm. The technique used in this method is based on self-checking procedures that can detect the system-level errors.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The model presented in this paper includes six elements of goal, input, activities, output, outcomes, and performance. In [ 14 ], software engineering methodologies have been used to propose an adaptive approach for presenting a robust cipher key generation algorithm. The technique used in this method is based on self-checking procedures that can detect the system-level errors.…”
Section: Literature Reviewmentioning
confidence: 99%
“… Enter the resulted code through NIST frequency and serial tests.  If the resulted key pass in randomness tests, use it as the new session key [25].  Store the new generated session key in database to be used for next session.…”
Section: Session-key Generation Algorithmmentioning
confidence: 99%
“…Otherwise, it is failed and not ready for use. In this case, another key is generated and the whole test process is repeated [25]. Figure 7 shows the results of testing two keys.…”
Section: Nist Testsmentioning
confidence: 99%
“…Software engineering methods enhance reliability across numerous applications [1]. Software development companies constantly strive to attract customers in a competitive environment, aiming to enhance the quality of their products through rigorous testing [2], [3].…”
Section: Introductionmentioning
confidence: 99%