2019
DOI: 10.11591/ijeecs.v14.i1.pp201-209
|View full text |Cite
|
Sign up to set email alerts
|

Memristor based ring oscillators true random number generator with different window functions for applications in cryptography

Abstract: <span>Cryptographic applications require numbers that are random and pseudorandom. Keys must be produced in a random manner in order to be used in common cryptosystems. Random or pseudorandom inputs at different terminals are also required in a lot of cryptographic protocols. For example, producing digital signatures using supporting quantities or in verification procedures that requires generating challenges. Random number generation is an important part of cryptography because there are flaws in random… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
10
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(10 citation statements)
references
References 9 publications
(16 reference statements)
0
10
0
Order By: Relevance
“…Random numbers have a variety of uses in modern computing and information security, ranging from simple decision making in a video game, to encryption of secure documents and keeping banking transactions secure [ 1 , 2 , 3 , 4 , 5 , 6 ]. The security of data and communication channels is especially important today with the increase in connected devices throughout the world.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…Random numbers have a variety of uses in modern computing and information security, ranging from simple decision making in a video game, to encryption of secure documents and keeping banking transactions secure [ 1 , 2 , 3 , 4 , 5 , 6 ]. The security of data and communication channels is especially important today with the increase in connected devices throughout the world.…”
Section: Introductionmentioning
confidence: 99%
“…TRNGs can be implemented in many ways. Examples of TRNGs include measuring the time between clicks on a Geiger counter [ 10 ], measuring frequencies or latencies of asynchronous events on a PC [ 11 , 12 ] and circuits comprised of oscillators where entropy is captured as jitter [ 3 , 4 , 5 , 7 , 13 , 14 , 15 , 16 ]. Even modern CPUs can have dedicated hardware on the application specific integrated circuit (ASIC) to capture entropy [ 17 ].…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…It is one among various symmetric-key block ciphers used to provide security efficiently and with flexibility. There are some types such as Blowfish, Twofish, RC6, Rijndael, Mars, Serpent and DES, which have been received with the greatest practical interest [1][2][3][4].…”
Section: Introductionmentioning
confidence: 99%