Key Generation using Pseudorandom Number Generator

K Sahu, LK Awasthi, A Kumar - 2023 14th International …, 2023 - ieeexplore.ieee.org
K Sahu, LK Awasthi, A Kumar
2023 14th International Conference on Computing Communication and …, 2023ieeexplore.ieee.org
Cryptography is crucial for securing data, and the rise of online transaction processing has
raised the necessity for security. Cryptography uses various encryption methods to protect
sensitive data from threats, which calls for cryptographic keys. Any encryption or decryption
method is often built on cryptographic keys. The cryptographic key gives strength to the
encryption algorithm. It increases its security, so the generation of keys are essential to data
encryption. The significance of any algorithm lies in the fact that the keys are not duplicated …
Cryptography is crucial for securing data, and the rise of online transaction processing has raised the necessity for security. Cryptography uses various encryption methods to protect sensitive data from threats, which calls for cryptographic keys. Any encryption or decryption method is often built on cryptographic keys. The cryptographic key gives strength to the encryption algorithm. It increases its security, so the generation of keys are essential to data encryption. The significance of any algorithm lies in the fact that the keys are not duplicated so that it is not possible to break. The key is truly random, then perfect secrecy can be obtained. In the paper, we are generating the key using a pseudorandom number generator so that it is complex for any attacker to break the cryptographic key.
ieeexplore.ieee.org
Showing the best result for this search. See all results