0% found this document useful (0 votes)
49 views20 pages

Fast Generation of Pseudo-Random Cryptographic Keys Implementing On IDEA Algorithm

This document describes a project to generate pseudo-random cryptographic keys using the IDEA algorithm. It provides an introduction to cryptography and the need for random keys. It then describes how the project generates an initial key string from system information and uses a random number generator and user input to modify the string. It includes block diagrams of the IDEA algorithm and its core components. The document also discusses the software tool used, advantages and disadvantages of the approach, applications, and potential future work.

Uploaded by

vijayhall
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
49 views20 pages

Fast Generation of Pseudo-Random Cryptographic Keys Implementing On IDEA Algorithm

This document describes a project to generate pseudo-random cryptographic keys using the IDEA algorithm. It provides an introduction to cryptography and the need for random keys. It then describes how the project generates an initial key string from system information and uses a random number generator and user input to modify the string. It includes block diagrams of the IDEA algorithm and its core components. The document also discusses the software tool used, advantages and disadvantages of the approach, applications, and potential future work.

Uploaded by

vijayhall
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 20

K.L.E.

SOCIETY’S
K.L.E. COLLEGE OF ENGINEERING AND TECHNOLOGY,
CHIKODI-591 201
DEPT. OF ELECTRONICS AND COMMUNICATION & ENGINEERING

Project Demo On

Fast Generation of Pseudo-Random


Cryptographic Keys implementing on IDEA
Algorithm
By
Soumya Tippannavar(2KD10EC050) Ashwini
Telsang(2KD10EC008)
Shruti Hulagabali(2KD10EC043) Kishori Patil(2KD10EC020)

Under The Guidence


Prof. Jyothi.C.K
1
contents
Literature survey.
Introduction.
Pseudo random key generator.
IDEA algorithm with Block diagram.
Software tool Required
Advantages and Disadvantages.
Applications.
Scope of future work.
References.

2
3
Introduction
Cryptography provides security to data and communication.

A new method for the fast generation of pseudo random


cryptographic keys with high degree of randomness and high
resistance to replication.

Initial key string is produced using all the components of seed


considered like system time, processes information, cursor position,
CPU register information etc.

All cryptographic algorithms need generation of secret, un-


guessable random numbers.

4
Pseudo random number
cryptographic key generator
How to generate the pseudo random cryptographic key?

Lot of work and research is done in the area of Random


Number Generators, Random Key Generators, Pseudo-
Random Keys and Numbers, Bio-metric Key generators,
Hybrid RNG etc.

5
Specification of algorithm

Generating randomness along with specified character
generation of random cryptographic key.


Computer clocks, or similar operating system or hardware
values etc.


we are considering time string obtained from system time
just to demonstrate how rotating string and a random
number generator together can be clubbed to obtain a
pseudo random cryptographic keys.

6
continued
Following are considered for the algorithm to be
presented in this paper
i. Seed.
ii. Random Number Generator.
iii. Initial key String.
iv. User Preference string .

7
Initial key string
E.g. of Initial key string: Mon Feb 09 02:25:53 2009

8
IDEA Algorithm
It operates on 64-bit plaintext and ciphertext blocks with a
128-bit key.

IDEA is somewhat different from the rest of the symmetric


key encryption algorithms in that it uses algebraic
operations completely and does without table lookup
methods.

9
continued
The project is sub-divided into 5 parts, which are the

1.IDEA core
2.The key schedulers for encryption.
3.Decryption
4. The modular multiplier
5.The modular inverter.

10
IDEA core block diagram

11
Idea core

12
Software Tool
 MATLAB 7.0

13
Advantages and Disadvantages
Advantages:
Simple
Encrypt and decrypt your own files
Fast
Uses less computer resources
Prevents widespread message security compromise

14
Disadvantages:

Need for secure channel for secret key exchange.

Too many keys.

15
Applications
Online Web based File Sharing

Email Passwords

 Folder Locks

16
Scope for future work
Future work could be done on idea concerning with
pseudo random cryptographic key generation over a
proactive symmetric key systems.
Research in this area could be performed to assess the
idea’s practicality.
Surrounding a third party relationship. Positive results in
this analysis could lead to a possible implementation of
their research in the future.

17
References
 “Robust techniques for evaluating biometric cryptographic
key generators” ISBN
 “Designing cryptographic key generators with low power
consumption” ISBN Author: M PUCZKO and V. N. YAR[1]
MediaCrypt: IDEA Technical Description
<http://web.engr.oregonstate.edu/~laige/ece575/IDEA
%20Technical%20Description_0503.pdf>
 Irwin Yoon's ECE575 Project - IDEA
Algorithm<http://islab.oregonstate.edu

18
19
QUERIES
…????

20

You might also like