Please use this identifier to cite or link to this item: http://idr.nitk.ac.in/jspui/handle/123456789/14829
Full metadata record
DC FieldValueLanguage
dc.contributor.authorCharan K.S.
dc.contributor.authorNakkina H.V.
dc.contributor.authorChandavarkar B.R.
dc.date.accessioned2021-05-05T10:15:50Z-
dc.date.available2021-05-05T10:15:50Z-
dc.date.issued2020
dc.identifier.citation2020 11th International Conference on Computing, Communication and Networking Technologies, ICCCNT 2020 , Vol. , , p. -en_US
dc.identifier.urihttps://doi.org/10.1109/ICCCNT49239.2020.9225280
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/14829-
dc.description.abstractIn a highly secure and robust key generation process, a key role is played by randomness and random numbers when current real-world cryptosystems are observed. Most present-day cryptographic protocols depend upon the Random Number Generators (RNG), Pseudo-Random Number Generator (PRNG). These protocols often use noisy channels such as Disk seek time, CPU temperature, Mouse pointer movement, Fan noise to obtain actual random values. Despite being cost-effective, these noisy channels may need additional hardware devices to communicate with them continuously. On the other hand, Hash functions are Pseudo-Random (because of their requirements) in nature. So, they are a suitable replacement for these noisy channels and have low hardware requirements. This paper discusses some of the key generation methodologies and their drawbacks. Further, it explains how hash functions can be used in key generation, how to combine Key Derivation Function (KDF)s with hash functions. © 2020 IEEE.en_US
dc.titleGeneration of Symmetric Key Using Randomness of Hash Functionen_US
dc.typeConference Paperen_US
Appears in Collections:2. Conference Papers

Files in This Item:
There are no files associated with this item.


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.