Cryptographically Secure Linear Feedback Shift Register

Download Now
Provided by: International Journal of Advanced Research in Computer Engineering & Technology
Topic: Security
Format: PDF
True random bit generator requires a naturally occurring source of randomness. Designing a hardware device or software program to exploit this randomness and produce a bit sequence that is free of biases and correlation is difficult task. For most cryptographic applications, the generator must not be subject to observation or manipulation by an adversary. So, Pseudo-Random Number Generator (PRNG) is used to create a sequence of bits that appear to random but not exactly random. As the word 'Pseudo' suggest, these are not random some algorithms that use mathematical formulae or simply pre-calculated tables are used to produce sequence of number that appear random.
Download Now

Find By Topic