International Journal of Computer Applications
With increase in the use of internet there has been an increased opportunity in identity fraud, organized crime and various other forms of cyber-crime. For high security transmission over a network, high randomness is required in the seed used for generating a key. This paper deals with two phenomena: biometric method, hardware and Software method that possess randomness. Comparison tables have been tabulated with respect to each of the methods. Comparing each source a conclusion is derived at a set of sources that can contribute to the entropy pool.