期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Pseudo Random Number Generator Based on Back Propagation Neural Network 被引量:3
1
作者 WANG Bang-ju WANG Yu-hua +1 位作者 NIU Li-ping ZHANG Huan-guo 《Semiconductor Photonics and Technology》 CAS 2007年第2期164-168,共5页
Random numbers play an increasingly important role in secure wire and wireless communication. Thus the design quality of random number generator(RNG) is significant in information security. A novel pseudo RNG is propo... Random numbers play an increasingly important role in secure wire and wireless communication. Thus the design quality of random number generator(RNG) is significant in information security. A novel pseudo RNG is proposed for improving the security of network communication. The back propagation neural network(BPNN) is nonlinear, which can be used to improve the traditional RNG. The novel pseudo RNG is based on BPNN techniques. The result of test suites standardized by the U.S shows that the RNG can satisfy the security of communication. 展开更多
关键词 pseudo random number generator(PRNN) random number generator(RNG) back propagation neural network(BPNN)
下载PDF
A Perturbing Scheme of Digital Chaos
2
作者 刘镔 罗向阳 刘粉林 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期172-176,共5页
With finite computation precision, digital chaos will lose chaotic characteristic. An efficient perturbance-based algorithm perturbing chaos variable algorithm(PCV) was proposed, which can be regarded as a remedy to d... With finite computation precision, digital chaos will lose chaotic characteristic. An efficient perturbance-based algorithm perturbing chaos variable algorithm(PCV) was proposed, which can be regarded as a remedy to digital chaos. After being perturbed, digital chaos systems are able to generate pseudo random sequences with perfect statistical properties and can be used as key stream generators in cryptogram. 展开更多
关键词 CRYPTOGRAPHY CHAOS piecewise linear chaotic map pseudo random number generator
下载PDF
Low Area PRESENT Cryptography in FPGA Using TRNG-PRNG Key Generation
3
作者 T.Kowsalya R.Ganesh Babu +2 位作者 B.D.Parameshachari Anand Nayyar Raja Majid Mehmood 《Computers, Materials & Continua》 SCIE EI 2021年第8期1447-1465,共19页
Lightweight Cryptography(LWC)is widely used to provide integrity,secrecy and authentication for the sensitive applications.However,the LWC is vulnerable to various constraints such as high-power consumption,time consu... Lightweight Cryptography(LWC)is widely used to provide integrity,secrecy and authentication for the sensitive applications.However,the LWC is vulnerable to various constraints such as high-power consumption,time consumption,and hardware utilization and susceptible to the malicious attackers.In order to overcome this,a lightweight block cipher namely PRESENT architecture is proposed to provide the security against malicious attacks.The True Random Number Generator-Pseudo Random Number Generator(TRNG-PRNG)based key generation is proposed to generate the unpredictable keys,being highly difficult to predict by the hackers.Moreover,the hardware utilization of PRESENT architecture is optimized using the Dual port Read Only Memory(DROM).The proposed PRESENT-TRNGPRNG architecture supports the 64-bit input with 80-bit of key value.The performance of the PRESENT-TRNG-PRNG architecture is evaluated by means of number of slice registers,flip flops,number of slices Look Up Table(LUT),number of logical elements,slices,bonded input/output block(IOB),frequency,power and delay.The input retrieval performances analyzed in this PRESENT-TRNG-PRNG architecture are Peak Signal to Noise Ratio(PSNR),Structural Similarity Index(SSIM)and Mean-Square Error(MSE).The PRESENT-TRNG-PRNG architecture is compared with three different existing PRESENT architectures such as PRESENT On-TheFly(PERSENT-OTF),PRESENT Self-Test Structure(PRESENT-STS)and PRESENT-Round Keys(PRESENT-RK).The operating frequency of the PRESENT-TRNG-PRNG is 612.208 MHz for Virtex 5,which is high as compared to the PRESENT-RK. 展开更多
关键词 Dual port read only memory hardware utilization lightweight cryptography malicious attackers present block cipher pseudo random number generator true random number generator
下载PDF
A New Approach for the DFT NIST Test Applicable for Non-Stationary Input Sequences
4
作者 Yehonatan Avraham Monika Pinchas 《Journal of Signal and Information Processing》 2021年第1期1-41,共41页
The National Institute of Standards and Technology (NIST) document is a list of fifteen tests for estimating the probability of signal randomness degree. <span style="font-family:Verdana;">Test number ... The National Institute of Standards and Technology (NIST) document is a list of fifteen tests for estimating the probability of signal randomness degree. <span style="font-family:Verdana;">Test number six in the NIST document is the Discrete Fourier Transform</span><span style="font-family:Verdana;"> (DFT) test suitable for stationary incoming sequences. But, for cases where the input sequence is not stationary, the DFT test provides inaccurate results. For these cases, test number seven and eight (the Non-overlapping Template Matching Test and the Overlapping Template Matching Test) of the NIST document were designed to classify those non-stationary sequences. But, even with test number seven and eight of the NIST document, the results are not always accurate. Thus, the NIST test does not give a proper answer for the non-stationary input sequence case. In this paper, we offer a new algorithm </span><span style="font-family:Verdana;">or test, which may replace the NIST tests number six, seven and eight. The</span> <span style="font-family:Verdana;">proposed test is applicable also for non-stationary sequences and supplies</span><span style="font-family:Verdana;"> more </span><span style="font-family:Verdana;">accurate results than the existing tests (NIST tests number six, seven and</span><span style="font-family:Verdana;"> eight), for non-stationary sequences. The new proposed test is based on the Wigner function and on the Generalized Gaussian Distribution (GGD). In addition, </span><span style="font-family:Verdana;">this new proposed algorithm alarms and indicates on suspicious places of</span><span style="font-family:Verdana;"> cyclic </span><span style="font-family:Verdana;">sections in the tested sequence. Thus, it gives us the option to repair or to</span><span style="font-family:Verdana;"> remove the suspicious places of cyclic sections</span><span><span><span><span></span><span></span><b><span style="font-family:;" "=""><span></span><span></span> </span></b></span></span></span><span><span><span><span></span><span></span><span style="font-family:;" "=""><span></span><span></span><span style="font-family:Verdana;">(this part is beyond the scope </span><span style="font-family:Verdana;">of this paper), so that after that, the repaired or the shortened sequence</span><span style="font-family:Verdana;"> (origi</span><span style="font-family:Verdana;">nal sequence with removed sections) will result as a sequence with high</span><span style="font-family:Verdana;"> probability of random degree.</span></span></span></span></span> 展开更多
关键词 Wigner Distribution Shape Parameter Generalized Gaussian Distribution random Number generator True random Number generator pseudo random Number generator
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部