SlideShare une entreprise Scribd logo
1  sur  7
Télécharger pour lire hors ligne
Mr. Rohith. S et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252

RESEARCH ARTICLE

www.ijera.com

OPEN ACCESS

FPGA Implementation of Park-Miller Algorithm to Generate
Sequence of 32-Bit Pseudo Random Key for Encryption and
Decryption of Text Message
Mr. Rohith. S*, Mr. Bharatesh. N**
Department of Electronics and Communication Engineering Nagarjuna College of Engineering and Technology,
Bangalore, Karnataka, India-562110

ABSTRACT
In today’s world, all the e-commerce transaction happens over the internet. The data that is transferred over
the internet needs to be secured before the transmission process happens. The proposed scheme is a FPGA
implementation of Park-Miller algorithm for generating sequence of Pseudo-Random keys. The generated
pseudo random sequences are comparatively less complex in computation, power efficient and flexible so that
it makes the digital circuit faster and smaller. The operation of Park-Miller algorithm to generate pseudo
random number uses 32-bit Booth multiplier for multiplication, 32-bit floating point divider for division and a
finite state machine for the flow of Park-Miller algorithm operation. After generating a sequence of 32-bit
pseudo-random numbers, it is used as a key to encrypt the text message which is known as cipher text. Using
the same key to decrypt the encrypted data to get back original text message. The programming is done in
Verilog-HDL and MATLAB to verify the result. The design is simulated in Modelsim (version 10.5). The
proposed module is successfully synthesized using Cadence RTL compiler. Area and power of the design is
computed for 180nm technology. Finally design is implemented on Spartan 6E FPGA.
Keywords – Cryptography security, Encryption, Decryption, Park-Miller Algorithm, Pseudo random bit
generator

I.

INTRODUCTION

Encryption is used to securely transmit the
data in a open networks. The transmitted data may be
text, image, audio, video form. Each type of data has
its own features. Therefore different techniques
should be used to protect confidential data from
unauthorized access. The Pseudo-Random numbers
are plays very important role in the communication
system for protection of information from
unauthorized access. The efficiency of the Pseudo
Random Number Generator (PRNG) based
cryptosystem is mainly based on the random key
generated by its PRNG [1-5].
Depending on the application, three types of
number sequences might prove as the “random
numbers”. A numbers generated by a truly random
process is most desirable. This type of sequence is
called a random-number sequence and the key
problem is deciding whether or not the generating
process is random. A more practical sequence is the
pseudo-random sequence, a series of numbers
generated by a deterministic process that is intended
merely to imitate a random sequence but which, of
course, does not correctly obey such things as the

www.ijera.com

laws of large numbers. A quasi-random sequence is a
series of numbers that makes no guaranty at being
random but that has important predefine statistical
properties of random sequences.
PRNGs
are efficient
periodic
and
deterministic. Efficient meaning that in a short time,
they can produce many numbers. Deterministic,
means that if the starting point in the sequence is
known a given sequence of numbers can be regenerate
at a later time [1]. Periodic, means that the sequence
will sequentially repeated after specified period.
While periodicity is hardly ever a desirable
characteristic, modern PRNGs have a period that is so
long that it can be ignored for most practical
purposes.
Pseudorandom sequences [1] have been
widely used in various fields like, navigation,
including communications, radar technology, cipher
technologies, remote control, measurements, and
industrial automation etc. [2]. Pseudorandom
sequences have been used in error-correcting codes
[3], spread spectrum communication [4], [5] and
system identification and parameter measurements
[6], [7]. Other applications are found in surface
characterization and 3D scene modeling [8]. The
design of a general purpose pseudorandom sequence
1246 | P a g e
Mr. Rohith. S et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252
generator has matured and has already been
commercialized [9]-[11].
Pseudorandom sequences are series of 1’s
and 0’s that lack any definite pattern and look
statistically independent and uniformly distributed.
The sequences are deterministic, but existence of
noise properties similar to randomness [12]. In
general, a pseudorandom sequence generator is
usually made up of shift registers with feedback. By
linearly combining elements from the shift register
and feeding them back to the input of the generator,
we can obtain a sequence of much longer repeat
length using the same number of delay elements in the
shift register. Therefore, these blocks are also referred
to as a linear feedback shift register (LFSR) [13],
[14]. The length of the shift register, the number of
taps and their positions in the LFSR are important to
generate pseudorandom sequences with desirable
auto-correlation properties [15].
The outputs from above said PRNGs suffer
from some problems they include; periods are shorter
than expected for some seed states. Generated
numbers have lack of uniformity of distribution,
correlation of successive values, output sequence is
poor dimensional distribution, The distances between
where some values occur are distributed differently
from those in a random sequence distribution.
Park-Miller algorithm is used to generate 32bit sequences of key[16]. The Park-Miller algorithm
satisfies the following three criteria to generate good
pseudo random numbers: sequence is sufficiently
Random,
Sequence
full
period,
efficient
implementation with 32-bit arithmetic.
The generated sequence of 32-bit sequence
keys are plays a important role in the case of stream
cipher to encrypt and decrypt plain text.
In cryptography, a stream cipher is asymmetric key
cipher, where plaintext digits are combined with
a pseudo random cipher digit stream (key stream). In
a stream cipher each plain text digits is encrypted one
at a time with the corresponding digit of the key
stream, to give a digit of the cipher text stream.
Finally the generated sequence of 32-bit pseudo
random keys and by same sequence of keys used to
encrypt and decrypt plain text. Programming of
proposed scheme is done using verilog-HDL and
simulated using Xilinx ISE simulator. Finally the
scheme is implemented on Spartan 3E FPGA.
The organization of this paper is as follows.
Section II describes algorithm design and architecture
of the proposed PRNG, Section III describe the design
of Encryption and Decryption block The
www.ijera.com

www.ijera.com

implementation results and synthesis report is
discussed in section IV. Finally, the conclusion is
presented in the last section.

II.

PARK-MILLER ALGORITHM

Park-Miller algorithm [16] is based on the
linear congruential form:
Xn+1 = a Xn mod (231-1)
Where ‘n’ sequence number. Pseudo code of the Park
miller algorithm is given below.
a=168007;
(2 < a < M-1)
m=2147483647;
(231-1)
q=127773;
(m div a)
r=2836;
(m mod a)
Var
hi: =in_seed div q;
lo: =in_seed mod q;
test: =a*lo –r*hi;
if test > 0 then
Out_seed:= test;
random: =out_seed / m;
else
Out_seed:= test +m;
random: =out_seed / m;
end;
Steps of the Park miller algorithm are as follows:
1. Initialize the input in_seed and parameters a =
16807 m= 2,147,483,647, q = 127773, r = 2836.
2. Compute the value of hi = in_seed div q and lo =
in_seed mod q.
3. Then compute the corresponding test value.
4. If test > 0, save test as new out_seed, otherwise
save test + m.
5. Output the new out_seed.
6. Iterate, and let the out_seed be the new in_seed.
As this algorithm is designed for computer
system, the limitation of the precision of the operation
system is considered. It is designed for any system
whose precision is 32 bits or larger. In order to avoid
overflow error, the seed adds a maximum allowable
number m in the 32 bits system at before the output in
the event that the value of the seed is not positive, as
is illustrated in above algorithm[16].
The Figure1 shows the flow chart of Park
Miller algorithm. Here first ‘m’ (231-1), ‘a’ (16807),
‘q’ (127773), ‘r’ (2836), En=0 are initialized and
In_seed is a user choice with length of 32-bit value.
After initializing these values for first random
generation En = 0 at that time, the variables hi and lo
have to be calculated as In_seed div q and In_seed
mod q respectively. Then another variable Test as
1247 | P a g e
Mr. Rohith. S et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252
a*lo – r*hi, if this value is greater than zero then
out_seed becomes Test, else out_seed becomes Test +
m. Finally random output will calculated as out_seed
divided by m. At this stage first random output is
generated. For the next pseudorandom number
generation, En = 1 now out_seed becomes In_seed or
hi and lo will calculated as out_seed div q and
out_seed mod q there after same steps will continue to
generate sequence of pseudorandom number
generation.

www.ijera.com

The entire general block diagram is shown in
figure 2. It consists of PRNG module, Encryption
Block, Decryption Block and slave register. These
internal modules described in figure 3 and figure
5.PRNG block generates sequence of 32 bit pseudo
random keys with the help of state machine, divider
and multiplier. Here we used an APB bus protocol for
FPGA Implementation of proposed PRNG.

Fig 3: PRNG Block using Park Miller Algorithm

Fig 1: Flow Chart of Park Miller Algorithm

The PRNG module will use this 32-bit input
in_seed number to generate its first 32-bit output
out_seed when ‘Reset’ is activated. The second
random number generation is different from the first
in the input data. The second output out_seed is
generated using the first output out_seed as its
in_seed number and the subsequent outputs are
generated using their immediate previous outputs as
in_seed number.

Fig 4: State Diagram of PRNG Sequence
Fig 2: General Block Diagram of Proposed Design
www.ijera.com

1248 | P a g e
Mr. Rohith. S et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252
The PRNG module shown in figure 3 is
composed mainly of a state machine, 32 bit booth
multiplier and 32 bit floating point divider. The state
diagram of the PRNG is presented in Figure4.
The default state is 11 and the PRNG will be
activated when the ‘Reset’ signal is high, which
changes the state to 0. From state 0, the input in_seed
is compared against quotient 127773. If the input
in_seed is less than 127773, hi =in_ seed div q will be
0 and lo = in_seed mod q will be the input in_ seed.
So from Figure 2, only a multiplication out_seed = a *
lo is needed and a shorter period of producing the
random number can be achieved. The PRNG then
goes to state 1 and the multiplication is taken from
state 3 to state 4. On the other hand, if the input
in_seed is greater than 127773, one division in_seed/q
and two multiplications a*lo and r*hi are needed. So
it goes to state 2 and follows the state path. From state
5 to state 9, these computations are taken. As soon as
the operation completes, the status register is updated.
When they converge at state 10, a random number is
generated and this number is taken as the input to
restart the flow at either state 1 or 2. As part of the
PRNG module, the booth multiplier is implemented
using repeated shift and addition algorithm. That is,
shift the second multiplicand to correspond with each
1 in the first multiplicand and add to the result.
The floating point divider is designed using
the repeated shift and subtraction algorithm which is
the reverse of the multiplication by shifting and
adding. Basically, division process can be
summarized as follows: shift the divisor to correspond
with each portion of the dividend, subtract divisor
from that portion of the dividend and concatenate 0 or
1 to the result based on the result of the subtraction.
One good feature of the Park-Miller
algorithm is that “m” is more than 2 billion and is
therefore beneficial for series simulations. This
algorithm this algorithm has passed a wide range of
statistical tests and is known as one of the best [16].

III.

ENCRYPTION AND DECRYPTION

The generated sequence of 32-bit sequence
keys are plays an important role in the case of stream
cipher to encrypt and decrypt plain text.
In cryptography, a stream cipher is asymmetric key
cipher where plaintext digits are combined with
a pseudorandom cipher digit stream (key stream). In a
stream cipher each plain text digit is encrypted one at
a time with the corresponding digit of the key stream,
to give a digit of the cipher text stream. An alternative

www.ijera.com

www.ijera.com

name is a state cipher, as the encryption of each digit
is dependent on the current state.

Fig 5:Encryption and Decryption of Plain Text
The design Block diagram of encryption and
decryption is shown in Figure 5. Here used a xor gates
to encrypt and decrypt the plain data. The pseudo
random keys generated from the designed PRNG are
sequence of 32 – bits. So after generating the
sequence of keys used sequence of 32 bit key for
encryption and decryption of plain text.

IV.

IMPLEMENTATION AND RESULT

The Programming is done in VerilogHardware description language with behavioral level.
To validate randomness of the PRNG sequence
MATLAB Software used. The proposed module is
successfully synthesized and implemented on
XILINX Spartan 6E FPGA kit.

Fig 6: Plot of first 50 PRN sequence with seed input
140000.
The first 50 and 20000 Pseudo random
numbers generated as discussed in section II for an
arbitrarily chosen inputs in_seed 140000, ‘a’ is 16807,
and ‘m’ is 2147483647 resulting plots are shown in
figure 6 and in figure 7 respectively. The plot shown
in Fig 6 random in nature. To verify the functionality
of behavioral description of the algorithm simulation
is carried out for same inputs ‘in_seed’, ‘m’ and ‘a’ in
Modelsim using Verilog-HDL language, the results
obtained is perfectly matching with MATLAB results.

1249 | P a g e
Mr. Rohith. S et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252

Fig 7: Plot of first 20000 PRN sequence with input
seed 140000

Fig 8:Simulation results of generated pseudorandom
numbers with seed input 140000.
The simulation result of generated pseudo
random numbers is shown in Figure 8. If the signal
‘en’ is high then the operation of PRNG module
initiates and it takes inputs ‘m’ (231-1), ‘a’(16807),
‘In_seed’ 140000. After completion of PRNG
operation ‘rng_done’ signal will high, then the first 32
bit pseudo random number ‘rng_out’ 0.0956879
produce. For second pseudo random number
generation out_seed becomes In_seed and same
operation repeats. It gives 0.290329 as second PRN
and 0.745102, 0.0184531, 0.413223, 0.286072,
0.246262, 0.603485 and so on.

www.ijera.com

with generated 32 bit Pseudo random key ‘ffe780c0’
the resulted encrypted data is (½¯¯Á’) ‘bdafc192’ in
hexadecimal. Similar procedure is carried out for
other blocks of ASCII characters.
The
plain
text
(BHARATESH
N
RESEARCH SCHOLAR NCET VENKATAGIRI
KOTE
POST
DEVANAHALLI
TALUQ
BANGALURU 562110)is xor with a Pseudo random
keys which results in to encrypted data as
(½¯¯Á’¾³Å“·ÇÎà¢Ó…¾µÃˆß´Ãˆ°«Ì’ß©Ã…±¬Á”¾ É’¶¬Ï”ºÇÐЫà „º
±ÁŽ¾¯ÁŒ³¬ ”¼«Õ‘ߥÁŽ¸¦Ì•² õÉÕ±ñÏÇ à).

Fig 10: Simulation results of Decryption of Encrypted
data with the help of generated sequence of
pseudorandom keys.
Each block of 32 bit encrypted data bitwise
XOR operation performed with 32 bit PRNG key
results decrypted data. The first block of encrypted
data (½¯¯Á’) ‘bdafc192’ in hexadecimal is bitwise
xor with generated 32 bit Pseudo random key
‘ffe780c0’ the resulted decrypted data is ‘BHAR’
(42484152 in hexadecimal). The same procedure is
carried out for others.
The encrypted data which we have obtained from
encryption is:
(½¯¯Á’¾³Å“·ÇÎà¢Ó…¾µÃˆß´Ãˆ°«Ì’ß©Ã…±¬Á”¾
É’¶¬Ï”ºÇÐЫà „º±ÁŽ¾¯ÁŒ³¬ ”¼«Õ‘ߥÁŽ¸¦Ì•² õÉÕ±ñÏÇ à). Then the resulted decrypted data is
(BHARATESH N RESEARCH SCHOLAR NCET
VENKATAGIRI KOTE POST DEVANAHALLI
TALUQ BANGALURU 562110).
Table 1: Device utilization report of PRNG

Fig 9: Simulation results of Encryption of Text
Message with the help of generated sequence of
pseudorandom keys.
Each block of 32 bit data bitwise XOR
operation performed with 32 bit PRNG key results
encrypted data. The first block of plain text data is
‘BHAR’ (42484152 in hexadecimal) is bitwise xor
www.ijera.com

1250 | P a g e
Mr. Rohith. S et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252

www.ijera.com

Fig 11:Timing Sumary of proposed Design

Fig 12:RTL schematic of Proposed design
The design of pseudo random number
generator based on Park – Miller algorithm and
encryption decryption modules synthesized using
Xilinx ISE design Suit 14.3 and the RTL schematic
obtained from that is shown in Figure 12. The device
utilization and timing summary is given Table 1.The
proposed design uses maximum operating frequency
of ‘191.13’MHz, 5.6 ns of setup time and 5.62 ns of
hold time as shown in Figure 11.
The proposed pseudo random number
generator based on Park-Miller algorithm is
synthesized in cadence RTL compiler 180nm
technology. From the report the power consumed by
the proposed pseudo random number generator is
‘4.38mW’ which is very less compared to other
random number generator. It consumes a Static power
of ‘0.0134mW’ and Dynamic power of ‘4.37mW’.So
it can be use for any low power cryptographic
applications.
The area required for whole design is only
‘0.447’mm2 so the proposed pseudo random number
generator is area efficient. The comparison of area
and power of this design with other random number
generators is shown in Table 2.
Table 2: Comparison of Area and Power of proposed
design with other random number generators
www.ijera.com

Fig 13:Spartan 6E FPGA Board
The over all proposed design of generation
of pseudo random numbers using Park-Miller
algorithm, Encryption and Decryption modules are
deployed in spartan 6E FPGA board as shown in
Figure 13.

V.

CONCLUSION

In this pager the implementation of ParkMiller algorithm has been carried out using the
Verilog-HDL programming language and in
MATLAB to verify the result. In this work Pseudo
random number generator is based on simple Parkmiller algorithm design is implemented completely in
digital circuit and deployed on general FPGA
development board. The design produces a pseudo
random number on each clock cycle. Here the text is
considered as information and is encrypted using
generated pseudo random key. Simulation result
shows that text message is completely encrypted and
cannot be recognized. The design is synthesized in
cadence RTL compiler with 180nm technology. It
consumes 4.37mW power and area of 0.447mm2.
Compared to [17][18][19][20] the power and area
consumed by proposed PRNG is less. So it has low
energy consumption and good statistical quality.
REFERENCES
[1]
Z.G. Xiao, Pseudo-Random Sequence and Its
Applications, Beijing, China: Nat. Defence
Ind., 1985.

1251 | P a g e
Mr. Rohith. S et al Int. Journal of Engineering Research and Application
ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252
[2]

[3]

[4]

[5]

[6]

[7]

[8]

[9]

[10]

[11]

[12]

[13]
[14]

L.Xu
and
X.
Li,
“Dual-Channel
Pseudorandom Sequence Generator with
Precise Time Delay Between Its Two
Channels,” IEEE Trans. Instrum. Meas., vol.
57, no. 12, Dec. 2008, pp. 2880-2884.
C.H. Yen and B.F. Wu, “An ErrorCorrecting Stream Cipher Design with StateHopping Architecture,” J. Chin. Inst. Eng.,
vol. 28, no. 1, 2005, pp. 9-16.
X.G.Wangetal.,“Spread-Spectrum
Communication
Using
Binary
Spatiotemporal Chaotic Codes,” Phys. Lett.
A, vol. 334,no. 1, Jan. 2005, pp. 30-36.
H.J. Kim et al., “PN Sequence Generation
from 2-D Array of Shift Registers,” ETRI J.,
vol. 27, no. 3, June 2005, pp. 273-279.
T. Johnsen et al., “Simultaneous Use of
Multiple Pseudo Random Noise Codes in
Multistatic CW Radar,” Proc. IEEE Nat.
Radar Conf., 2004, pp. 266-270.
D.K. Rollins et al., “A Quantitative Measure
to Evaluate Competing Designs for Nonlinear Dynamic Process Identification,”
Can. J. Chem. Eng., vol. 84, no. 4, 2006, pp.
459-468.
H.J.W. Spoelder et al., “Some Aspects of
Pseudo Random Binary Array-Based Surface
Characterization,” IEEE Trans. Instrum.
Meas., vol. 49, no. 6, Dec. 2000, pp. 13311336.
R. Shaltiel and C. Umans, “Simple
Extractors for All Minentropies and a New
Pseudorandom Generator,” Proc. Annu.
Symp. Found. Compute. Sci., 2001, pp. 648657.
A.H. Tan and K.R. Godfrey, “The
Generation of Binary and Near-Binary
Pseudorandom Signals: An Overview,”
Proc. IEEE Instrum. Meas. Technol. Conf.,
vol. 2, 2001, pp. 766-771.
J. Szczepanski et al., “Biometric Random
Number Generators,” Comput. Secur., vol.
23, no. 1, Feb. 2004, pp. 77-84.
P. Alfke, “Efficient Shift Registers, LFSR
Counters, and Long Pseudo-Random
Sequence Generators,” Application Note,
Xilinx Corp., Aug. 1995.
“Gold Code Generator Reference Design,
Altera Application” Note 295, Mar. 2003.
F. Principe et al., “Rapid Acquisition of Gold
Codes and Related Sequences Using
Iterative Message Passing on Redundant

www.ijera.com

[15]

[16]

[17]

[18]

[19]

[20]

www.ijera.com

Graphical Models,” Proc. Int. Conf. Military
Commun, 2006.
X.D. Lin and K.H. Chang, “Optimal PN
Sequence Design for Quasi synchronous
CDMA Communication Systems,” IEEE
Trans. Comm., vol. 45, no. 2, Feb. 1997, pp.
221-226.
S. K. Park and K. W. Miller, “Random
number generators: Good ones are hard to
find,” Communications of the ACM, vol. 32,
Issue 10.1192-1201.
H. Yang, J. Huang, T. Chang, “A chaosbased fully digital 120 MHz pseudo random
number generator,” Circuits and Systems,
2004, the 2004 IEEE Asia-Pacific
Conference
on,
pp.357-360,
6-9
December2004
T. Sato, K. Kikuchi, M. Fukase, “Chip
Design of a Wave-Pipelined PRNG,”
Communications
and
Information
Technologies,
2006,
ISCIT
2006,
International Symposium on, pp. 978-983,
18-20 October2006.
C. Wang, Y. Tseng, H. Cheng, R. Hu,
“Switched-current 3-bit CMOS wideband
random signal generator,” Mixed-Signal
Design, 2003,Southwest Symposium on, pp.
186-189, 23-25 February 2003.
F. Pareschi, G. Setti, R. Rovatti, “A Fast
Chaos-based
True
Random
Number
Generator for Cryptographic Applications,”
Solid-State Circuits Conference, 2006,
ESSCIRC 2006, 32nd European, pp.130-133,
19-21 September 2006

1252 | P a g e

Contenu connexe

Tendances

Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic  AlgorithmsPerformance Analysis of New Light Weight Cryptographic  Algorithms
Performance Analysis of New Light Weight Cryptographic AlgorithmsIOSR Journals
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Journals
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysisijcisjournal
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encodereSAT Publishing House
 
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsIJERA Editor
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisIJCERT
 
Secure Multi-Party Computation
Secure Multi-Party ComputationSecure Multi-Party Computation
Secure Multi-Party ComputationAshutosh Satapathy
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...IJERA Editor
 
Fpga based solution for the identification of radar pulse sequences for defen...
Fpga based solution for the identification of radar pulse sequences for defen...Fpga based solution for the identification of radar pulse sequences for defen...
Fpga based solution for the identification of radar pulse sequences for defen...eSAT Publishing House
 
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTIONMODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTIONijcsit
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmIAEME Publication
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Alexander Decker
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicIJORCS
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decodereSAT Publishing House
 

Tendances (18)

Performance Analysis of New Light Weight Cryptographic Algorithms
Performance Analysis of New Light Weight Cryptographic  AlgorithmsPerformance Analysis of New Light Weight Cryptographic  Algorithms
Performance Analysis of New Light Weight Cryptographic Algorithms
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
Hardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for CryptanalysisHardware Implementation of Algorithm for Cryptanalysis
Hardware Implementation of Algorithm for Cryptanalysis
 
J0445255
J0445255J0445255
J0445255
 
Fpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoderFpga implementation of linear ldpc encoder
Fpga implementation of linear ldpc encoder
 
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital CircuitsMultiple Valued Logic for Synthesis and Simulation of Digital Circuits
Multiple Valued Logic for Synthesis and Simulation of Digital Circuits
 
Ch34508510
Ch34508510Ch34508510
Ch34508510
 
Multiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity AnalysisMultiple Encryption using ECC and Its Time Complexity Analysis
Multiple Encryption using ECC and Its Time Complexity Analysis
 
Secure Multi-Party Computation
Secure Multi-Party ComputationSecure Multi-Party Computation
Secure Multi-Party Computation
 
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
Data Encryption and Decryption Algorithm Using Hamming Code and Arithmetic Op...
 
Fpga based solution for the identification of radar pulse sequences for defen...
Fpga based solution for the identification of radar pulse sequences for defen...Fpga based solution for the identification of radar pulse sequences for defen...
Fpga based solution for the identification of radar pulse sequences for defen...
 
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTIONMODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
MODIFICATION THE SECURITY OF FLIP PROTOCOL BY CHANGING THE BASE POINT SELECTION
 
Block cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithmBlock cipher encryption for text to-image algorithm
Block cipher encryption for text to-image algorithm
 
Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...
 
Enhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State LogicEnhancement of DES Algorithm with Multi State Logic
Enhancement of DES Algorithm with Multi State Logic
 
Ijcnc050212
Ijcnc050212Ijcnc050212
Ijcnc050212
 
Fpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoderFpga implementation of (15,7) bch encoder and decoder
Fpga implementation of (15,7) bch encoder and decoder
 
1570285065
15702850651570285065
1570285065
 

En vedette

50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)Heinz Marketing Inc
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitudeWith Company
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

En vedette (8)

50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)50 Essential Content Marketing Hacks (Content Marketing World)
50 Essential Content Marketing Hacks (Content Marketing World)
 
Prototyping is an attitude
Prototyping is an attitudePrototyping is an attitude
Prototyping is an attitude
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Similaire à Hd3512461252

Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...AM Publications
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET Journal
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewIJERA Editor
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET Journal
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsIRJET Journal
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmIJERA Editor
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsAM Publications
 
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...IRJET Journal
 
PERFORMANCE ANALYSIS OF PARALLEL POLLARD’S RHO FACTORING ALGORITHM
PERFORMANCE ANALYSIS OF PARALLEL POLLARD’S  RHO FACTORING ALGORITHM PERFORMANCE ANALYSIS OF PARALLEL POLLARD’S  RHO FACTORING ALGORITHM
PERFORMANCE ANALYSIS OF PARALLEL POLLARD’S RHO FACTORING ALGORITHM ijcsit
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...IRJET Journal
 
FPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockFPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockIOSR Journals
 
FPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockFPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockIOSR Journals
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignIRJET Journal
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET Journal
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...IRJET Journal
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidIRJET Journal
 

Similaire à Hd3512461252 (20)

Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
IMPLEMENTATION OF HAMMING NETWORK ALGORITHM TO DECIPHER THE CHARACTERS OF PIG...
 
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic EncryptionIRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
IRJET- Secure Data on Multi-Cloud using Homomorphic Encryption
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In Labview
 
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home SecurityIRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
 
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithmsAnalysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
 
Design And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption AlgorithmDesign And Implementation Of Tiny Encryption Algorithm
Design And Implementation Of Tiny Encryption Algorithm
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
 
40120140502003
4012014050200340120140502003
40120140502003
 
Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...Development and performance comparison of modified RSA algorithm with other c...
Development and performance comparison of modified RSA algorithm with other c...
 
J45015460
J45015460J45015460
J45015460
 
PERFORMANCE ANALYSIS OF PARALLEL POLLARD’S RHO FACTORING ALGORITHM
PERFORMANCE ANALYSIS OF PARALLEL POLLARD’S  RHO FACTORING ALGORITHM PERFORMANCE ANALYSIS OF PARALLEL POLLARD’S  RHO FACTORING ALGORITHM
PERFORMANCE ANALYSIS OF PARALLEL POLLARD’S RHO FACTORING ALGORITHM
 
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...IRJET -  	  Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
 
FPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockFPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe Lock
 
FPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe LockFPGA Based Implementation of Electronic Safe Lock
FPGA Based Implementation of Electronic Safe Lock
 
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG DesignAn Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
An Efficient VLSI Design of AES Cryptography Based on DNA TRNG Design
 
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud ComputingIRJET-Implementation of QR Code on Data Protection of Cloud Computing
IRJET-Implementation of QR Code on Data Protection of Cloud Computing
 
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
ELECTRONIC MAIL SECURITY USING ASYMMETRIC CRYPTOGRAPHIC ALGORITHM: A NOVEL AP...
 
Email Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on AndroidEmail Encryption using Tri-Cryptosystem Based on Android
Email Encryption using Tri-Cryptosystem Based on Android
 

Dernier

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Dernier (20)

Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Hd3512461252

  • 1. Mr. Rohith. S et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252 RESEARCH ARTICLE www.ijera.com OPEN ACCESS FPGA Implementation of Park-Miller Algorithm to Generate Sequence of 32-Bit Pseudo Random Key for Encryption and Decryption of Text Message Mr. Rohith. S*, Mr. Bharatesh. N** Department of Electronics and Communication Engineering Nagarjuna College of Engineering and Technology, Bangalore, Karnataka, India-562110 ABSTRACT In today’s world, all the e-commerce transaction happens over the internet. The data that is transferred over the internet needs to be secured before the transmission process happens. The proposed scheme is a FPGA implementation of Park-Miller algorithm for generating sequence of Pseudo-Random keys. The generated pseudo random sequences are comparatively less complex in computation, power efficient and flexible so that it makes the digital circuit faster and smaller. The operation of Park-Miller algorithm to generate pseudo random number uses 32-bit Booth multiplier for multiplication, 32-bit floating point divider for division and a finite state machine for the flow of Park-Miller algorithm operation. After generating a sequence of 32-bit pseudo-random numbers, it is used as a key to encrypt the text message which is known as cipher text. Using the same key to decrypt the encrypted data to get back original text message. The programming is done in Verilog-HDL and MATLAB to verify the result. The design is simulated in Modelsim (version 10.5). The proposed module is successfully synthesized using Cadence RTL compiler. Area and power of the design is computed for 180nm technology. Finally design is implemented on Spartan 6E FPGA. Keywords – Cryptography security, Encryption, Decryption, Park-Miller Algorithm, Pseudo random bit generator I. INTRODUCTION Encryption is used to securely transmit the data in a open networks. The transmitted data may be text, image, audio, video form. Each type of data has its own features. Therefore different techniques should be used to protect confidential data from unauthorized access. The Pseudo-Random numbers are plays very important role in the communication system for protection of information from unauthorized access. The efficiency of the Pseudo Random Number Generator (PRNG) based cryptosystem is mainly based on the random key generated by its PRNG [1-5]. Depending on the application, three types of number sequences might prove as the “random numbers”. A numbers generated by a truly random process is most desirable. This type of sequence is called a random-number sequence and the key problem is deciding whether or not the generating process is random. A more practical sequence is the pseudo-random sequence, a series of numbers generated by a deterministic process that is intended merely to imitate a random sequence but which, of course, does not correctly obey such things as the www.ijera.com laws of large numbers. A quasi-random sequence is a series of numbers that makes no guaranty at being random but that has important predefine statistical properties of random sequences. PRNGs are efficient periodic and deterministic. Efficient meaning that in a short time, they can produce many numbers. Deterministic, means that if the starting point in the sequence is known a given sequence of numbers can be regenerate at a later time [1]. Periodic, means that the sequence will sequentially repeated after specified period. While periodicity is hardly ever a desirable characteristic, modern PRNGs have a period that is so long that it can be ignored for most practical purposes. Pseudorandom sequences [1] have been widely used in various fields like, navigation, including communications, radar technology, cipher technologies, remote control, measurements, and industrial automation etc. [2]. Pseudorandom sequences have been used in error-correcting codes [3], spread spectrum communication [4], [5] and system identification and parameter measurements [6], [7]. Other applications are found in surface characterization and 3D scene modeling [8]. The design of a general purpose pseudorandom sequence 1246 | P a g e
  • 2. Mr. Rohith. S et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252 generator has matured and has already been commercialized [9]-[11]. Pseudorandom sequences are series of 1’s and 0’s that lack any definite pattern and look statistically independent and uniformly distributed. The sequences are deterministic, but existence of noise properties similar to randomness [12]. In general, a pseudorandom sequence generator is usually made up of shift registers with feedback. By linearly combining elements from the shift register and feeding them back to the input of the generator, we can obtain a sequence of much longer repeat length using the same number of delay elements in the shift register. Therefore, these blocks are also referred to as a linear feedback shift register (LFSR) [13], [14]. The length of the shift register, the number of taps and their positions in the LFSR are important to generate pseudorandom sequences with desirable auto-correlation properties [15]. The outputs from above said PRNGs suffer from some problems they include; periods are shorter than expected for some seed states. Generated numbers have lack of uniformity of distribution, correlation of successive values, output sequence is poor dimensional distribution, The distances between where some values occur are distributed differently from those in a random sequence distribution. Park-Miller algorithm is used to generate 32bit sequences of key[16]. The Park-Miller algorithm satisfies the following three criteria to generate good pseudo random numbers: sequence is sufficiently Random, Sequence full period, efficient implementation with 32-bit arithmetic. The generated sequence of 32-bit sequence keys are plays a important role in the case of stream cipher to encrypt and decrypt plain text. In cryptography, a stream cipher is asymmetric key cipher, where plaintext digits are combined with a pseudo random cipher digit stream (key stream). In a stream cipher each plain text digits is encrypted one at a time with the corresponding digit of the key stream, to give a digit of the cipher text stream. Finally the generated sequence of 32-bit pseudo random keys and by same sequence of keys used to encrypt and decrypt plain text. Programming of proposed scheme is done using verilog-HDL and simulated using Xilinx ISE simulator. Finally the scheme is implemented on Spartan 3E FPGA. The organization of this paper is as follows. Section II describes algorithm design and architecture of the proposed PRNG, Section III describe the design of Encryption and Decryption block The www.ijera.com www.ijera.com implementation results and synthesis report is discussed in section IV. Finally, the conclusion is presented in the last section. II. PARK-MILLER ALGORITHM Park-Miller algorithm [16] is based on the linear congruential form: Xn+1 = a Xn mod (231-1) Where ‘n’ sequence number. Pseudo code of the Park miller algorithm is given below. a=168007; (2 < a < M-1) m=2147483647; (231-1) q=127773; (m div a) r=2836; (m mod a) Var hi: =in_seed div q; lo: =in_seed mod q; test: =a*lo –r*hi; if test > 0 then Out_seed:= test; random: =out_seed / m; else Out_seed:= test +m; random: =out_seed / m; end; Steps of the Park miller algorithm are as follows: 1. Initialize the input in_seed and parameters a = 16807 m= 2,147,483,647, q = 127773, r = 2836. 2. Compute the value of hi = in_seed div q and lo = in_seed mod q. 3. Then compute the corresponding test value. 4. If test > 0, save test as new out_seed, otherwise save test + m. 5. Output the new out_seed. 6. Iterate, and let the out_seed be the new in_seed. As this algorithm is designed for computer system, the limitation of the precision of the operation system is considered. It is designed for any system whose precision is 32 bits or larger. In order to avoid overflow error, the seed adds a maximum allowable number m in the 32 bits system at before the output in the event that the value of the seed is not positive, as is illustrated in above algorithm[16]. The Figure1 shows the flow chart of Park Miller algorithm. Here first ‘m’ (231-1), ‘a’ (16807), ‘q’ (127773), ‘r’ (2836), En=0 are initialized and In_seed is a user choice with length of 32-bit value. After initializing these values for first random generation En = 0 at that time, the variables hi and lo have to be calculated as In_seed div q and In_seed mod q respectively. Then another variable Test as 1247 | P a g e
  • 3. Mr. Rohith. S et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252 a*lo – r*hi, if this value is greater than zero then out_seed becomes Test, else out_seed becomes Test + m. Finally random output will calculated as out_seed divided by m. At this stage first random output is generated. For the next pseudorandom number generation, En = 1 now out_seed becomes In_seed or hi and lo will calculated as out_seed div q and out_seed mod q there after same steps will continue to generate sequence of pseudorandom number generation. www.ijera.com The entire general block diagram is shown in figure 2. It consists of PRNG module, Encryption Block, Decryption Block and slave register. These internal modules described in figure 3 and figure 5.PRNG block generates sequence of 32 bit pseudo random keys with the help of state machine, divider and multiplier. Here we used an APB bus protocol for FPGA Implementation of proposed PRNG. Fig 3: PRNG Block using Park Miller Algorithm Fig 1: Flow Chart of Park Miller Algorithm The PRNG module will use this 32-bit input in_seed number to generate its first 32-bit output out_seed when ‘Reset’ is activated. The second random number generation is different from the first in the input data. The second output out_seed is generated using the first output out_seed as its in_seed number and the subsequent outputs are generated using their immediate previous outputs as in_seed number. Fig 4: State Diagram of PRNG Sequence Fig 2: General Block Diagram of Proposed Design www.ijera.com 1248 | P a g e
  • 4. Mr. Rohith. S et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252 The PRNG module shown in figure 3 is composed mainly of a state machine, 32 bit booth multiplier and 32 bit floating point divider. The state diagram of the PRNG is presented in Figure4. The default state is 11 and the PRNG will be activated when the ‘Reset’ signal is high, which changes the state to 0. From state 0, the input in_seed is compared against quotient 127773. If the input in_seed is less than 127773, hi =in_ seed div q will be 0 and lo = in_seed mod q will be the input in_ seed. So from Figure 2, only a multiplication out_seed = a * lo is needed and a shorter period of producing the random number can be achieved. The PRNG then goes to state 1 and the multiplication is taken from state 3 to state 4. On the other hand, if the input in_seed is greater than 127773, one division in_seed/q and two multiplications a*lo and r*hi are needed. So it goes to state 2 and follows the state path. From state 5 to state 9, these computations are taken. As soon as the operation completes, the status register is updated. When they converge at state 10, a random number is generated and this number is taken as the input to restart the flow at either state 1 or 2. As part of the PRNG module, the booth multiplier is implemented using repeated shift and addition algorithm. That is, shift the second multiplicand to correspond with each 1 in the first multiplicand and add to the result. The floating point divider is designed using the repeated shift and subtraction algorithm which is the reverse of the multiplication by shifting and adding. Basically, division process can be summarized as follows: shift the divisor to correspond with each portion of the dividend, subtract divisor from that portion of the dividend and concatenate 0 or 1 to the result based on the result of the subtraction. One good feature of the Park-Miller algorithm is that “m” is more than 2 billion and is therefore beneficial for series simulations. This algorithm this algorithm has passed a wide range of statistical tests and is known as one of the best [16]. III. ENCRYPTION AND DECRYPTION The generated sequence of 32-bit sequence keys are plays an important role in the case of stream cipher to encrypt and decrypt plain text. In cryptography, a stream cipher is asymmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (key stream). In a stream cipher each plain text digit is encrypted one at a time with the corresponding digit of the key stream, to give a digit of the cipher text stream. An alternative www.ijera.com www.ijera.com name is a state cipher, as the encryption of each digit is dependent on the current state. Fig 5:Encryption and Decryption of Plain Text The design Block diagram of encryption and decryption is shown in Figure 5. Here used a xor gates to encrypt and decrypt the plain data. The pseudo random keys generated from the designed PRNG are sequence of 32 – bits. So after generating the sequence of keys used sequence of 32 bit key for encryption and decryption of plain text. IV. IMPLEMENTATION AND RESULT The Programming is done in VerilogHardware description language with behavioral level. To validate randomness of the PRNG sequence MATLAB Software used. The proposed module is successfully synthesized and implemented on XILINX Spartan 6E FPGA kit. Fig 6: Plot of first 50 PRN sequence with seed input 140000. The first 50 and 20000 Pseudo random numbers generated as discussed in section II for an arbitrarily chosen inputs in_seed 140000, ‘a’ is 16807, and ‘m’ is 2147483647 resulting plots are shown in figure 6 and in figure 7 respectively. The plot shown in Fig 6 random in nature. To verify the functionality of behavioral description of the algorithm simulation is carried out for same inputs ‘in_seed’, ‘m’ and ‘a’ in Modelsim using Verilog-HDL language, the results obtained is perfectly matching with MATLAB results. 1249 | P a g e
  • 5. Mr. Rohith. S et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252 Fig 7: Plot of first 20000 PRN sequence with input seed 140000 Fig 8:Simulation results of generated pseudorandom numbers with seed input 140000. The simulation result of generated pseudo random numbers is shown in Figure 8. If the signal ‘en’ is high then the operation of PRNG module initiates and it takes inputs ‘m’ (231-1), ‘a’(16807), ‘In_seed’ 140000. After completion of PRNG operation ‘rng_done’ signal will high, then the first 32 bit pseudo random number ‘rng_out’ 0.0956879 produce. For second pseudo random number generation out_seed becomes In_seed and same operation repeats. It gives 0.290329 as second PRN and 0.745102, 0.0184531, 0.413223, 0.286072, 0.246262, 0.603485 and so on. www.ijera.com with generated 32 bit Pseudo random key ‘ffe780c0’ the resulted encrypted data is (½¯¯Á’) ‘bdafc192’ in hexadecimal. Similar procedure is carried out for other blocks of ASCII characters. The plain text (BHARATESH N RESEARCH SCHOLAR NCET VENKATAGIRI KOTE POST DEVANAHALLI TALUQ BANGALURU 562110)is xor with a Pseudo random keys which results in to encrypted data as (½¯¯Á’¾³Å“·ÇÎà¢Ó…¾µÃˆß´Ãˆ°«Ì’ß©Ã…±¬Á”¾ É’¶¬Ï”ºÇÐЫà „º ±ÁŽ¾¯ÁŒ³¬ ”¼«Õ‘ߥÁŽ¸¦Ì•² õÉÕ±ñÏÇ à). Fig 10: Simulation results of Decryption of Encrypted data with the help of generated sequence of pseudorandom keys. Each block of 32 bit encrypted data bitwise XOR operation performed with 32 bit PRNG key results decrypted data. The first block of encrypted data (½¯¯Á’) ‘bdafc192’ in hexadecimal is bitwise xor with generated 32 bit Pseudo random key ‘ffe780c0’ the resulted decrypted data is ‘BHAR’ (42484152 in hexadecimal). The same procedure is carried out for others. The encrypted data which we have obtained from encryption is: (½¯¯Á’¾³Å“·ÇÎà¢Ó…¾µÃˆß´Ãˆ°«Ì’ß©Ã…±¬Á”¾ É’¶¬Ï”ºÇÐЫà „º±ÁŽ¾¯ÁŒ³¬ ”¼«Õ‘ߥÁŽ¸¦Ì•² õÉÕ±ñÏÇ à). Then the resulted decrypted data is (BHARATESH N RESEARCH SCHOLAR NCET VENKATAGIRI KOTE POST DEVANAHALLI TALUQ BANGALURU 562110). Table 1: Device utilization report of PRNG Fig 9: Simulation results of Encryption of Text Message with the help of generated sequence of pseudorandom keys. Each block of 32 bit data bitwise XOR operation performed with 32 bit PRNG key results encrypted data. The first block of plain text data is ‘BHAR’ (42484152 in hexadecimal) is bitwise xor www.ijera.com 1250 | P a g e
  • 6. Mr. Rohith. S et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252 www.ijera.com Fig 11:Timing Sumary of proposed Design Fig 12:RTL schematic of Proposed design The design of pseudo random number generator based on Park – Miller algorithm and encryption decryption modules synthesized using Xilinx ISE design Suit 14.3 and the RTL schematic obtained from that is shown in Figure 12. The device utilization and timing summary is given Table 1.The proposed design uses maximum operating frequency of ‘191.13’MHz, 5.6 ns of setup time and 5.62 ns of hold time as shown in Figure 11. The proposed pseudo random number generator based on Park-Miller algorithm is synthesized in cadence RTL compiler 180nm technology. From the report the power consumed by the proposed pseudo random number generator is ‘4.38mW’ which is very less compared to other random number generator. It consumes a Static power of ‘0.0134mW’ and Dynamic power of ‘4.37mW’.So it can be use for any low power cryptographic applications. The area required for whole design is only ‘0.447’mm2 so the proposed pseudo random number generator is area efficient. The comparison of area and power of this design with other random number generators is shown in Table 2. Table 2: Comparison of Area and Power of proposed design with other random number generators www.ijera.com Fig 13:Spartan 6E FPGA Board The over all proposed design of generation of pseudo random numbers using Park-Miller algorithm, Encryption and Decryption modules are deployed in spartan 6E FPGA board as shown in Figure 13. V. CONCLUSION In this pager the implementation of ParkMiller algorithm has been carried out using the Verilog-HDL programming language and in MATLAB to verify the result. In this work Pseudo random number generator is based on simple Parkmiller algorithm design is implemented completely in digital circuit and deployed on general FPGA development board. The design produces a pseudo random number on each clock cycle. Here the text is considered as information and is encrypted using generated pseudo random key. Simulation result shows that text message is completely encrypted and cannot be recognized. The design is synthesized in cadence RTL compiler with 180nm technology. It consumes 4.37mW power and area of 0.447mm2. Compared to [17][18][19][20] the power and area consumed by proposed PRNG is less. So it has low energy consumption and good statistical quality. REFERENCES [1] Z.G. Xiao, Pseudo-Random Sequence and Its Applications, Beijing, China: Nat. Defence Ind., 1985. 1251 | P a g e
  • 7. Mr. Rohith. S et al Int. Journal of Engineering Research and Application ISSN : 2248-9622, Vol. 3, Issue 5, Sep-Oct 2013, pp.1246-1252 [2] [3] [4] [5] [6] [7] [8] [9] [10] [11] [12] [13] [14] L.Xu and X. Li, “Dual-Channel Pseudorandom Sequence Generator with Precise Time Delay Between Its Two Channels,” IEEE Trans. Instrum. Meas., vol. 57, no. 12, Dec. 2008, pp. 2880-2884. C.H. Yen and B.F. Wu, “An ErrorCorrecting Stream Cipher Design with StateHopping Architecture,” J. Chin. Inst. Eng., vol. 28, no. 1, 2005, pp. 9-16. X.G.Wangetal.,“Spread-Spectrum Communication Using Binary Spatiotemporal Chaotic Codes,” Phys. Lett. A, vol. 334,no. 1, Jan. 2005, pp. 30-36. H.J. Kim et al., “PN Sequence Generation from 2-D Array of Shift Registers,” ETRI J., vol. 27, no. 3, June 2005, pp. 273-279. T. Johnsen et al., “Simultaneous Use of Multiple Pseudo Random Noise Codes in Multistatic CW Radar,” Proc. IEEE Nat. Radar Conf., 2004, pp. 266-270. D.K. Rollins et al., “A Quantitative Measure to Evaluate Competing Designs for Nonlinear Dynamic Process Identification,” Can. J. Chem. Eng., vol. 84, no. 4, 2006, pp. 459-468. H.J.W. Spoelder et al., “Some Aspects of Pseudo Random Binary Array-Based Surface Characterization,” IEEE Trans. Instrum. Meas., vol. 49, no. 6, Dec. 2000, pp. 13311336. R. Shaltiel and C. Umans, “Simple Extractors for All Minentropies and a New Pseudorandom Generator,” Proc. Annu. Symp. Found. Compute. Sci., 2001, pp. 648657. A.H. Tan and K.R. Godfrey, “The Generation of Binary and Near-Binary Pseudorandom Signals: An Overview,” Proc. IEEE Instrum. Meas. Technol. Conf., vol. 2, 2001, pp. 766-771. J. Szczepanski et al., “Biometric Random Number Generators,” Comput. Secur., vol. 23, no. 1, Feb. 2004, pp. 77-84. P. Alfke, “Efficient Shift Registers, LFSR Counters, and Long Pseudo-Random Sequence Generators,” Application Note, Xilinx Corp., Aug. 1995. “Gold Code Generator Reference Design, Altera Application” Note 295, Mar. 2003. F. Principe et al., “Rapid Acquisition of Gold Codes and Related Sequences Using Iterative Message Passing on Redundant www.ijera.com [15] [16] [17] [18] [19] [20] www.ijera.com Graphical Models,” Proc. Int. Conf. Military Commun, 2006. X.D. Lin and K.H. Chang, “Optimal PN Sequence Design for Quasi synchronous CDMA Communication Systems,” IEEE Trans. Comm., vol. 45, no. 2, Feb. 1997, pp. 221-226. S. K. Park and K. W. Miller, “Random number generators: Good ones are hard to find,” Communications of the ACM, vol. 32, Issue 10.1192-1201. H. Yang, J. Huang, T. Chang, “A chaosbased fully digital 120 MHz pseudo random number generator,” Circuits and Systems, 2004, the 2004 IEEE Asia-Pacific Conference on, pp.357-360, 6-9 December2004 T. Sato, K. Kikuchi, M. Fukase, “Chip Design of a Wave-Pipelined PRNG,” Communications and Information Technologies, 2006, ISCIT 2006, International Symposium on, pp. 978-983, 18-20 October2006. C. Wang, Y. Tseng, H. Cheng, R. Hu, “Switched-current 3-bit CMOS wideband random signal generator,” Mixed-Signal Design, 2003,Southwest Symposium on, pp. 186-189, 23-25 February 2003. F. Pareschi, G. Setti, R. Rovatti, “A Fast Chaos-based True Random Number Generator for Cryptographic Applications,” Solid-State Circuits Conference, 2006, ESSCIRC 2006, 32nd European, pp.130-133, 19-21 September 2006 1252 | P a g e