Cryptographic adaptation of the middle square generator

Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-comm...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of electrical and computer engineering (Malacca, Malacca) Malacca), 2019-12, Vol.9 (6), p.5615
Hauptverfasser: Ali-Pacha, Hana, Hadj-Said, Naima, Ali-Pacha, Adda, Mohamed, Mohamad Afendee, Mamat, Mustafa
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue 6
container_start_page 5615
container_title International journal of electrical and computer engineering (Malacca, Malacca)
container_volume 9
creator Ali-Pacha, Hana
Hadj-Said, Naima
Ali-Pacha, Adda
Mohamed, Mohamad Afendee
Mamat, Mustafa
description Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.
doi_str_mv 10.11591/ijece.v9i6.pp5615-5627
format Article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2391258883</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2391258883</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-4c642301a45bbb5f679bb6e7a0b1b7742d933b8c17b0854096b0cac601e1bd93</originalsourceid><addsrcrecordid>eNpN0E1rwzAMBmAzNljp-hsW2DmZ7MRfxxH2BYVdeje247Qpbeza7qD_fmm7Q3WRQC8SPAg9Y6gwphK_DltnXfUrB1aFQBmmJWWE36EZASFKwUHc38yPaJHSFqYSjBFJZ4i38RSyX0cdNoMtdKdD1nnwY-H7Im9csR-6bueKdDjq6Iq1G13U2ccn9NDrXXKL_z5Hq4_3VftVLn8-v9u3ZWkJQC4byxpSA9YNNcbQnnFpDHNcg8GG84Z0sq6NsJgbELQByQxYbRlgh820m6OX69kQ_eHoUlZbf4zj9FGRWmJChRD1lOLXlI0-peh6FeKw1_GkMKiLk7o4qbOTujqps1P9BxJPXe0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2391258883</pqid></control><display><type>article</type><title>Cryptographic adaptation of the middle square generator</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Ali-Pacha, Hana ; Hadj-Said, Naima ; Ali-Pacha, Adda ; Mohamed, Mohamad Afendee ; Mamat, Mustafa</creator><creatorcontrib>Ali-Pacha, Hana ; Hadj-Said, Naima ; Ali-Pacha, Adda ; Mohamed, Mohamad Afendee ; Mamat, Mustafa</creatorcontrib><description>Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.</description><identifier>ISSN: 2088-8708</identifier><identifier>EISSN: 2088-8708</identifier><identifier>DOI: 10.11591/ijece.v9i6.pp5615-5627</identifier><language>eng</language><publisher>Yogyakarta: IAES Institute of Advanced Engineering and Science</publisher><subject>Algorithms ; Cryptography ; Data encryption ; Electronic banking ; Encryption ; Pseudorandom sequences ; Random numbers</subject><ispartof>International journal of electrical and computer engineering (Malacca, Malacca), 2019-12, Vol.9 (6), p.5615</ispartof><rights>Copyright IAES Institute of Advanced Engineering and Science Dec 2019</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c200t-4c642301a45bbb5f679bb6e7a0b1b7742d933b8c17b0854096b0cac601e1bd93</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Ali-Pacha, Hana</creatorcontrib><creatorcontrib>Hadj-Said, Naima</creatorcontrib><creatorcontrib>Ali-Pacha, Adda</creatorcontrib><creatorcontrib>Mohamed, Mohamad Afendee</creatorcontrib><creatorcontrib>Mamat, Mustafa</creatorcontrib><title>Cryptographic adaptation of the middle square generator</title><title>International journal of electrical and computer engineering (Malacca, Malacca)</title><description>Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.</description><subject>Algorithms</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Electronic banking</subject><subject>Encryption</subject><subject>Pseudorandom sequences</subject><subject>Random numbers</subject><issn>2088-8708</issn><issn>2088-8708</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpN0E1rwzAMBmAzNljp-hsW2DmZ7MRfxxH2BYVdeje247Qpbeza7qD_fmm7Q3WRQC8SPAg9Y6gwphK_DltnXfUrB1aFQBmmJWWE36EZASFKwUHc38yPaJHSFqYSjBFJZ4i38RSyX0cdNoMtdKdD1nnwY-H7Im9csR-6bueKdDjq6Iq1G13U2ccn9NDrXXKL_z5Hq4_3VftVLn8-v9u3ZWkJQC4byxpSA9YNNcbQnnFpDHNcg8GG84Z0sq6NsJgbELQByQxYbRlgh820m6OX69kQ_eHoUlZbf4zj9FGRWmJChRD1lOLXlI0-peh6FeKw1_GkMKiLk7o4qbOTujqps1P9BxJPXe0</recordid><startdate>20191201</startdate><enddate>20191201</enddate><creator>Ali-Pacha, Hana</creator><creator>Hadj-Said, Naima</creator><creator>Ali-Pacha, Adda</creator><creator>Mohamed, Mohamad Afendee</creator><creator>Mamat, Mustafa</creator><general>IAES Institute of Advanced Engineering and Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20191201</creationdate><title>Cryptographic adaptation of the middle square generator</title><author>Ali-Pacha, Hana ; Hadj-Said, Naima ; Ali-Pacha, Adda ; Mohamed, Mohamad Afendee ; Mamat, Mustafa</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-4c642301a45bbb5f679bb6e7a0b1b7742d933b8c17b0854096b0cac601e1bd93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Electronic banking</topic><topic>Encryption</topic><topic>Pseudorandom sequences</topic><topic>Random numbers</topic><toplevel>online_resources</toplevel><creatorcontrib>Ali-Pacha, Hana</creatorcontrib><creatorcontrib>Hadj-Said, Naima</creatorcontrib><creatorcontrib>Ali-Pacha, Adda</creatorcontrib><creatorcontrib>Mohamed, Mohamad Afendee</creatorcontrib><creatorcontrib>Mamat, Mustafa</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East &amp; South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies &amp; Aerospace Database</collection><collection>ProQuest Advanced Technologies &amp; Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of electrical and computer engineering (Malacca, Malacca)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ali-Pacha, Hana</au><au>Hadj-Said, Naima</au><au>Ali-Pacha, Adda</au><au>Mohamed, Mohamad Afendee</au><au>Mamat, Mustafa</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cryptographic adaptation of the middle square generator</atitle><jtitle>International journal of electrical and computer engineering (Malacca, Malacca)</jtitle><date>2019-12-01</date><risdate>2019</risdate><volume>9</volume><issue>6</issue><spage>5615</spage><pages>5615-</pages><issn>2088-8708</issn><eissn>2088-8708</eissn><abstract>Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.</abstract><cop>Yogyakarta</cop><pub>IAES Institute of Advanced Engineering and Science</pub><doi>10.11591/ijece.v9i6.pp5615-5627</doi></addata></record>
fulltext fulltext
identifier ISSN: 2088-8708
ispartof International journal of electrical and computer engineering (Malacca, Malacca), 2019-12, Vol.9 (6), p.5615
issn 2088-8708
2088-8708
language eng
recordid cdi_proquest_journals_2391258883
source EZB-FREE-00999 freely available EZB journals
subjects Algorithms
Cryptography
Data encryption
Electronic banking
Encryption
Pseudorandom sequences
Random numbers
title Cryptographic adaptation of the middle square generator
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T18%3A20%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cryptographic%20adaptation%20of%20the%20middle%20square%20generator&rft.jtitle=International%20journal%20of%20electrical%20and%20computer%20engineering%20(Malacca,%20Malacca)&rft.au=Ali-Pacha,%20Hana&rft.date=2019-12-01&rft.volume=9&rft.issue=6&rft.spage=5615&rft.pages=5615-&rft.issn=2088-8708&rft.eissn=2088-8708&rft_id=info:doi/10.11591/ijece.v9i6.pp5615-5627&rft_dat=%3Cproquest_cross%3E2391258883%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2391258883&rft_id=info:pmid/&rfr_iscdi=true