Cryptographic adaptation of the middle square generator
Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-comm...
Gespeichert in:
Veröffentlicht in: | International journal of electrical and computer engineering (Malacca, Malacca) Malacca), 2019-12, Vol.9 (6), p.5615 |
---|---|
Hauptverfasser: | , , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | 6 |
container_start_page | 5615 |
container_title | International journal of electrical and computer engineering (Malacca, Malacca) |
container_volume | 9 |
creator | Ali-Pacha, Hana Hadj-Said, Naima Ali-Pacha, Adda Mohamed, Mohamad Afendee Mamat, Mustafa |
description | Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption. |
doi_str_mv | 10.11591/ijece.v9i6.pp5615-5627 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2391258883</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2391258883</sourcerecordid><originalsourceid>FETCH-LOGICAL-c200t-4c642301a45bbb5f679bb6e7a0b1b7742d933b8c17b0854096b0cac601e1bd93</originalsourceid><addsrcrecordid>eNpN0E1rwzAMBmAzNljp-hsW2DmZ7MRfxxH2BYVdeje247Qpbeza7qD_fmm7Q3WRQC8SPAg9Y6gwphK_DltnXfUrB1aFQBmmJWWE36EZASFKwUHc38yPaJHSFqYSjBFJZ4i38RSyX0cdNoMtdKdD1nnwY-H7Im9csR-6bueKdDjq6Iq1G13U2ccn9NDrXXKL_z5Hq4_3VftVLn8-v9u3ZWkJQC4byxpSA9YNNcbQnnFpDHNcg8GG84Z0sq6NsJgbELQByQxYbRlgh820m6OX69kQ_eHoUlZbf4zj9FGRWmJChRD1lOLXlI0-peh6FeKw1_GkMKiLk7o4qbOTujqps1P9BxJPXe0</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2391258883</pqid></control><display><type>article</type><title>Cryptographic adaptation of the middle square generator</title><source>EZB-FREE-00999 freely available EZB journals</source><creator>Ali-Pacha, Hana ; Hadj-Said, Naima ; Ali-Pacha, Adda ; Mohamed, Mohamad Afendee ; Mamat, Mustafa</creator><creatorcontrib>Ali-Pacha, Hana ; Hadj-Said, Naima ; Ali-Pacha, Adda ; Mohamed, Mohamad Afendee ; Mamat, Mustafa</creatorcontrib><description>Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.</description><identifier>ISSN: 2088-8708</identifier><identifier>EISSN: 2088-8708</identifier><identifier>DOI: 10.11591/ijece.v9i6.pp5615-5627</identifier><language>eng</language><publisher>Yogyakarta: IAES Institute of Advanced Engineering and Science</publisher><subject>Algorithms ; Cryptography ; Data encryption ; Electronic banking ; Encryption ; Pseudorandom sequences ; Random numbers</subject><ispartof>International journal of electrical and computer engineering (Malacca, Malacca), 2019-12, Vol.9 (6), p.5615</ispartof><rights>Copyright IAES Institute of Advanced Engineering and Science Dec 2019</rights><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c200t-4c642301a45bbb5f679bb6e7a0b1b7742d933b8c17b0854096b0cac601e1bd93</citedby></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>314,776,780,27901,27902</link.rule.ids></links><search><creatorcontrib>Ali-Pacha, Hana</creatorcontrib><creatorcontrib>Hadj-Said, Naima</creatorcontrib><creatorcontrib>Ali-Pacha, Adda</creatorcontrib><creatorcontrib>Mohamed, Mohamad Afendee</creatorcontrib><creatorcontrib>Mamat, Mustafa</creatorcontrib><title>Cryptographic adaptation of the middle square generator</title><title>International journal of electrical and computer engineering (Malacca, Malacca)</title><description>Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.</description><subject>Algorithms</subject><subject>Cryptography</subject><subject>Data encryption</subject><subject>Electronic banking</subject><subject>Encryption</subject><subject>Pseudorandom sequences</subject><subject>Random numbers</subject><issn>2088-8708</issn><issn>2088-8708</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2019</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNpN0E1rwzAMBmAzNljp-hsW2DmZ7MRfxxH2BYVdeje247Qpbeza7qD_fmm7Q3WRQC8SPAg9Y6gwphK_DltnXfUrB1aFQBmmJWWE36EZASFKwUHc38yPaJHSFqYSjBFJZ4i38RSyX0cdNoMtdKdD1nnwY-H7Im9csR-6bueKdDjq6Iq1G13U2ccn9NDrXXKL_z5Hq4_3VftVLn8-v9u3ZWkJQC4byxpSA9YNNcbQnnFpDHNcg8GG84Z0sq6NsJgbELQByQxYbRlgh820m6OX69kQ_eHoUlZbf4zj9FGRWmJChRD1lOLXlI0-peh6FeKw1_GkMKiLk7o4qbOTujqps1P9BxJPXe0</recordid><startdate>20191201</startdate><enddate>20191201</enddate><creator>Ali-Pacha, Hana</creator><creator>Hadj-Said, Naima</creator><creator>Ali-Pacha, Adda</creator><creator>Mohamed, Mohamad Afendee</creator><creator>Mamat, Mustafa</creator><general>IAES Institute of Advanced Engineering and Science</general><scope>AAYXX</scope><scope>CITATION</scope><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>ARAPS</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>BVBZV</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>GNUQQ</scope><scope>HCIFZ</scope><scope>JQ2</scope><scope>K7-</scope><scope>L6V</scope><scope>M7S</scope><scope>P5Z</scope><scope>P62</scope><scope>PQEST</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20191201</creationdate><title>Cryptographic adaptation of the middle square generator</title><author>Ali-Pacha, Hana ; Hadj-Said, Naima ; Ali-Pacha, Adda ; Mohamed, Mohamad Afendee ; Mamat, Mustafa</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c200t-4c642301a45bbb5f679bb6e7a0b1b7742d933b8c17b0854096b0cac601e1bd93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2019</creationdate><topic>Algorithms</topic><topic>Cryptography</topic><topic>Data encryption</topic><topic>Electronic banking</topic><topic>Encryption</topic><topic>Pseudorandom sequences</topic><topic>Random numbers</topic><toplevel>online_resources</toplevel><creatorcontrib>Ali-Pacha, Hana</creatorcontrib><creatorcontrib>Hadj-Said, Naima</creatorcontrib><creatorcontrib>Ali-Pacha, Adda</creatorcontrib><creatorcontrib>Mohamed, Mohamad Afendee</creatorcontrib><creatorcontrib>Mamat, Mustafa</creatorcontrib><collection>CrossRef</collection><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>Advanced Technologies & Aerospace Collection</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>East & South Asia Database</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>ProQuest Central Student</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Computer Science Collection</collection><collection>Computer Science Database</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>Advanced Technologies & Aerospace Database</collection><collection>ProQuest Advanced Technologies & Aerospace Collection</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection><jtitle>International journal of electrical and computer engineering (Malacca, Malacca)</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Ali-Pacha, Hana</au><au>Hadj-Said, Naima</au><au>Ali-Pacha, Adda</au><au>Mohamed, Mohamad Afendee</au><au>Mamat, Mustafa</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Cryptographic adaptation of the middle square generator</atitle><jtitle>International journal of electrical and computer engineering (Malacca, Malacca)</jtitle><date>2019-12-01</date><risdate>2019</risdate><volume>9</volume><issue>6</issue><spage>5615</spage><pages>5615-</pages><issn>2088-8708</issn><eissn>2088-8708</eissn><abstract>Currently, cryptography plays a major role in various computer and technological applications. With the high number of internet users, the use of cryptography to provide information security has become a priority. Several applications such as e-mails, electronic banking, medical databases and e-commerce require the exchange of private information. While, if the connection is not secure, this sensitive information can be attacked. The best-known cryptographic systems rely on the generation of random numbers, which are fundamental in various cryptographic applications such as key generation and data encryption. In what follows, we want to use pseudo-random sequences generated by the middle square generator. In this work, it must be possible to estimate that the data produced has random characteristics, knowing that the algorithm used is deterministic. Overall, this paper focuses on the testing of pseudo-random sequences generated by the middle square generator and its use in data encryption.</abstract><cop>Yogyakarta</cop><pub>IAES Institute of Advanced Engineering and Science</pub><doi>10.11591/ijece.v9i6.pp5615-5627</doi></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2088-8708 |
ispartof | International journal of electrical and computer engineering (Malacca, Malacca), 2019-12, Vol.9 (6), p.5615 |
issn | 2088-8708 2088-8708 |
language | eng |
recordid | cdi_proquest_journals_2391258883 |
source | EZB-FREE-00999 freely available EZB journals |
subjects | Algorithms Cryptography Data encryption Electronic banking Encryption Pseudorandom sequences Random numbers |
title | Cryptographic adaptation of the middle square generator |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-08T18%3A20%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Cryptographic%20adaptation%20of%20the%20middle%20square%20generator&rft.jtitle=International%20journal%20of%20electrical%20and%20computer%20engineering%20(Malacca,%20Malacca)&rft.au=Ali-Pacha,%20Hana&rft.date=2019-12-01&rft.volume=9&rft.issue=6&rft.spage=5615&rft.pages=5615-&rft.issn=2088-8708&rft.eissn=2088-8708&rft_id=info:doi/10.11591/ijece.v9i6.pp5615-5627&rft_dat=%3Cproquest_cross%3E2391258883%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2391258883&rft_id=info:pmid/&rfr_iscdi=true |