{"title":"DNA and Blum Blum Shub Random Number Generator Based Security Key Generation Algorithm","authors":"Gurpreet Kour Sodhi, G. S. Gaba","doi":"10.14257/IJSIA.2017.11.4.01","DOIUrl":null,"url":null,"abstract":"The communication sector suffers from serious security related threats. The technique presented in this paper is a step towards providing security to the confidential data. The work is based on generating a unique key through DNA and random number generator. Each random sequence produced by Blum Blum Shub random number generator is the result of a seed value which makes the sequence unique and reproducible. The final security key obtained is unique and upon being tested using NIST randomness evaluation tests, it is concluded that the key generated retains its uniqueness to a high level, thus providing efficient security mechanism. Thus, it is possible to integrate it with any security system used in communication sector.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.4.01","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 7
Abstract
The communication sector suffers from serious security related threats. The technique presented in this paper is a step towards providing security to the confidential data. The work is based on generating a unique key through DNA and random number generator. Each random sequence produced by Blum Blum Shub random number generator is the result of a seed value which makes the sequence unique and reproducible. The final security key obtained is unique and upon being tested using NIST randomness evaluation tests, it is concluded that the key generated retains its uniqueness to a high level, thus providing efficient security mechanism. Thus, it is possible to integrate it with any security system used in communication sector.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security