Key generator
Appearance
This article needs additional citations for verification. (September 2010) |
A key generator[1][2][3] is a protocol or algorithm that is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. This sequence is used as an encryption key at one end of communication, and as a decryption key at the other. One can implement a key generator in a system that aims to generate, distribute, and authenticate[4] keys in a way that without the private key, one cannot access the information in the public end.[5]
Examples of key generators include linear-feedback shift registers (LFSR) and the Solitaire (or Pontifex) cipher.
References
[edit]- ^ "Generating Keys for Encryption and Decryption | Microsoft Docs".
- ^ "Symmetric Key Cryptography Using Random Key Generator". Retrieved 2022-04-04.
- ^ Abdalrdha, Zainab Khyioon; Al-Qinani, Iman Hussein; Abbas, Farah Neamah (2019). "Subject Review : Key Generation in Different Cryptography Algorithm". International Journal of Scientific Research in Science, Engineering and Technology: 230–240. doi:10.32628/IJSRSET196550. S2CID 207976370.
- ^ Bellare, Mihir; Rogaway, Phillip (August 1993). "Entity Authentication and Key Distribution". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 232–249. CiteSeerX 10.1.1.62.3423. doi:10.1007/3-540-48329-2_21. ISBN 978-3-540-57766-9. S2CID 5447745.
- ^ Fox, Pamela. "Public key encryption". Khan Academy. Retrieved May 19, 2021.