True Random number generator method based on image for key exchange algorithm

In this paper we propose a new method for generating True random numbers based on image which generates 256 bits key or higher for key exchange algorithm. True random numbers are always secured and good, compared to pseudo random numbers. Diffie-Hellman key exchange algorithm has two weaknesses: Discrete logarithm attack and Man-in-the-Middle attack. Our proposed method can easily overcome the above problems. This method of implementation is very easy, cost effective and convenient for transmission of shared session keys. Our proposed method rapidly increases the security of the key exchange protocols over an unsecured channel and can also be used for Public key cryptosystem.

[1]  Kwok-Wo Wong,et al.  A true random number generator based on mouse movement and chaotic cryptography , 2009 .

[2]  Bruce Schneier,et al.  Applied cryptography : protocols, algorithms, and source codein C , 1996 .

[3]  Keith Alexander Harrison,et al.  Security: Security through uncertainty , 2007 .

[4]  Richard A. Mollin,et al.  An introduction to cryptography, Second Edition , 2007, Discrete mathematics and its applications.

[5]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[6]  Andrew C. Lee Review of Introduction to cryptography by Johannes A. Buchmann. Springer Verlag, 2001. , 2003, SIGA.

[7]  Richard Mollin An introduction to cryptography , 2001, CRC Press series on discrete mathematics and its applications.

[8]  M.I. Aziz,et al.  Introduction to Cryptography , 2002, 2005 International Conference on Microelectronics.

[9]  Arne Winterhof,et al.  Exponential sums of nonlinear congruential pseudorandom number generators with Rédei functions , 2008, Finite Fields Their Appl..

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Wenjiang Pei,et al.  Pseudo-random number generator based on asymptotic deterministic randomness , 2007, 0710.1908.

[12]  Non-periodic pseudo-random numbers used in Monte Carlo calculations , 2007, cond-mat/0701099.

[13]  Johannes A. Buchmann,et al.  Introduction to Cryptography , 2001 .

[14]  Patel,et al.  Information Security: Theory and Practice , 2008 .

[15]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .