Social:Key generator

From HandWiki
Short description: Algorithm used in cryptographic protocols

A key generator[1][2][3] is a protocol or algorithm that is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. This sequence is used as an encryption key at one end of communication, and as a decryption key at the other. One can implement a key generator in a system that aims to generate, distribute, and authenticate[4] keys in a way that without the private key, one cannot access the information in the public end.[5]

Examples of key generators include linear-feedback shift registers (LFSR) and the Solitaire (or Pontifex) cipher.

References

  1. "Generating Keys for Encryption and Decryption | Microsoft Docs". https://docs.microsoft.com/en-us/dotnet/standard/security/generating-keys-for-encryption-and-decryption. 
  2. "Symmetric Key Cryptography Using Random Key Generator". https://www.researchgate.net/publication/221199745. Retrieved 2022-04-04. 
  3. Abdalrdha, Zainab Khyioon; Al-Qinani, Iman Hussein; Abbas, Farah Neamah (2019). "Subject Review : Key Generation in Different Cryptography Algorithm". International Journal of Scientific Research in Science, Engineering and Technology: 230–240. doi:10.32628/IJSRSET196550. https://ijsrset.com/IJSRSET196550. 
  4. Bellare, Mihir; Rogaway, Phillip (August 1993). "Entity Authentication and Key Distribution". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. 773. pp. 232–249. doi:10.1007/3-540-48329-2_21. ISBN 978-3-540-57766-9. 
  5. Fox, Pamela. "Public key encryption". https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption.