Javascript must be enabled to continue!
Blum Blum Shub in Generating Key in RC4
View through CrossRef
In the manufacture of RC4 encryption, a user always inputs the key as a security approval. The encryptor usually makes the core. Sometimes the encryptor does not feel that the key made is breakable. The Blum Blum Shub method can generate random key more secure. It means that the key generated can help the data from being solved by a hijacker. Blum Blum Shub uses two prime numbers to generate a key. When attached in RC4, a user does not need to create its key; and fully produced by the Blum Blum Shub module. The ciphertext will be more secure and robust after being combined with Blum Blum Shub.
Title: Blum Blum Shub in Generating Key in RC4
Description:
In the manufacture of RC4 encryption, a user always inputs the key as a security approval.
The encryptor usually makes the core.
Sometimes the encryptor does not feel that the key made is breakable.
The Blum Blum Shub method can generate random key more secure.
It means that the key generated can help the data from being solved by a hijacker.
Blum Blum Shub uses two prime numbers to generate a key.
When attached in RC4, a user does not need to create its key; and fully produced by the Blum Blum Shub module.
The ciphertext will be more secure and robust after being combined with Blum Blum Shub.
Related Results
Security Enhancement of Playfair Cipher Using Modified Blum Blum Shub Algorithm and Keystream Values
Security Enhancement of Playfair Cipher Using Modified Blum Blum Shub Algorithm and Keystream Values
Abstract
The Playfair cipher operates as a symmetric en-cryption method, simultanously encrypting pairs of letters. This research aims to enhance the Playfair cipher’s secu...
KOMBINASI ALGORITMA ONE TIME PAD CIPHER DAN ALGORITMA BLUM BLUM SHUB DALAM PENGAMANAN FILE
KOMBINASI ALGORITMA ONE TIME PAD CIPHER DAN ALGORITMA BLUM BLUM SHUB DALAM PENGAMANAN FILE
Kriptografi adalah ilmu menyamarkan pesan sehingga hanya dikenal oleh pengirim dan penerima. Salah satu algoritma yang cukup aman dan sulit untuk memecahkan adalah algoritma one-t...
Esfir Shub
Esfir Shub
An unsurpassed master of compilation cinema, Esfir Shub is a major figure in the history of Soviet film. Shub's concept of film editing emerges clearly in the four articles that ar...
Notary Deed Security Application Using RC4 Method on Android-Based
Notary Deed Security Application Using RC4 Method on Android-Based
In the digital era, security concerns related to notary deeds can arise due to several factors, particularly in safeguarding important documents. Without a secure application, thes...
Improve The Security of The Vigenère Cypher Algorithm by Modifying the Encoding Table and Key
Improve The Security of The Vigenère Cypher Algorithm by Modifying the Encoding Table and Key
This investigation was conducted to move forward the security of the vigenère cypher calculation by tending to the key conveyance issue and the most key issue within the calculatio...
Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci
Perbandingan Penggunaan Bilangan Prima Aman Dan Tidak Aman Pada Proses Pembentukan Kunci
Algoritma ElGamal merupakan algoritma dalam kriptografi yang termasuk dalam kategori algoritma asimetris. Keamanan algoritma ElGamal terletak pada kesulitan penghitungan logaritma ...
André Gide & Léon Blum
André Gide & Léon Blum
Née sur les bancs du lycée Henri IV à l’automne 1888, l’amitié entre André Gide et Léon Blum s’épanouit, malgré la différence de leurs origines et de leurs parcours scolaires, grâc...
The Blum-Blum-Shub Pseudorandom Generator
The Blum-Blum-Shub Pseudorandom Generator
Problem: Design a random number generator that is computationally indistinguishable from a truly random number generator. Solution (in Python): note this solution uses the Miller-R...

