WIRED++WVSU Institutional Repository and Electronic Dissertation and Theses PLUS
    • English
    • Filipino
    • Deutsch
    • русский
  • English 
    • English
    • Filipino
    • Deutsch
    • русский
  • Login
View Item 
  •   WIRED++ Home
  • WVSU External Publications
  • Conference Papers
  • View Item
  •   WIRED++ Home
  • WVSU External Publications
  • Conference Papers
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Analysis of key randomness in improved one-time pad cryptography

Thumbnail
View/Open
PUB-CPR-L-2019-ManucomEMM-FLT.pdf (2.013Mb)
Date
2019-12-09
Author
Manucom, Emraida Marie M.
Gerardo, Bobby D. ORCID
Medina, Ruji P. ORCID
Metadata
Show full item record


Share 
 
Abstract
In cryptography, one-time pad (OTP) is claimed to be the perfect secrecy algorithm in several works if all of its features are applied correctly. Its secrecy depends mostly on random keys, which must be truly random and unpredictable. Random number generators are used in key generation. In Psuedo Random Number Generator (PRNG), the possibility of producing numbers that are predictable and repeated exists. In this study, a proposed method using True Random Number Generator (TRNG) and Fisher-Yates shuffling algorithm are implemented to generate random keys for OTP. Frequency (monobit) test, frequency test within a block, and runs tests are performed and showed that the proposed method produces more random keys. Sufficient confusion and diffusion properties are obtained using Pearson correlation analysis.
URI
https://hdl.handle.net/20.500.14353/598
Recommended Citation
Manucom, E. M. M., Gerardo, B. D., & Medina, R. P. (2019, October). Analysis of key randomness in improved one-time pad cryptography. In 2019 IEEE 13th International Conference on Anti-counterfeiting, Security, and Identification (ASID) (pp. 11-16). IEEE. https://doi.org/10.1109/ICASID.2019.8925173
DOI
10.1109/ICASID.2019.8925173
Type
Conference paper
ISSN
2163-5048; 2163-5056
ISBN
978-1-7281-2458-2
Keywords
Cryptography Fisher-Yates algorithm One-time pad Random keys Random numbers Shuffling algorithm OTP True random number generator Pseudo random number generator Encryption algorithm
Subject
Computer algorithms OCLC - FAST (Faceted Application of Subject Terminology) Cryptography--Data processing OCLC - FAST (Faceted Application of Subject Terminology) Cryptography OCLC - FAST (Faceted Application of Subject Terminology) Numbers, Random OCLC - FAST (Faceted Application of Subject Terminology) Number theory OCLC - FAST (Faceted Application of Subject Terminology) Random number generators OCLC - FAST (Faceted Application of Subject Terminology)
Collections
  • Conference Papers [14]

Related items

Showing items related by title, author, creator and subject.

  • Thumbnail

    The performance of Blum-Blum-Shub elliptic curve pseudorandom number generator as WiFi protected access 2 security key generator 

    Omorog, Challiz D. ORCID; Gerardo, Bobby D. ORCID; Medina, Ruji P. ORCID (Association for Computing Machinery, 2018-09-20)
    WiFi Protected Access 2 (WPA2) is considered the most secure network security protocol in wireless routers, despite the discovery of partial key exposure vulnerability. In light of, an experiment was conducted to investigate ...
  • Thumbnail

    The Philippine party-list system and representation of marginalized populations 

    Bionat, Justin Francis (College of Law, West Visayas State University, 2021)
    The Party-list system is a unique aspect of the Philippine political system; a political battleground designed to ensure a representative democracy that allows for ample and proportional representation of marginalized ...
  • Thumbnail

    Differentiated instruction and performance in numeracy skills of kindergartners 

    Casalmer, Glycer E. (West Visayas State University, 2018-04)
    This quasi-experimental study was an attempt to determine the use of Differentiated Instruction in determining the performance of kindergartners in their numeracy skills using the quasi-experimental method. The participants ...

© 2025 University Learning Resource Center | WVSU
Contact Us | Send Feedback
 

 

Browse

All of WIRED++Communities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

LoginRegister

Statistics

View Usage Statistics

© 2025 University Learning Resource Center | WVSU
Contact Us | Send Feedback
 

 

EXTERNAL LINKS DISCLAIMER

This link is being provided as a convenience and for informational purposes only. West Visayas State University bears no responsibility for the accuracy, legality or content of the external site or for that of subsequent links. Contact the external site for answers to questions regarding its content.

If you come across any external links that don't work, we would be grateful if you could report them to the repository administrators.

Click DOWNLOAD to open/view the file. Chat Graciano to inform us in case the link we provided don't work.

Download