SlideShare a Scribd company logo
International Journal of Electronics and JOURNALEngineering & Technology (IJECET), ISSN 0976 –
INTERNATIONAL Communication OF ELECTRONICS AND
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET)

ISSN 0976 – 6464(Print)
ISSN 0976 – 6472(Online)
Volume 5, Issue 2, February (2014), pp. 21-29
© IAEME: www.iaeme.com/ijecet.asp
Journal Impact Factor (2014): 3.7215 (Calculated by GISI)
www.jifactor.com

IJECET
©IAEME

GENERATION OF CRYPTOGRAPHICALLY SECURED PSEUDO RANDOM
NUMBERS USING FPGA
Thottempudi Pardhu(1), Thottempudi Naga Teja(2),

K.N.Bhushan(3),

N.Usha Rani(4)

1

Dept of E.C.E, Marri Laxman Reddy Institute of Technology & Management, Hyderabad, India
2
Dept of E.C.E, Vignan University, Vadlamudi, Guntur (Dist), Andhrapradesh, India
3
Dept of E.C.E, Marri Laxman Reddy Institute of Technology & Management, Hyderabad, India
4
Dept of E.C.E, Vignan University, Vadlamudi, Guntur (Dist), Andhrapradesh, India

ABSTRACT
Random numbers are used for many purposes like generating data encryption keys,
simulating and modeling complex phenomena and for selecting samples randomly from larger
datasets. They can also used in literature, music and popular for games and gambling. While
discussing about single numbers, a random number is one that is drawn from a set of possible values,
each of which is equally probable, i.e. uniform distribution. When we are discussing a sequence of
random numbers the number drawn must be statistically independent of the others. There are various
methods for the generation of Random numbers. There are two types of Random number generators
they are Pseudo random number Generator (PRNG) and True Random Number Generator (TRNG).
Numbers generated from True Random Number generator will not repeat and are Cryptographically
Secured. These are also known as cryptographically secured Pseudo random Numbers (CSPRNG).
The sources of Randomness in TRNG are physical phenomena like Lightning, Radio Active Decay,
and Thermal Noise etc. In this paper generation of Cryptographically Secured Pseudo Random
Numbers using Blum Blum Shub Generator is explained. It was implemented on Virtex-V FPGA
using VHDL Programming Language and the Simulation was done on XILINX ISE 12.4i.
Key words: CSPRNG, PRNG, Random Numbers, TRNG, XILINX.
1. INTRODUCTION
A random number generator (RNG) is a device designed to generate a sequence of numbers
or symbols that don‘t have any pattern. Hardware-based systems for random number generation are
widely used, but often fall short of this goal, albeit they may meet some of the statistical tests for
randomness for ensuring that they do not have any ―de-cod able‖ patterns. Methods for generating
21
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

random results have existed since ancient times, including dice, coin flipping, the shuffling of
playing cards, the use of yarrow stalks and many other techniques. [2], [3].
The many applications of randomness have led to many different methods for generating
random data. These methods may vary as to how unpredictable or random they are, and how quickly
they can generate random numbers. [2], [3].
There are two principal methods used to generate random numbers. One measures some
physical phenomenon that is expected to be random and then compensates for possible biases in the
measurement process. The other uses mathematical algorithms that produce long sequences of
apparently random numbers, which are in fact completely determined by an initial value, known as a
seed. The former one is known as True Random Number Generator (TRNG). [2]
In comparison with PRNGs, TRNGs extract randomness from physical phenomena and
introduce it into a computer. One can imagine this as a die connected to a computer. The physical
phenomenon can be very simple, like the little variations in mouse movements or in the amount of
time between keystrokes. In practice, however, one has to be careful about which source one
chooses. For example, it can be tricky to use keystrokes in this fashion, because keystrokes are often
buffered by the computer's operating system, meaning that several keystrokes are collected before
they are sent to the program. To a program waiting for the keystrokes, it will seem as though the
keys were pressed almost simultaneously, and there may not be a lot of randomness there after all.
[4]
However, there are many other methods to get true randomness into your computer. A really
good physical phenomenon to use is a radioactive source. The points in time at which a radioactive
source decays are completely unpredictable, and they can easily be detected and fed into a computer,
avoiding any buffering mechanisms in the operating system. The HotBits service at Fourmilab in
Switzerland is an excellent example of a random number generator that uses this technique. Another
suitable physical phenomenon is atmospheric noise, which is quite easy to pick up with a normal
radio. This is the approach used by RANDOM.ORG. we could also use background noise from an
office or disco, but you'll have to watch out for patterns. The fan from the computer can contribute to
the noise, and since the fan is a rotating device, chances are the noise it produces won't be as random
as atmospheric noise. [4]
Undoubtedly one of the effective approaches was the lavarand generator, which was built by
Silicon Graphics and used snapshots of lava lamps to generate true random numbers. [4]
A pseudorandom number generator (PRNG),is an algorithm for generating a sequence of
numbers that approximates the properties of random numbers. The sequence is not truly random.
Although sequences that are closer to truly random can be generated using hardware random number
generators, pseudorandom numbers are important in practice for simulations (e.g., of physical
systems with the Monte Carlo method), and are important in the practice of cryptography. [5]
A PRNG can be started from an arbitrary starting state using a seed s. It will always produce
the same sequence thereafter when initialized with that state. The maximum length of the sequence
before it begins to repeat is determined by the size of the state. However, since the length of the
maximum period doubles with each bit of 'state' added, it is easy to build PRNGs with periods long
enough for many practical applications. [5]
Most pseudorandom generator algorithms produce sequences which are uniformly distributed
by any of several tests. The security of most cryptographic algorithms and protocols using PRNGs is
based on the assumption that it is infeasible to demarcate use of a suitable PRNG from the usage of a
truly random sequence. The simplest examples of this dependency are stream ciphers, which work by
exclusive or-ing the plaintext of a message with the output of a PRNG, producing cipher text. The
design of cryptographically secure PRNGs is extremely difficult; because they must meet additional
criteria .The size of its period is an important factor in the cryptographic suitability of a PRNG, but
not the only one. [5]
22
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

some of the algorithms generate pseudo random numbers [6]. Blum Blum Shub, Inversive
congruential generator, ISAAC (cipher), Lagged Fibonacci generator, Linear congruential generator,
Linear feedback shift register, Mersenne twister, Multiply-with-carry, Well Equidistributed Longperiod Linear, Xorshift
Cipher algorithms and cryptographic hashes can also be used as pseudorandom number
generators. These include [6] Block ciphers in counter mode, Cryptographic hash function in counter
mode, Stream Ciphers.
The organization of Paper is as follows. Section 1 gives introduction about Random numbers,
Section 2 deals with Generation of Random Numbers using LFSR, section 3 gives information about
generation of Random numbers using improved Tausworthe architecture, Section 4 explains the
project Implementation, Section 5 gives the Results, Section 6 concludes the paper.
2.

GENERATION OF RANDOM NUMBER USING LFSR :

Linear Feedback Shift Register (LFSR) as shown in Fig.1 is used to generate a random
number. LFSR is a shift register whose input bit is a linear function of its previous state. Thus, an
LFSR is most often a shift register whose input bit is driven by the exclusive-or (XOR) of some bits
of the overall shift register value. Any long LFSR counter generates a long pseudo-random sequence
of zeros and ones. The sequence is not exactly random since it repeats eventually, and it also follows
a mathematically predictable sequence. But for most practical purposes it can be considered random.
A 63-bit LFSR counter has a repetition time of (263-1) clock periods. Running at 50 MHz, such a
counter repeats after more than five thousand years (5,849 years to be more precise), which is long
enough to be irrelevant for most practical purposes. Based on the LFSR length different XNOR
feedback taps are required to generate a maximum-length random numbers. The XNOR feedback tap
points to some LFSR are shown in Table. 1
Table.1 : XNOR Tap points
No of bits in
LFSR

Bit positions for
XNOR tap points

3

3,2

4

4,3

5

5,3

6

6,5

7

7,6

8

8,6,5,4

9

9,5

10

10,7

16

16,15,13,4

32

32,22,12,1

64

64,63,61,60

128

128,126,101,99

23
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

Fig. 1: Random number generation using LFSR
Though LFSR is good for different applications for generating various patterns. Speed and
randomness existed with this pattern is less.
3. GENERATION OF RANDOM NUMBERS USING IMPROVED TAUSWORTHE ARCHI
TECTURE
To improve the randomness and the speed of sequence generation Tausworthe architecture is
used as shown in Figure.2. In this one p-bit long shift register with L -bit output somewhere
between the first and pth bit, and a two-input XOR element feeding the result to1 the first bit
would be required. Such architecture would be slow, because L clock cycles are needed to
update completely the output bit position which is as shown in Fig.2 as show below.
Using this improved architecture, the throughput can be increased to L times of the
conventional LFSR, where L indicates the output bit length.

Fig .2: Improved Tausworthe Generator Architecture

24
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

In this paper Tausworthe architecture is implemented using Xilinx ise 12.4v using VHDL.
The generated output is compared with the existing Box-Muller algorithm which is described below
for two random variables. Let r1and r2 be the uniform random variables belong to interval[0,1), x1
and x2 be the Gaussian distributed sequence with zero mean and unit variance. Then, the
generated sequences are in the form of Gaussian format, which are described by equation 1.
Gin(i) =ඥെ2݈‫ .1ܴ݃݋‬cos 2Π. ܴ2
Gqd(i) =ඥെ2݈‫ .1ܴ݃݋‬sin 2Π. ܴ2 ………………………………..

(1)

r1and r2 can be generated by the architecture illustrated in figure.2 [7]
4.

IMPLEMENTATION

4.1. Random number Generation
Random numbers can be generated by different methods like Linear Feedback Shift Register
(LFSR), Tausworthe architecture, Boxmuller technique etc. In this paper conventional pseudo
random sequence generation is implemented using conventional LFSR, Tausworthe architecture
and Box-Muller techniques are implemented. For proper sequence generation CORDIC IP core
is included with Tausworthe architecture and simulated. In this work Tauswothe architecture
is implemented in Xilinx ise 12.4 v and validated in chipscope pro. Fig.3 shows the VLSI
implementation of Tausworthe architecture.
HDL code is generated, simulated and synthesized using VHDL. Then .Bit file is generated
.It is dumped into FPGA. By adding .cdc file, code code is verified using Chipscope Pro.
4.2. Blum Blum Shub Generator
The Blum Blum Shub Generator is known to be the cryptographically secure pseudo random
number generator (CSPRNG).
The algorithm for BBS generator is as follows:
•

Select two big prime numbers p and q, such that both the numbers leave a remainder
of 3 when divided by 4.

•

Choose n = p * q

•

Choose seed s, such that s is relatively prime to n which means that neither p nor q is
a factor of s.

•

Xo= s2 mod n

•

The consequent values are generated according to the formula Xi = (Xi1)2mod n

•

A sequence of binary digits is produced according to the formula Bi= Ximod2
The output sequence is B1, B2, B3, B4………..

Now the BBS generator is first implemented in Turbo C++ as it is user friendly and easy to
comprehend.

25
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

start

HDL program

Synthesis

.bit file generation

Download into FPGA

.cdc file generation

Verification in chipscope

End

Fig 3: VLSI implementation of PRNG using Tausworthe Architecture
5. RESULTS
Implemented VHDL code of random number generation on Virtex-V FPGA.We used CODIC
IP and Chip scope Pro to analyze the design. Fig .4, Fig.5 represent the simulation result of CORDIC
IP,Validation Result of Random Number using ChipScope Pro.

Fig.4 : Simulation result of Random number using CORDIC IP
26
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

Fig.5: Validation result of Random number using Chipscope Pro
Fig.6, Fig.7 represents the Output of BBS Generator from Turbo C++, Technology Schematic
of BBS Generator.

Fig.6: Out put of BBS Generator from Turbo C++
The first column refers to the values of X generated and second column refers to Bi.

27
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

Fig.7: Technology Schematic of BBS Gennerator.
6. CONCLUSION
Various codes were written for generators like Pseudo Random Number Sequence Generator,
8 bit random generator using LFSR, 16 bit random generator and BlumBlum Shub generator. But
Blum Blum Shub generator was found to be the most cryptographically secure generator. BBS
generator was implemented in Turbo C++ and VHDL. Initially seed‗s‘ and inputs p, q were taken.
The inputs had to be two large prime numbers and relatively prime to s. Then mod function was
used to calculate the remainder and the square of the same was used as the dividend in the next
recursion. The syntax was found to be correct in case of VHDL but due to some hardware constraints
it could not be implemented in FPGA.
7. REFERENCES
[1]

C.Wei, C.He and H.Y.Qiu, “VLSI implementation of universal rand number generator,”
IEEE Trans. Very Large Scale Integr. (VLSI) Syst., pp. 465-470, 2002.
[2] http://en.wikipedia.org/wiki/Random_number_generation#cite_ref-0.
[3] http://en.wikipedia.org/wiki/Hardware_random_number_generator.
[4] http://www.random.org/randomness/.
[5] http://en.wikipedia.org/wiki/Pseudorandom_number_generator#cite_note-0.
[6] http://en.wikipedia.org/wiki/List_of_random_number_generators.
[7] D.U.Lee, J.D.Villasenor, W.Luk, P.H.W.Leong,” A hardware Gaussion noise generator
using Boxmuller method and its error analysis,” IEEE Trans. Com put., vol. 55, no. 6,
pp. 659-671, Jun. 2006.
[8] Thottempudi Pardhu, Usha Rani Nelakuditi, P.Suresh, “Novel Random Sequence Generation
And Validation Using FPGA”, ICCNASP 2013, V1, PP 295-298.
[9] http://en.wikipedia.org/wiki/Blum_Blum_Shub.
[10] Mala Mitra, “A Random Number Generator for RFID Tags”, International Journal of
Electronics and Communication Engineering & Technology (IJECET), Volume 1, Issue 1,
2010, pp. 71 - 87, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.

28
International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 –
6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME

AUTHOR’S PROFILE
T.Pardhu was born in Luxettipet village in Adilabad District. He completed
B.Tech in MLR Institute of Technology in the stream of Electronics and
Communications Engineering in 2011. He has done his Master’s degree
(M.Tech) in Embedded Systems from Vignan University, Vadlamudi in
2013.He has done Project in Research Centre IMARAT, Hyderabad as
Project Intern. He is Working as Assistant Professor in Marri Laxman
Reddy Institute of Technology & Management. His interested fields are
Digital signal processing, RADAR communications, Embedded systems,
implementation of signal processing on applications in FPGA.

T.Naga Teja was Born in Luxettipet village in Adilabad District. He
completed his B.Tech in Malla Reddy Institute of Technology in the stream
of Electronics and Communication Engineering in 2013. He qualified
GATE-2013. He is Pursuing his Master’s Degree (M.Tech) in VLSI in Vigan
University, Vadlamudi. His interested fields are FPGA implementation of
Signal and Image processing applications, VLSI.

K.N.Bhushan was born in Kancheruvu village in Nellore District. He
completed B.Tech in CMR College of Engineering and Technology in
the stream of Electronics and Communication Engineering in 2006. He
has done his Master’s Degree (M.Tech) in Digital Electronics and
Communication Systems in Jagruthi Institute of Engineering and
Technology, Hyderabad in 2011. He is working as HOD of E.C.E Department
in Marri Laxman Reddy Institute of Technology & Management. His
Interested Fields are Digital Signal Processing, Digital Image Processing,
VLSI.

UshaRani.Neelakuditi completed her B.tech in the stream of Electronics
&Instrumentation in KITS Warangal in 1993. She has done her Masters
Degree (M.Tech) in the Digital Electronics and Communication Systems in
2004 From JNTU Anatapur. She completed Her P.hd on Medical image
Registration of Brain with Tomographs. She is working as HOD of E.C.E
Department in Vignan University, Vadlamudi. Her Interested Fields are
implementation of Signal and image processing applications on FPGA.

29

More Related Content

What's hot

Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data ExfiltrationMind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Checkmarx
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
IJECEIAES
 
FPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace BufferFPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace Buffer
paperpublications3
 
Telecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsTelecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronights
P1Security
 
Ferns Presentation
Ferns PresentationFerns Presentation
Ferns Presentation
LangLin
 
Essential principles of jitter part 2 the components of jitter
Essential principles of jitter part 2 the components of jitterEssential principles of jitter part 2 the components of jitter
Essential principles of jitter part 2 the components of jitter
teledynelecroy
 
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
ijcseit
 

What's hot (7)

Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data ExfiltrationMind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
Mind the (Air)Gap: Checkmarx Research into NFC and Smart Bulb Data Exfiltration
 
Quantum cryptography for secured communication networks
Quantum cryptography for secured communication networksQuantum cryptography for secured communication networks
Quantum cryptography for secured communication networks
 
FPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace BufferFPGA Debug Using Incremental Trace Buffer
FPGA Debug Using Incremental Trace Buffer
 
Telecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronightsTelecom security from ss7 to all ip all-open-v3-zeronights
Telecom security from ss7 to all ip all-open-v3-zeronights
 
Ferns Presentation
Ferns PresentationFerns Presentation
Ferns Presentation
 
Essential principles of jitter part 2 the components of jitter
Essential principles of jitter part 2 the components of jitterEssential principles of jitter part 2 the components of jitter
Essential principles of jitter part 2 the components of jitter
 
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...Optimization of latency of temporal key Integrity protocol (tkip) using graph...
Optimization of latency of temporal key Integrity protocol (tkip) using graph...
 

Viewers also liked

40120130405006 2
40120130405006 240120130405006 2
40120130405006 2
IAEME Publication
 
40120140501018
4012014050101840120140501018
40120140501018
IAEME Publication
 
30120130406001
3012013040600130120130406001
30120130406001
IAEME Publication
 
30120140502001
3012014050200130120140502001
30120140502001
IAEME Publication
 
10120140404024
1012014040402410120140404024
10120140404024
IAEME Publication
 
50120140503002
5012014050300250120140503002
50120140503002
IAEME Publication
 
40120140501019
4012014050101940120140501019
40120140501019
IAEME Publication
 
10120140501008
1012014050100810120140501008
10120140501008
IAEME Publication
 

Viewers also liked (8)

40120130405006 2
40120130405006 240120130405006 2
40120130405006 2
 
40120140501018
4012014050101840120140501018
40120140501018
 
30120130406001
3012013040600130120130406001
30120130406001
 
30120140502001
3012014050200130120140502001
30120140502001
 
10120140404024
1012014040402410120140404024
10120140404024
 
50120140503002
5012014050300250120140503002
50120140503002
 
40120140501019
4012014050101940120140501019
40120140501019
 
10120140501008
1012014050100810120140501008
10120140501008
 

Similar to 40120140502003

[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K
[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K
[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K
IJET - International Journal of Engineering and Techniques
 
J45015460
J45015460J45015460
J45015460
IJERA Editor
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In Labview
IJERA Editor
 
Hd3512461252
Hd3512461252Hd3512461252
Hd3512461252
IJERA Editor
 
Fv2510671071
Fv2510671071Fv2510671071
Fv2510671071
IJERA Editor
 
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
IJECEIAES
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
TELKOMNIKA JOURNAL
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
Mazin Alwaaly
 
Intel Random Number Generator
Intel Random Number GeneratorIntel Random Number Generator
Intel Random Number Generator
XequeMateShannon
 
Generator of pseudorandom sequences
Generator of pseudorandom sequences Generator of pseudorandom sequences
Generator of pseudorandom sequences
Venkata Sai Kalyan Routhu
 
Random number generators
Random number generatorsRandom number generators
Random number generators
Bob Landstrom
 
Fpga Design Of Clutter Generator For Radar Testing
Fpga Design Of Clutter Generator For Radar TestingFpga Design Of Clutter Generator For Radar Testing
Fpga Design Of Clutter Generator For Radar Testing
csijjournal
 
Fpga design of clutter generator for radar testing
Fpga design of clutter generator for radar testingFpga design of clutter generator for radar testing
Fpga design of clutter generator for radar testing
csijjournal
 
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
IOSR Journals
 
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
IOSR Journals
 
Emmbeded .pdf
Emmbeded .pdfEmmbeded .pdf
Emmbeded .pdf
LeviIuo
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
IJERA Editor
 
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
IJNSA Journal
 
DSP Based Implementation of Scrambler for 56kbps Modem
DSP Based Implementation of Scrambler for 56kbps ModemDSP Based Implementation of Scrambler for 56kbps Modem
DSP Based Implementation of Scrambler for 56kbps Modem
CSCJournals
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
AM Publications
 

Similar to 40120140502003 (20)

[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K
[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K
[IJET V2I3P1] Authors: G Hemanth kumar Dr. M. Saravanan, Charan kumar. K
 
J45015460
J45015460J45015460
J45015460
 
Random Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In LabviewRandom Number Generator Using Seven Segment Display In Labview
Random Number Generator Using Seven Segment Display In Labview
 
Hd3512461252
Hd3512461252Hd3512461252
Hd3512461252
 
Fv2510671071
Fv2510671071Fv2510671071
Fv2510671071
 
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
FPGA-based Design System for a Two-Segment Fibonacci LFSR Random Number Gener...
 
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
The Quality of the New Generator Sequence Improvent to Spread the Color Syste...
 
Information and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipherInformation and data security pseudorandom number generation and stream cipher
Information and data security pseudorandom number generation and stream cipher
 
Intel Random Number Generator
Intel Random Number GeneratorIntel Random Number Generator
Intel Random Number Generator
 
Generator of pseudorandom sequences
Generator of pseudorandom sequences Generator of pseudorandom sequences
Generator of pseudorandom sequences
 
Random number generators
Random number generatorsRandom number generators
Random number generators
 
Fpga Design Of Clutter Generator For Radar Testing
Fpga Design Of Clutter Generator For Radar TestingFpga Design Of Clutter Generator For Radar Testing
Fpga Design Of Clutter Generator For Radar Testing
 
Fpga design of clutter generator for radar testing
Fpga design of clutter generator for radar testingFpga design of clutter generator for radar testing
Fpga design of clutter generator for radar testing
 
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
 
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
Implementation of XOR Based Pad Generation Mutual Authentication Protocol for...
 
Emmbeded .pdf
Emmbeded .pdfEmmbeded .pdf
Emmbeded .pdf
 
Pg3426762678
Pg3426762678Pg3426762678
Pg3426762678
 
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
PSEUDO RANDOM KEY GENERATOR USING FRACTAL BASED TRELLIS CODED GENETIC ALGORIT...
 
DSP Based Implementation of Scrambler for 56kbps Modem
DSP Based Implementation of Scrambler for 56kbps ModemDSP Based Implementation of Scrambler for 56kbps Modem
DSP Based Implementation of Scrambler for 56kbps Modem
 
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded SystemsA Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
 

More from IAEME Publication

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
 

More from IAEME Publication (20)

IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdfIAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
 
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
 
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURSA STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
 
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURSBROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
 
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONSDETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
 
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONSANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
 
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINOVOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
 
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
 
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMYVISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
 
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
 
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICEGANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
 
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
 
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
 
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
 
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
 
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
 
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
 
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
 
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
 
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENTA MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
 

Recently uploaded

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
DianaGray10
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
saastr
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Precisely
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Neo4j
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
Fwdays
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
Neo4j
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Neo4j
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
Jason Yip
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
MichaelKnudsen27
 

Recently uploaded (20)

What is an RPA CoE? Session 1 – CoE Vision
What is an RPA CoE?  Session 1 – CoE VisionWhat is an RPA CoE?  Session 1 – CoE Vision
What is an RPA CoE? Session 1 – CoE Vision
 
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
9 CEO's who hit $100m ARR Share Their Top Growth Tactics Nathan Latka, Founde...
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their MainframeDigital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
Digital Banking in the Cloud: How Citizens Bank Unlocked Their Mainframe
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Artificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic WarfareArtificial Intelligence and Electronic Warfare
Artificial Intelligence and Electronic Warfare
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and BioinformaticiansBiomedical Knowledge Graphs for Data Scientists and Bioinformaticians
Biomedical Knowledge Graphs for Data Scientists and Bioinformaticians
 
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk"Frontline Battles with DDoS: Best practices and Lessons Learned",  Igor Ivaniuk
"Frontline Battles with DDoS: Best practices and Lessons Learned", Igor Ivaniuk
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Leveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and StandardsLeveraging the Graph for Clinical Trials and Standards
Leveraging the Graph for Clinical Trials and Standards
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid ResearchHarnessing the Power of NLP and Knowledge Graphs for Opioid Research
Harnessing the Power of NLP and Knowledge Graphs for Opioid Research
 
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
[OReilly Superstream] Occupy the Space: A grassroots guide to engineering (an...
 
Nordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptxNordic Marketo Engage User Group_June 13_ 2024.pptx
Nordic Marketo Engage User Group_June 13_ 2024.pptx
 

40120140502003

  • 1. International Journal of Electronics and JOURNALEngineering & Technology (IJECET), ISSN 0976 – INTERNATIONAL Communication OF ELECTRONICS AND 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME COMMUNICATION ENGINEERING & TECHNOLOGY (IJECET) ISSN 0976 – 6464(Print) ISSN 0976 – 6472(Online) Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME: www.iaeme.com/ijecet.asp Journal Impact Factor (2014): 3.7215 (Calculated by GISI) www.jifactor.com IJECET ©IAEME GENERATION OF CRYPTOGRAPHICALLY SECURED PSEUDO RANDOM NUMBERS USING FPGA Thottempudi Pardhu(1), Thottempudi Naga Teja(2), K.N.Bhushan(3), N.Usha Rani(4) 1 Dept of E.C.E, Marri Laxman Reddy Institute of Technology & Management, Hyderabad, India 2 Dept of E.C.E, Vignan University, Vadlamudi, Guntur (Dist), Andhrapradesh, India 3 Dept of E.C.E, Marri Laxman Reddy Institute of Technology & Management, Hyderabad, India 4 Dept of E.C.E, Vignan University, Vadlamudi, Guntur (Dist), Andhrapradesh, India ABSTRACT Random numbers are used for many purposes like generating data encryption keys, simulating and modeling complex phenomena and for selecting samples randomly from larger datasets. They can also used in literature, music and popular for games and gambling. While discussing about single numbers, a random number is one that is drawn from a set of possible values, each of which is equally probable, i.e. uniform distribution. When we are discussing a sequence of random numbers the number drawn must be statistically independent of the others. There are various methods for the generation of Random numbers. There are two types of Random number generators they are Pseudo random number Generator (PRNG) and True Random Number Generator (TRNG). Numbers generated from True Random Number generator will not repeat and are Cryptographically Secured. These are also known as cryptographically secured Pseudo random Numbers (CSPRNG). The sources of Randomness in TRNG are physical phenomena like Lightning, Radio Active Decay, and Thermal Noise etc. In this paper generation of Cryptographically Secured Pseudo Random Numbers using Blum Blum Shub Generator is explained. It was implemented on Virtex-V FPGA using VHDL Programming Language and the Simulation was done on XILINX ISE 12.4i. Key words: CSPRNG, PRNG, Random Numbers, TRNG, XILINX. 1. INTRODUCTION A random number generator (RNG) is a device designed to generate a sequence of numbers or symbols that don‘t have any pattern. Hardware-based systems for random number generation are widely used, but often fall short of this goal, albeit they may meet some of the statistical tests for randomness for ensuring that they do not have any ―de-cod able‖ patterns. Methods for generating 21
  • 2. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME random results have existed since ancient times, including dice, coin flipping, the shuffling of playing cards, the use of yarrow stalks and many other techniques. [2], [3]. The many applications of randomness have led to many different methods for generating random data. These methods may vary as to how unpredictable or random they are, and how quickly they can generate random numbers. [2], [3]. There are two principal methods used to generate random numbers. One measures some physical phenomenon that is expected to be random and then compensates for possible biases in the measurement process. The other uses mathematical algorithms that produce long sequences of apparently random numbers, which are in fact completely determined by an initial value, known as a seed. The former one is known as True Random Number Generator (TRNG). [2] In comparison with PRNGs, TRNGs extract randomness from physical phenomena and introduce it into a computer. One can imagine this as a die connected to a computer. The physical phenomenon can be very simple, like the little variations in mouse movements or in the amount of time between keystrokes. In practice, however, one has to be careful about which source one chooses. For example, it can be tricky to use keystrokes in this fashion, because keystrokes are often buffered by the computer's operating system, meaning that several keystrokes are collected before they are sent to the program. To a program waiting for the keystrokes, it will seem as though the keys were pressed almost simultaneously, and there may not be a lot of randomness there after all. [4] However, there are many other methods to get true randomness into your computer. A really good physical phenomenon to use is a radioactive source. The points in time at which a radioactive source decays are completely unpredictable, and they can easily be detected and fed into a computer, avoiding any buffering mechanisms in the operating system. The HotBits service at Fourmilab in Switzerland is an excellent example of a random number generator that uses this technique. Another suitable physical phenomenon is atmospheric noise, which is quite easy to pick up with a normal radio. This is the approach used by RANDOM.ORG. we could also use background noise from an office or disco, but you'll have to watch out for patterns. The fan from the computer can contribute to the noise, and since the fan is a rotating device, chances are the noise it produces won't be as random as atmospheric noise. [4] Undoubtedly one of the effective approaches was the lavarand generator, which was built by Silicon Graphics and used snapshots of lava lamps to generate true random numbers. [4] A pseudorandom number generator (PRNG),is an algorithm for generating a sequence of numbers that approximates the properties of random numbers. The sequence is not truly random. Although sequences that are closer to truly random can be generated using hardware random number generators, pseudorandom numbers are important in practice for simulations (e.g., of physical systems with the Monte Carlo method), and are important in the practice of cryptography. [5] A PRNG can be started from an arbitrary starting state using a seed s. It will always produce the same sequence thereafter when initialized with that state. The maximum length of the sequence before it begins to repeat is determined by the size of the state. However, since the length of the maximum period doubles with each bit of 'state' added, it is easy to build PRNGs with periods long enough for many practical applications. [5] Most pseudorandom generator algorithms produce sequences which are uniformly distributed by any of several tests. The security of most cryptographic algorithms and protocols using PRNGs is based on the assumption that it is infeasible to demarcate use of a suitable PRNG from the usage of a truly random sequence. The simplest examples of this dependency are stream ciphers, which work by exclusive or-ing the plaintext of a message with the output of a PRNG, producing cipher text. The design of cryptographically secure PRNGs is extremely difficult; because they must meet additional criteria .The size of its period is an important factor in the cryptographic suitability of a PRNG, but not the only one. [5] 22
  • 3. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME some of the algorithms generate pseudo random numbers [6]. Blum Blum Shub, Inversive congruential generator, ISAAC (cipher), Lagged Fibonacci generator, Linear congruential generator, Linear feedback shift register, Mersenne twister, Multiply-with-carry, Well Equidistributed Longperiod Linear, Xorshift Cipher algorithms and cryptographic hashes can also be used as pseudorandom number generators. These include [6] Block ciphers in counter mode, Cryptographic hash function in counter mode, Stream Ciphers. The organization of Paper is as follows. Section 1 gives introduction about Random numbers, Section 2 deals with Generation of Random Numbers using LFSR, section 3 gives information about generation of Random numbers using improved Tausworthe architecture, Section 4 explains the project Implementation, Section 5 gives the Results, Section 6 concludes the paper. 2. GENERATION OF RANDOM NUMBER USING LFSR : Linear Feedback Shift Register (LFSR) as shown in Fig.1 is used to generate a random number. LFSR is a shift register whose input bit is a linear function of its previous state. Thus, an LFSR is most often a shift register whose input bit is driven by the exclusive-or (XOR) of some bits of the overall shift register value. Any long LFSR counter generates a long pseudo-random sequence of zeros and ones. The sequence is not exactly random since it repeats eventually, and it also follows a mathematically predictable sequence. But for most practical purposes it can be considered random. A 63-bit LFSR counter has a repetition time of (263-1) clock periods. Running at 50 MHz, such a counter repeats after more than five thousand years (5,849 years to be more precise), which is long enough to be irrelevant for most practical purposes. Based on the LFSR length different XNOR feedback taps are required to generate a maximum-length random numbers. The XNOR feedback tap points to some LFSR are shown in Table. 1 Table.1 : XNOR Tap points No of bits in LFSR Bit positions for XNOR tap points 3 3,2 4 4,3 5 5,3 6 6,5 7 7,6 8 8,6,5,4 9 9,5 10 10,7 16 16,15,13,4 32 32,22,12,1 64 64,63,61,60 128 128,126,101,99 23
  • 4. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME Fig. 1: Random number generation using LFSR Though LFSR is good for different applications for generating various patterns. Speed and randomness existed with this pattern is less. 3. GENERATION OF RANDOM NUMBERS USING IMPROVED TAUSWORTHE ARCHI TECTURE To improve the randomness and the speed of sequence generation Tausworthe architecture is used as shown in Figure.2. In this one p-bit long shift register with L -bit output somewhere between the first and pth bit, and a two-input XOR element feeding the result to1 the first bit would be required. Such architecture would be slow, because L clock cycles are needed to update completely the output bit position which is as shown in Fig.2 as show below. Using this improved architecture, the throughput can be increased to L times of the conventional LFSR, where L indicates the output bit length. Fig .2: Improved Tausworthe Generator Architecture 24
  • 5. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME In this paper Tausworthe architecture is implemented using Xilinx ise 12.4v using VHDL. The generated output is compared with the existing Box-Muller algorithm which is described below for two random variables. Let r1and r2 be the uniform random variables belong to interval[0,1), x1 and x2 be the Gaussian distributed sequence with zero mean and unit variance. Then, the generated sequences are in the form of Gaussian format, which are described by equation 1. Gin(i) =ඥെ2݈‫ .1ܴ݃݋‬cos 2Π. ܴ2 Gqd(i) =ඥെ2݈‫ .1ܴ݃݋‬sin 2Π. ܴ2 ……………………………….. (1) r1and r2 can be generated by the architecture illustrated in figure.2 [7] 4. IMPLEMENTATION 4.1. Random number Generation Random numbers can be generated by different methods like Linear Feedback Shift Register (LFSR), Tausworthe architecture, Boxmuller technique etc. In this paper conventional pseudo random sequence generation is implemented using conventional LFSR, Tausworthe architecture and Box-Muller techniques are implemented. For proper sequence generation CORDIC IP core is included with Tausworthe architecture and simulated. In this work Tauswothe architecture is implemented in Xilinx ise 12.4 v and validated in chipscope pro. Fig.3 shows the VLSI implementation of Tausworthe architecture. HDL code is generated, simulated and synthesized using VHDL. Then .Bit file is generated .It is dumped into FPGA. By adding .cdc file, code code is verified using Chipscope Pro. 4.2. Blum Blum Shub Generator The Blum Blum Shub Generator is known to be the cryptographically secure pseudo random number generator (CSPRNG). The algorithm for BBS generator is as follows: • Select two big prime numbers p and q, such that both the numbers leave a remainder of 3 when divided by 4. • Choose n = p * q • Choose seed s, such that s is relatively prime to n which means that neither p nor q is a factor of s. • Xo= s2 mod n • The consequent values are generated according to the formula Xi = (Xi1)2mod n • A sequence of binary digits is produced according to the formula Bi= Ximod2 The output sequence is B1, B2, B3, B4……….. Now the BBS generator is first implemented in Turbo C++ as it is user friendly and easy to comprehend. 25
  • 6. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME start HDL program Synthesis .bit file generation Download into FPGA .cdc file generation Verification in chipscope End Fig 3: VLSI implementation of PRNG using Tausworthe Architecture 5. RESULTS Implemented VHDL code of random number generation on Virtex-V FPGA.We used CODIC IP and Chip scope Pro to analyze the design. Fig .4, Fig.5 represent the simulation result of CORDIC IP,Validation Result of Random Number using ChipScope Pro. Fig.4 : Simulation result of Random number using CORDIC IP 26
  • 7. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME Fig.5: Validation result of Random number using Chipscope Pro Fig.6, Fig.7 represents the Output of BBS Generator from Turbo C++, Technology Schematic of BBS Generator. Fig.6: Out put of BBS Generator from Turbo C++ The first column refers to the values of X generated and second column refers to Bi. 27
  • 8. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME Fig.7: Technology Schematic of BBS Gennerator. 6. CONCLUSION Various codes were written for generators like Pseudo Random Number Sequence Generator, 8 bit random generator using LFSR, 16 bit random generator and BlumBlum Shub generator. But Blum Blum Shub generator was found to be the most cryptographically secure generator. BBS generator was implemented in Turbo C++ and VHDL. Initially seed‗s‘ and inputs p, q were taken. The inputs had to be two large prime numbers and relatively prime to s. Then mod function was used to calculate the remainder and the square of the same was used as the dividend in the next recursion. The syntax was found to be correct in case of VHDL but due to some hardware constraints it could not be implemented in FPGA. 7. REFERENCES [1] C.Wei, C.He and H.Y.Qiu, “VLSI implementation of universal rand number generator,” IEEE Trans. Very Large Scale Integr. (VLSI) Syst., pp. 465-470, 2002. [2] http://en.wikipedia.org/wiki/Random_number_generation#cite_ref-0. [3] http://en.wikipedia.org/wiki/Hardware_random_number_generator. [4] http://www.random.org/randomness/. [5] http://en.wikipedia.org/wiki/Pseudorandom_number_generator#cite_note-0. [6] http://en.wikipedia.org/wiki/List_of_random_number_generators. [7] D.U.Lee, J.D.Villasenor, W.Luk, P.H.W.Leong,” A hardware Gaussion noise generator using Boxmuller method and its error analysis,” IEEE Trans. Com put., vol. 55, no. 6, pp. 659-671, Jun. 2006. [8] Thottempudi Pardhu, Usha Rani Nelakuditi, P.Suresh, “Novel Random Sequence Generation And Validation Using FPGA”, ICCNASP 2013, V1, PP 295-298. [9] http://en.wikipedia.org/wiki/Blum_Blum_Shub. [10] Mala Mitra, “A Random Number Generator for RFID Tags”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 1, Issue 1, 2010, pp. 71 - 87, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472. 28
  • 9. International Journal of Electronics and Communication Engineering & Technology (IJECET), ISSN 0976 – 6464(Print), ISSN 0976 – 6472(Online), Volume 5, Issue 2, February (2014), pp. 21-29 © IAEME AUTHOR’S PROFILE T.Pardhu was born in Luxettipet village in Adilabad District. He completed B.Tech in MLR Institute of Technology in the stream of Electronics and Communications Engineering in 2011. He has done his Master’s degree (M.Tech) in Embedded Systems from Vignan University, Vadlamudi in 2013.He has done Project in Research Centre IMARAT, Hyderabad as Project Intern. He is Working as Assistant Professor in Marri Laxman Reddy Institute of Technology & Management. His interested fields are Digital signal processing, RADAR communications, Embedded systems, implementation of signal processing on applications in FPGA. T.Naga Teja was Born in Luxettipet village in Adilabad District. He completed his B.Tech in Malla Reddy Institute of Technology in the stream of Electronics and Communication Engineering in 2013. He qualified GATE-2013. He is Pursuing his Master’s Degree (M.Tech) in VLSI in Vigan University, Vadlamudi. His interested fields are FPGA implementation of Signal and Image processing applications, VLSI. K.N.Bhushan was born in Kancheruvu village in Nellore District. He completed B.Tech in CMR College of Engineering and Technology in the stream of Electronics and Communication Engineering in 2006. He has done his Master’s Degree (M.Tech) in Digital Electronics and Communication Systems in Jagruthi Institute of Engineering and Technology, Hyderabad in 2011. He is working as HOD of E.C.E Department in Marri Laxman Reddy Institute of Technology & Management. His Interested Fields are Digital Signal Processing, Digital Image Processing, VLSI. UshaRani.Neelakuditi completed her B.tech in the stream of Electronics &Instrumentation in KITS Warangal in 1993. She has done her Masters Degree (M.Tech) in the Digital Electronics and Communication Systems in 2004 From JNTU Anatapur. She completed Her P.hd on Medical image Registration of Brain with Tomographs. She is working as HOD of E.C.E Department in Vignan University, Vadlamudi. Her Interested Fields are implementation of Signal and image processing applications on FPGA. 29