VHDL Execution for a Virtual Random Integer Producer Created on Camp Chart

International Journal of VLSI & Signal Processing
© 2018 by SSRG - IJVSP Journal
Volume 5 Issue 1
Year of Publication : 2018
Authors : Sherzad and Stefan
pdf
How to Cite?

Sherzad and Stefan, "VHDL Execution for a Virtual Random Integer Producer Created on Camp Chart," SSRG International Journal of VLSI & Signal Processing, vol. 5,  no. 1, pp. 5-9, 2018. Crossref, https://doi.org/10.14445/23942584/IJVSP-V5I1P102

Abstract:

Virtual random amounts are used for numerous suggests everywhere consistency data is favorite. For producing them, there are some valuable approaches, response shift records and dynamical meanings are most shared approaches. Among dynamical meanings, one dimensional disordered map is the humblest ones. The tent map is a piecewise-linear one dimensional map that has been used to produce virtual random amounts. Its accurate explanation formerly was surrounded from zero to one, so a modification was desirable for protective to digital application. After regulating has remained complete, some dynamical testes were practical to confirm if regulating did not disturb its operative. The following phase was to contrivance the map using VHDL; such execution was replicated and approved using a Mat lab cursive.

Keywords:

Brief, it was attained a technique for informal generation of virtual random amounts.

References:

[1] Susan Hohenberger, Venkata Koppula and Brent Waters, Adaptively Secure Puncturable Pseudorandom Functions in the Standard Model, (2014) IACR Cryptology ePrint Archive, Volume 2014, p 521.
[2] Dennis Hofheinz, Akshay Kamath Venkata Koppula and Brent Waters, Adaptively Secure Constrained Pseudorandom Functions , (2014) IACR Cryptology ePrint Archive, Volume 2014, p720.
[3] Suvajit Dutta, Tanumay Das, Sharad Jash, Debasish Patra and Pranam Paul, A Cryptography Algorithm Using the Operations of Genetic Algorithm & Pseudo Random Sequence Generating Functions, (2014) International Journal of Advances in Computer Science and Technology, Volume 3, No 5, pp 325- 330.
[4] Ming Li and Dongdai Lin, A Class of FSRs and Their Adjacency Graphs, (2014) IACR Cryptology ePrint Archive, Volume 2014, p 658.
[5] Ricardo Francisco Martinez-Gonzalez and Jose Alejandro Diaz-Mendez, Implementation of a Stream Cipher Based on Bernoulli’s Map, (2014) International Journal of Computer Science & Information Technology, Vol 6 No 6, pp. 113-121.
[6] Guang Zeng, Wenbao Han and Kaicheng He, High Efficiency Feedback Shift Register: sigma-LFSR, (2007) IACR Cryptology ePrint Archive, Volume 2007, p. 114.
[7] Navin Rajpal, Anil Kumar, Sureka Dudhani and Pravesh Raja Jindal, Copyright Protection Using Non-Linear Forward Feedback Shift Register and Error-correction Technique, (2004) 7th Annual International Conference Map India, New Delhi, India.
[8] Yongbin Zhao, Yupu Hu and Shunbo Li, A New Analysis Method for Nonlinear Component of Stream Cipher, (2013) Journal of Information & Computational Science, Vol 10 No 16, pp. 5313-5321.
[9] S. Ramahrishnan, B. Elakkiya, R. Geetha and P Vasuki, Image Encryption Using Chaotic Maps in Hybrid Domain, (2014) International Journal of Communication and Computer Technologies, Volume 2 No 13 Issue 5, pp 44-48.
[10] Chai Wah Wu and Nikolai F. Rulkov, Studying Chaos via 1-D Maps – A Tutorial, (1993) IEEE Transactions on Circuits and Systems: Fundamental, Theory and Applications, Vol 40 No 10, pp 707-721.