Key generator
This article needs additional citations for verification. (September 2010) |
A key generatorpseudo-random characteristics. This sequence is used as an encryption key at one end of communication, and as a decryption key at the other. One can implement a key generator in a system that aims to generate, distribute, and authenticate[4] keys in a way that without the private key, one cannot access the information in the public end.[5]
Examples of key generators include linear-feedback shift registers (LFSR) and the Solitaire (or Pontifex) cipher.
References
- ^ "Generating Keys for Encryption and Decryption | Microsoft Docs".
- ^ "Symmetric Key Cryptography Using Random Key Generator". Retrieved 2022-04-04.
- S2CID 207976370.
- S2CID 5447745.
- ^ Fox, Pamela. "Public key encryption". Khan Academy. Retrieved May 19, 2021.