Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Key generator
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{Short description|Algorithm used in cryptographic protocols}} {{For|programs which generate software license keys|Keygen}} {{More references|date=September 2010}} A '''key generator'''<ref name="urlGenerating Keys for Encryption and Decryption | Microsoft Docs">{{cite web |url=https://docs.microsoft.com/en-us/dotnet/standard/security/generating-keys-for-encryption-and-decryption |title=Generating Keys for Encryption and Decryption | Microsoft Docs |accessdate=}}</ref><ref>{{cite web|url=https://www.researchgate.net/publication/221199745 |title=Symmetric Key Cryptography Using Random Key Generator |date= |accessdate=2022-04-04}}</ref><ref>{{cite journal|url=https://ijsrset.com/IJSRSET196550|title=Subject Review : Key Generation in Different Cryptography Algorithm |year=2019 |doi=10.32628/IJSRSET196550|last1=Abdalrdha |first1=Zainab Khyioon |last2=Al-Qinani |first2=Iman Hussein |last3=Abbas |first3=Farah Neamah |journal=International Journal of Scientific Research in Science, Engineering and Technology |pages=230β240 |s2cid=207976370 |doi-access=free }}</ref> is a protocol or algorithm that is used in many [[cryptography|cryptographic]] [[Protocol (computing)|protocol]]s to generate a sequence with many [[pseudo-random]] characteristics. This sequence is used as an [[encryption]] key at one end of communication, and as a decryption key at the other. One can implement a key generator in a system that aims to generate, distribute, and authenticate<ref>{{Cite book|last1=Bellare|first1=Mihir|last2=Rogaway|first2=Phillip|title=Advances in Cryptology β CRYPTO' 93 |chapter=Entity Authentication and Key Distribution |series=Lecture Notes in Computer Science |date=August 1993|volume=773 |pages=232β249 |citeseerx=10.1.1.62.3423|doi=10.1007/3-540-48329-2_21|isbn=978-3-540-57766-9 |s2cid=5447745 }}</ref> keys in a way that without the private key, one cannot access the information in the public end.<ref>{{cite web|last=Fox|first=Pamela|title=Public key encryption|url=https://www.khanacademy.org/computing/computers-and-internet/xcae6f4a7ff015e7d:online-data-security/xcae6f4a7ff015e7d:data-encryption-techniques/a/public-key-encryption|access-date=May 19, 2021|website=Khan Academy}}</ref> Examples of key generators include [[linear-feedback shift register]]s (LFSR) and the [[Solitaire (cipher)|Solitaire]] (or Pontifex) cipher. ==References== [[Category:Key management]] <references /> {{crypto-stub}}
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)
Pages transcluded onto the current version of this page
(
help
)
:
Template:Asbox
(
edit
)
Template:Cite book
(
edit
)
Template:Cite journal
(
edit
)
Template:Cite web
(
edit
)
Template:Crypto-stub
(
edit
)
Template:For
(
edit
)
Template:More references
(
edit
)
Template:Short description
(
edit
)