Thursday, November 23, 2006

Introduction (revised)

Note from Jati

Pseudo Random Number Generator

Chaos theory has been established since 1970s by many different research areas, such as physics, mathematics, biology and chemistry, etc. [ give an example here] The most well-known characteristics of chaos is pseudo-randomness generated by deterministic equations. Randomness is a very useful resource, and nowhere more than in cryptographic applications. Randomness is essential for secret keys, and inadequate source of randomness can compromise the strongest cryptographic protocol. [example of the application] However, the reality is that procedures for obtaining random bits (called pseudo-random generators) are often not designed as well as they could have been. This is unfortunate since a security flaw in this procedure translates into a security flaw in the whole system. Also, if this procedure does not have a rigorous security proof then there is no hope for such a proof for the whole system.

[A very good introduction; you have to give example of the use in real life]

Random numbers are heavily used in cryptography. Session keys, initialization vectors (IV), unique parameters in digital signature operations, are assumed to be random by cryptographer. What random means here is the numbers generated by system are hard to be predicted by an attacker. [example of the application] Unfortunately, in practice, it is very difficult to get pure random numbers. Many cryptographic applications don't have a reliable source of real random bits. So, a cryptographic mechanism called a Pseudo-Random Number Generator (PRNG) is used to generate these numbers. The numbers are said to be Pseudo-Random because they are produced by some mathematical formulas and so periodically repeat themselves. A well-defined Pseudo-Random Number Generator - used for cryptography application - is called Cryptographically Secure Pseudo-Random Number Generator. It should statistically has good characteristic and endure all serious attacks. [example of the application]

Things that will be explained in this paper :

• Requirement for PRNG

• Implementation of Old PRNG Algorithm

• Implementation of Modern PRNG Algorithm

• Cryptanalytic Attacks on Real-World PRNG

Author:

13504060 dani

13504080 stevens jethefer

General note;

You need to give examples for the explanation so that the reader get clearer picture.



Chaos theory has been established since 1970s by many different research areas, such as physics, mathematics, biology and chemistry, etc. The most well-known characteristics of chaos is pseudo-randomness generated by deterministic equations. Randomness is a very useful resource, and nowhere more than in cryptographic applications. Randomness is essential for secret keys, and inadequate source of randomness can compromise the strongest cryptographic protocol. However, the reality is that procedures for obtaining random bits (called pseudo-random generators) are often not designed as well as they could have been. This is unfortunate since a security flaw in this procedure translates into a security flaw in the whole system. Also, if this procedure does not have a rigorous security proof then there is no hope for such a proof for the whole system.

Random numbers are heavily used in cryptography. Session keys, initialization vectors (IV), unique parameters in digital signature operations, are assumed to be random by cryptographer. What random means here is the numbers generated by system are hard to be predicted by an attacker. Unfortunately, in practice, it is very difficult to get pure random numbers. Many cryptographic applications don't have a reliable source of real random bits. So, a cryptographic mechanism called a Pseudo-Random Number Generator (PRNG) is used to generate these numbers. The numbers are said to be Pseudo-Random because they are produced by some mathematical formulas and so periodically repeat themselves. A well-defined Pseudo-Random Number Generator - used for cryptography application - is called Cryptographically Secure Pseudo-Random Number Generator. It should statistically has good characteristic and endure all serious attacks.

Things that will be explained in this paper :

• Requirement for PRNG

• Implementation of Old PRNG Algorithm

• Implementation of Modern PRNG Algorithm

• Cryptanalytic Attacks on Real-World PRNG

Author:

13504060 dani

13504080 stevens jethefer

Tuesday, November 21, 2006

Integrated Home Security System:Make Your Home As Secure As A Bank, Not A Jail

Your title is good.

Nowadays, by the advancement of architectural study, houses can be built in various design. However, the basic purpose of a house remains the same, it is to provide some shelter for its occupant. Along the ages, that need of protection has evolved into a more complex requirement of security.
People no longer care for protection from natural evidences such as rains, stroms, and wild animals only, but also demand some measure of protection of theft and other human-related incidents. Some people cover this need by hiring some guards to watch for their house. Despite its effectiveness, this kind of solution is basically inefficient. [ these sentences are not necessary, ' I know you know so what?'. It is better for you to write the latest trend of housing security demands in the modern world, big cities, etc, so that you can link the idea of modern and sophisticated system smoothly. Even you can predict what will be needed in a modern life etc. You need to write down 'what is or are the need(s) for home security']. To answer this need of efficient solution, a techonogical-based integrated home security system is therefore proposed.
Integrated home security system is a complex system that able to manage entire electricity system (lamps, airconditioner, gateway, generator, etc), monitor entire house without pursued by time and distance, and control all parts of the system manually and remotely from a long distance. Of course to build this complex system needs newest technologies that make communication between owner and system come true.

Some points that will be discused:
General functions of a house [no need, just in one or two sentences]
How secure does your home? [no need, just in one or two sentences]
Introductory to integrated home security system
Required equipments
Technology used by the system
Implementation cost estimation