osesaver.blogg.se

Product key office 2013 professional plus
Product key office 2013 professional plus




The methodology used in this manuscript is DTMF (Dual Tone Multi-Frequency) and GSM module. Also according to some tests with 256 bits key and 5000 iteration there is no repetition in the generated subkeys, but in small key size a problem of repetition will be encountered. In this research, the proposed algorithm proved the concept of diffusion on the key itself. The proposed algorithm (Roty_Shift) was tested using different key sizes and obtained good results.

product key office 2013 professional plus

The proposed algorithm consists of five levels, and according to these five levels the subkeys will be generated and the size of each one is (N*N), each one of these subkeys is possible to use it in any encryption strategy of block cipher type.

product key office 2013 professional plus

Roty_Shift needs two secret seeds as secret keys, seed1 will be generated by true random number generator (TRNG) while seed1and seed2 will be used in pseudorandom number generator (PRNG), also this research utilizes the mechanism of the key derivation function (KDF) to generate the subkeys, on other hand Roty_Shift can be considered as PRNG.

product key office 2013 professional plus

In this research a proposed algorithm to generate secret keys was accomplished, the proposed key generation algorithm will be called (Roty_Shift algorithm) and it will generate a series (list) of subkeys may be used for data encryption.






Product key office 2013 professional plus