This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: "Key generator" – news · newspapers · books · scholar · JSTOR (September 2010) (Learn how and when to remove this template message)

A key generator[1][2][3] is a protocol or algorithm that is used in many cryptographic protocols to generate a sequence with many pseudo-random characteristics. This sequence is used as an encryption key at one end of communication, and as a decryption key at the other. One can implement a key generator in a system that aims to generate, distribute, and authenticate[4] keys in a way that without the private key, one cannot access the information in the public end.[5]

Examples of key generators include linear-feedback shift registers (LFSR) and the Solitaire (or Pontifex) cipher.


  1. ^ "Generating Keys for Encryption and Decryption | Microsoft Docs".
  2. ^ "Symmetric Key Cryptography Using Random Key Generator". Retrieved 2022-04-04.
  3. ^ Abdalrdha, Zainab Khyioon; Al-Qinani, Iman Hussein; Abbas, Farah Neamah (2019). "Subject Review : Key Generation in Different Cryptography Algorithm". International Journal of Scientific Research in Science, Engineering and Technology: 230–240. doi:10.32628/IJSRSET196550. S2CID 207976370.
  4. ^ Bellare, Mihir; Rogaway, Phillip (August 1993). "Entity Authentication and Key Distribution". Advances in Cryptology — CRYPTO' 93. Lecture Notes in Computer Science. Vol. 773. pp. 232–249. CiteSeerX doi:10.1007/3-540-48329-2_21. ISBN 978-3-540-57766-9. S2CID 5447745.
  5. ^ Fox, Pamela. "Public key encryption". Khan Academy. Retrieved May 19, 2021.