منابع مشابه
Chaos-Based Cryptography - Theory, Algorithms and Applications
Bargaining with reading habit is no need. Reading is not kind of something sold that you can take or not. It is a thing that will change your life to life better. It is the thing that will give you many things around the world and this universe, in the real world and here after. As what will be given by this chaos based cryptography theory algorithms and applications, how can you bargain with t...
متن کاملChaos and Cryptography
In his paper on chaos and cryptography, Baptista says ”It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property of the simple low-dimensional and chaotic logistic equation. The basic idea is to encrypt each character of the message as the integer number of iterations performed in the logistic equation, in order to transfer the trajectory from an initial ...
متن کاملCryptography with cycling chaos
Periodic switching of cryptographic keys is commonly employed as a mechanism to enhance the security of encryption methods. In this Letter, cycling chaos, in which orbits of certain coupled iterated maps make periodic excursions between chaotic sets, is proposed as a new encryption approach that combines chaotic behavior with periodic switching of keys. The actual encryption process is similar ...
متن کاملCryptography with Chaos
We implement Cryptography with Chaos following and extending the original program of Shannon with 3 selected Torus Automorphisms, namely the Baker Map, the Horseshoe Map and the Cat Map. The corresponding algorithms and the software (chaos_cryptography) were developed and applied to the encryption of picture as well as text in real time. The maps and algorithms may be combined as desired, creat...
متن کاملChaos Based Cryptography
This paper shall discuss the design of a Chaos based symmetric key cryptosystem. The structure of two contemporary symmetric key encryption schemes using the Logistic map is discussed and their performance is evaluated based on a battery of tests and some qualitative measures. It is deduced that one scheme performs far better than the other. It is then experimentally shown that the performance ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Central and Eastern European eDem and eGov Days
سال: 2018
ISSN: 2663-9394,2520-3401
DOI: 10.24989/ocg.v331.37