Cryptography Chaos Theory

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Chaos-Based Cryptography - Theory, Algorithms and Applications

Bargaining with reading habit is no need. Reading is not kind of something sold that you can take or not. It is a thing that will change your life to life better. It is the thing that will give you many things around the world and this universe, in the real world and here after. As what will be given by this chaos based cryptography theory algorithms and applications, how can you bargain with t...

متن کامل

Chaos and Cryptography

In his paper on chaos and cryptography, Baptista says ”It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property of the simple low-dimensional and chaotic logistic equation. The basic idea is to encrypt each character of the message as the integer number of iterations performed in the logistic equation, in order to transfer the trajectory from an initial ...

متن کامل

Cryptography with cycling chaos

Periodic switching of cryptographic keys is commonly employed as a mechanism to enhance the security of encryption methods. In this Letter, cycling chaos, in which orbits of certain coupled iterated maps make periodic excursions between chaotic sets, is proposed as a new encryption approach that combines chaotic behavior with periodic switching of keys. The actual encryption process is similar ...

متن کامل

Cryptography with Chaos

We implement Cryptography with Chaos following and extending the original program of Shannon with 3 selected Torus Automorphisms, namely the Baker Map, the Horseshoe Map and the Cat Map. The corresponding algorithms and the software (chaos_cryptography) were developed and applied to the encryption of picture as well as text in real time. The maps and algorithms may be combined as desired, creat...

متن کامل

Chaos Based Cryptography

This paper shall discuss the design of a Chaos based symmetric key cryptosystem. The structure of two contemporary symmetric key encryption schemes using the Logistic map is discussed and their performance is evaluated based on a battery of tests and some qualitative measures. It is deduced that one scheme performs far better than the other. It is then experimentally shown that the performance ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Central and Eastern European eDem and eGov Days

سال: 2018

ISSN: 2663-9394,2520-3401

DOI: 10.24989/ocg.v331.37