Domain Examination of Chaos Logistics Function As A Key Generator in Cryptography

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

‏‎interpersonal function of language in subtitling

‏‎translation as a comunicative process is always said to be associated with various aspects of meaning loss or gain. subtitling as a mode of translating, due to special discoursal and textual conditions imposed upon it, is believed to be an obvious case of this loss or gain. presenting the spoken sound track of a film in writing and synchronizing the perception of this text by the viewers with...

15 صفحه اول

the significance of conjunction as a cohesive device in teaching writing

the research questions were as follows: 1. is there any relationship between the students concious awareness of the form and implications of the conjuncations and their improvement in using appropriate conjunctions? 2. does students knowledge of the from and the implications of the conjunctions help them to produce more coherent writings. 3. does a comparison between english conjunctions and th...

15 صفحه اول

Chaos and Cryptography

In his paper on chaos and cryptography, Baptista says ”It is possible to encrypt a message (a text composed by some alphabet) using the ergodic property of the simple low-dimensional and chaotic logistic equation. The basic idea is to encrypt each character of the message as the integer number of iterations performed in the logistic equation, in order to transfer the trajectory from an initial ...

متن کامل

Cryptography with cycling chaos

Periodic switching of cryptographic keys is commonly employed as a mechanism to enhance the security of encryption methods. In this Letter, cycling chaos, in which orbits of certain coupled iterated maps make periodic excursions between chaotic sets, is proposed as a new encryption approach that combines chaotic behavior with periodic switching of keys. The actual encryption process is similar ...

متن کامل

Cryptography with Chaos

We implement Cryptography with Chaos following and extending the original program of Shannon with 3 selected Torus Automorphisms, namely the Baker Map, the Horseshoe Map and the Cat Map. The corresponding algorithms and the software (chaos_cryptography) were developed and applied to the encryption of picture as well as text in real time. The maps and algorithms may be combined as desired, creat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Electrical and Computer Engineering (IJECE)

سال: 2018

ISSN: 2088-8708,2088-8708

DOI: 10.11591/ijece.v8i6.pp4577-4583