A Secure Group Communication Based On Chebyshev Map and Rijandael Algorithm
نویسندگان
چکیده
-Now a day’s security is very essential measure during the data transmission ,in this paper we are proposing an efficient mechanism of group key protocol and high complex cryptographic algorithm. we consider how the chaotic maps can be improved to fulfill the cryptographic demands. To achieve this, we extend the domain of Chebyshev maps from real number set to finite field. Based on this extension, this paper proposes a novel multicast key exchange algorithm and an efficient cryptographic algorithm for secure data transmission.
منابع مشابه
A Novel Group Key Management Based on Jacobian Elliptic Chebyshev Rational Map
This paper proposes a novel scheme of group key management based on Jacobian Elliptic Chebyshev Rational Map, named Jacobian Group Key Management(JGKM). The scheme is more efficient than other group key managements since fewer re-keying messages are sent when group membership changes. Besides, it provides both forward and backward secrecy. Therefore, this proposal is helpful to deploy secure mu...
متن کاملOptimized Key Agreement Protocol Based on Chaotic
—Many key agreement protocols based on chaotic maps have been proposed to guarantee secure communications in the network. Recently, Wang et al. proposed a new key agreement protocol based on chaotic maps. But some issues exist in this protocol, such as anonymity, key distribution and management, and password problems. In order to improve the performance of Wang et al.’s protocol, this paper pr...
متن کاملA numerical Algorithm Based on Chebyshev Polynomials for Solving some Inverse Source Problems
In this paper, two inverse problems of determining an unknown source term in a parabolic equation are considered. First, the unknown source term is estimated in the form of a combination of Chebyshev functions. Then, a numerical algorithm based on Chebyshev polynomials is presented for obtaining the solution of the problem. For solving the problem, the operational matrices of int...
متن کاملGSLHA: Group-based Secure Lightweight Handover Authentication Protocol for M2M Communication
Machine to machine (M2M) communication, which is also known as machine type communication (MTC), is one of the most fascinating parts of mobile communication technology and also an important practical application of the Internet of Things. The main objective of this type of communication, is handling massive heterogeneous devices with low network overheads and high security guarantees. Hence, v...
متن کاملImage encryption based on chaotic tent map in time and frequency domains
The present paper is aimed at introducing a new algorithm for image encryption using chaotic tent maps and the desired key image. This algorithm consists of two parts, the first of which works in the frequency domain and the second, in the time domain. In the frequency domain, a desired key image is used, and a random number is generated, using the chaotic tent map, in order to change the phase...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012