Symmetric encryption using logistic map
Symmetric encryption using logistic map
| dc.contributor.author | Jhansi Rani, P. | |
| dc.contributor.author | Durga Bhavani, S. | |
| dc.date.accessioned | 2022-03-27T05:55:34Z | |
| dc.date.available | 2022-03-27T05:55:34Z | |
| dc.date.issued | 2012-05-24 | |
| dc.description.abstract | In Symmetric cryptography both the sender and receiver agree with the same key before they start communicating secretly. Same key is used for encryption and decryption. The communication is secret as long as the key is kept secret. A desirable property of symmetric encryption is termed as avalanche effect by which two different keys produces different ciphertext for the same message. Essential properties of chaos functions are sensitivity to initial conditions and ergodicity, which makes two nearby keys to generate different cipher texts. Sensitivity to initial conditions property of chaos can be exploited to produce avalanche effect. We propose a symmetric encryption algorithm which uses logistic map. We show that the keys with negligible difference generate different cipher texts. Cryptanalysis of the proposed algorithm shows that it is resistant to various attacks and stronger than existing encryption algorithms. © 2012 IEEE. | |
| dc.identifier.citation | 2012 1st International Conference on Recent Advances in Information Technology, RAIT-2012 | |
| dc.identifier.uri | 10.1109/RAIT.2012.6194468 | |
| dc.identifier.uri | http://ieeexplore.ieee.org/document/6194468/ | |
| dc.identifier.uri | https://dspace.uohyd.ac.in/handle/1/8798 | |
| dc.subject | chao functions | |
| dc.subject | ciphertext | |
| dc.subject | cryptography | |
| dc.subject | logistic map | |
| dc.subject | symmetric encryption | |
| dc.title | Symmetric encryption using logistic map | |
| dc.type | Conference Proceeding. Conference Paper | |
| dspace.entity.type |
Files
License bundle
1 - 1 of 1