z-logo
open-access-imgOpen Access
New chaotic encryption algorithm based on chaotic sequence and plain text
Author(s) -
Wang XingYuan,
Gu ShengXian
Publication year - 2014
Publication title -
iet information security
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.308
H-Index - 34
eISSN - 1751-8717
pISSN - 1751-8709
DOI - 10.1049/iet-ifs.2012.0279
Subject(s) - plain text , encryption , key (lock) , chaotic , sequence (biology) , computer science , cipher , theoretical computer science , value (mathematics) , algorithm , artificial intelligence , computer security , machine learning , biology , genetics
A new chaotic encryption algorithm is proposed. Its key is based on chaotic sequence and plain text. First, the chaotic sequence and the plain text are used; the result is the key, so even someone obtains the initial value he cannot decrypt the cipher text. The initial value is destroyed. Then the key is used to encrypt the plain text and destroy the plain text. If someone obtains the chaotic initial value, he still cannot decrypt the cipher text because the real key is based on chaotic sequence and plain text. Obviously the other people do not have the plain text. So, the key cannot be obtained by others. The other people have to use force‐to‐attack way to decrypt the cipher text. From the result of the experiments, one can see that the algorithm's security is improved and strengthened.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here