
Cryptography using Multiple – Chaos
Author(s) -
Rajender Kumar,
R. Pandian,
T. Prem Jacob,
A. Pravin,
P. Indumathi
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1770/1/012092
Subject(s) - chaotic , cryptography , encryption , reliability (semiconductor) , synchronization of chaos , chaos (operating system) , computer science , bounded function , field (mathematics) , mathematics , theoretical computer science , control theory (sociology) , algorithm , computer security , artificial intelligence , physics , mathematical analysis , power (physics) , control (management) , quantum mechanics , pure mathematics
Seemingly random, chaotic dynamic systems have state variables that move about in a non periodic, bounded fashion. The sensitivity to initial conditions of chaotic signals also holds an interesting pattern. A seemingly tiny change in the values of initial condition, can greatly affect the values of output. This means that the cross-correlation of two chaotic functions of same source is very low. This pattern of chaotic functions makes their use in the field of cryptography more interesting. A more complex version of chaos is the multiple-chaos, where two or more chaotic functions are used, enhances the security of the procedure. Additionally the dynamically varying look-up table, which is being transmitted along with the encrypted message, ensures high reliability in transmitting the data. Overall, this method ensures high security and high reliability in transmitting the data.