z-logo
open-access-imgOpen Access
Cryptography using Multiple – Chaos
Author(s) -
Rajender Kumar,
R. Pandian,
T. Prem Jacob,
A. Pravin,
P. Indumathi
Publication year - 2021
Publication title -
journal of physics. conference series
Language(s) - English
Resource type - Journals
SCImago Journal Rank - 0.21
H-Index - 85
eISSN - 1742-6596
pISSN - 1742-6588
DOI - 10.1088/1742-6596/1770/1/012092
Subject(s) - chaotic , cryptography , encryption , reliability (semiconductor) , synchronization of chaos , chaos (operating system) , computer science , bounded function , field (mathematics) , mathematics , theoretical computer science , control theory (sociology) , algorithm , computer security , artificial intelligence , physics , mathematical analysis , power (physics) , control (management) , quantum mechanics , pure mathematics
Seemingly random, chaotic dynamic systems have state variables that move about in a non periodic, bounded fashion. The sensitivity to initial conditions of chaotic signals also holds an interesting pattern. A seemingly tiny change in the values of initial condition, can greatly affect the values of output. This means that the cross-correlation of two chaotic functions of same source is very low. This pattern of chaotic functions makes their use in the field of cryptography more interesting. A more complex version of chaos is the multiple-chaos, where two or more chaotic functions are used, enhances the security of the procedure. Additionally the dynamically varying look-up table, which is being transmitted along with the encrypted message, ensures high reliability in transmitting the data. Overall, this method ensures high security and high reliability in transmitting the data.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here