Secured Text Communication using Chaotic Maps

被引:0
|
作者
Sheela, S. J. [1 ]
Suresh, K., V [1 ]
Tandur, Deepaknath [2 ]
机构
[1] Tumakuru Visvesvaraya Technol Univ, Siddaganga Inst Technol, Dept E&C, Tumkur, India
[2] ABB, Corp Res India, Bengaluru, India
关键词
Chaos; Text encryption; Plaintext; Modified Henon map; Ciphertext; CRYPTOGRAPHY;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Security has become vital issue in storage and transmission of digital data over insecure communication channel which can be achieved by using reliable encryption algorithms. Chaos based encryption techniques are more popular because of their exceptionally superior properties such as high security, simplicity and faster speed. In this paper, one of the chaos based text encryption algorithms is considered which employs modified Henon map and Sine map. The encryption capability of the algorithm is verified for different text data. Further, the empirical results of the chaos based algorithm are compared with RC4. Experimental findings reveal that the algorithm provides secure communication for text data of different file sizes.
引用
下载
收藏
页数:6
相关论文
共 50 条
  • [21] Secure digital communication based on linearly synchronized chaotic maps
    Nan, M
    Wong, CN
    Tsang, KF
    Shi, XQ
    Shi, B
    PHYSICS LETTERS A, 2000, 268 (1-2) : 61 - 68
  • [22] Robust communication via chaotic synchronization based on contraction maps
    Zhou, C.
    Chen, T.
    Physics Letters. Section A: General, Atomic and Solid State Physics, 225 (1-3):
  • [23] Towards the control of communication networks by chaotic maps: Source aggregation
    Samuel, LG
    Pitts, JM
    Mondragon, RJ
    TELETRAFFIC CONTRIBUTIONS FOR THE INFORMATION AGE, 1997, 2 : 1369 - 1378
  • [24] Robust communication via chaotic synchronization based on contraction maps
    Zhou, CS
    Chen, TL
    PHYSICS LETTERS A, 1997, 225 (1-3) : 60 - 66
  • [25] Secured indoor powerline communication using CDMA technique
    AbuElHassan, Mohamed Sherfi Omer
    Ngah, Razali
    2007 ASIA-PACIFIC CONFERENCE ON APPLIED ELECTROMAGNETICS, PROCEEDINGS, 2007, : 613 - 617
  • [26] Secured communication using efficient artificial neural synchronization
    Sarkar, Arindam
    Khan, Mohammad Zubair
    Noorwali, Abdulfattah
    ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE, 2021, 106
  • [27] Secured Chaotic Cognitive Radio System Using Advanced Fncryption Standard
    Zhang, Lin
    Yu, Jiaolong
    Wu, Zhiqiang
    2015 IEEE 26TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2015, : 7 - 11
  • [28] Design of Chaotic CDSK Modulation System using Different Chaotic Maps
    Jin, Chan-Ho
    Ryu, Heung-Gyoon
    2013 15TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATION TECHNOLOGY (ICACT), 2013, : 222 - 226
  • [29] Image Hashing Secured With Chaotic Sequences
    Tataru, Relu-Laurentiu
    FEDERATED CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2014, 2014, 2 : 735 - 740
  • [30] TELETRAFFIC ANALYSIS AND OPTIMIZATION USING CHAOTIC MAPS
    Ciotirnae, Petrica
    Vizitiu, Constantin
    Rincu, Cristian Iulian
    ICMT'09: INTERNATIONAL CONFERENCE ON MILITARY TECHNOLOGIES, 2010, : 493 - 498