2020
DOI: 10.14569/ijacsa.2020.0111005
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Chaotic System for Text Encryption Optimized with Genetic Algorithm

Abstract: With meteoric developments in communication systems and data storage technologies, the need for secure data transmission is more crucial than ever. The level of security provided by any cryptosystem relies on the sensitivity of the private key, size of the key space as well as the trapdoor function being used. In order to satisfy the aforementioned constraints, there has been a growing interest over the past few years, in studying the behavior of chaotic systems and their applications in various fields such as… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(6 citation statements)
references
References 17 publications
0
6
0
Order By: Relevance
“…The Bruce-force attack and known-plaintext assault have a very difficult time breaking the cipher text discovered by the purposed technique. The procedure for decryption has been a test was conducted utilizing three distinct secret keys (which are quite comparable to the secret key used in the encrypted process [10].…”
Section: Related Workmentioning
confidence: 99%
“…The Bruce-force attack and known-plaintext assault have a very difficult time breaking the cipher text discovered by the purposed technique. The procedure for decryption has been a test was conducted utilizing three distinct secret keys (which are quite comparable to the secret key used in the encrypted process [10].…”
Section: Related Workmentioning
confidence: 99%
“…It is done by converting the original plain text message into cipher text using one of the encryption algorithms [17]. There are several types of encryption methods, mainly divided into symmetric essential encryption methods, where the same key is used for encryption and decryption, and the other type is called asymmetric encryption, in which different keys are used for encryption and decryption [18]. Xor was used as a method of encryption in order to increase the level of security and increase confidentiality.…”
Section: Encryptionmentioning
confidence: 99%
“…Many encryption techniques were developed in the past decades to be adopted as a national standard for secure communication, like: DES, RSA, 3-DES, Two-fish, IDEA, AES. Yet, they are not suitable options for real-time multimedia cryptosystem of large size [4][5][6] . On the other hand, cryptanalysts are trying to develop their expertise and capabilities to find shortcuts to break the security of these cryptosystems.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, there is a need to develop a fast and strong cryptographic cryptosystems with pseudo-random behavior. Dynamic systems theory and chaos demonstrated promising area within the field of cryptography for research and applications [5][6][7] . Chaos-based schemes are dominant techniques due to high randomization, simple cryptographic processes, and its sensitivity to initial control parameters, such that a minor deviation in its input parameters can lead to a large change in the output range values.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation