2023
DOI: 10.11591/ijece.v13i2.pp1708-1723
|View full text |Cite
|
Sign up to set email alerts
|

Advanced approach for encryption using advanced encryption standard with chaotic map

Abstract: At present, security is significant for individuals and organizations. All information need security to prevent theft, leakage, alteration. Security must be guaranteed by applying some or combining cryptography algorithms to the information. Encipherment is the method that changes plaintext to a secure form called cipherment. Encipherment includes diverse types, such as symmetric and asymmetric encipherment. This study proposes an improved version of the advanced encryption standard (AES) algorithm called opti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 16 publications
0
8
0
Order By: Relevance
“…We vary the values of R 3 to obtain different phase portraits for the circuit model (15). It is easy to see the good agreement between the MATLAB plots of the jerk system (4) and the simulation results of the circuit (15).…”
Section: Circuit Simulation Of the Jerk Systemmentioning
confidence: 90%
See 2 more Smart Citations
“…We vary the values of R 3 to obtain different phase portraits for the circuit model (15). It is easy to see the good agreement between the MATLAB plots of the jerk system (4) and the simulation results of the circuit (15).…”
Section: Circuit Simulation Of the Jerk Systemmentioning
confidence: 90%
“…The following Figure 16 shows the various phase portraits of circuit (15) illustrating the route to chaos, where the initial values are taken as Z(0) = (0.3, 0.2, 0.3).…”
Section: Circuit Simulation Of the Jerk Systemmentioning
confidence: 99%
See 1 more Smart Citation
“…Without the private key, no one else can view the message's content. Using the same private key, the intended recipient can decrypt the message and restore it to its original format [16], [18], [20]- [24]. Examples of symmetric keys include advanced encryption standards (AES), blowfish (BF), and data encryption standards (DES).…”
Section: Cryptography Keymentioning
confidence: 99%
“…Its superiority lies in its capability to support a wide range of key lengths, which adds an additional layer of protection against malicious attacks. The AES employs keys that are 128, 192, and 256-bit in length, with 10, 12, and 14 rounds of encryption, respectively, as outlined in [24]. The algorithm comprises three layers, with each layer performing a specific mathematical function.…”
Section: Symmetric Encryptionmentioning
confidence: 99%