2012
DOI: 10.5121/ijsptm.2012.1307
|View full text |Cite
|
Sign up to set email alerts
|

Hybrid Message-Embedded Cipher using Logistic Map

Abstract: The proposed hybrid message embedded scheme consists of hill cipher combined with message embedded chaotic scheme. Message-embedded scheme using non-linear feedback shift register as non-linear function and 1-D logistic map as chaotic map is modified, analyzed and tested for avalanche property and strength against known plaintext attack and brute-force attack. Parameter of logistic map acts as a secret key. As we know that the minimum key space to resist brute-force attack is 2100, and it is observed from anal… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…The strength of security in Henon map was previously studied [21]. In many researches, it was proved that Henon method is strong against brute force attack as compared with the classical methods because of having high key space [22]. The size of the key space should be greater than 2 100 to prepare a high-security system [23].…”
Section: Generating a Sequence Of Bits From Chaotic Mapmentioning
confidence: 99%
“…The strength of security in Henon map was previously studied [21]. In many researches, it was proved that Henon method is strong against brute force attack as compared with the classical methods because of having high key space [22]. The size of the key space should be greater than 2 100 to prepare a high-security system [23].…”
Section: Generating a Sequence Of Bits From Chaotic Mapmentioning
confidence: 99%
“…For a 10 -15 floating point precision, all keys parameters (2) introductory status (2) control parameter to produce permutation key can take 10 -15 possible values. Therefore, the key space comes out as 2 198 (10 -15 ) 4 , which is big as much as necessary to defend against "the brute force attack"...…”
Section: Key Spacementioning
confidence: 99%
“…Although, the four DNA bases and their coding rules are used to encode the data and used as the secret key [2] [3]. On the other side , the chaotic algorithm is characterized by very distinct characteristics such as mixing data the sensitivity of both initial condition and control parameters are all useful in designing cryptographic algorithms for text, images, audios [4].…”
Section: Introductionmentioning
confidence: 99%
“…According with [11] , these properties are highly related with cryptographic properties to design excellent encryption algorithms with excellent confusion (change only the position of the plain element) and diffusion (change only the value of the plain element) process, and complexity in the source system, which are shown in Table 1 . In recent years, chaotic maps have been employed principally for image encryption at MatLab simulation level, where most of the proposed schemes use the diffusion and confusion architecture with excellent security properties [12][13][14][15][16][17][18][19][20][21][22][23][24] .…”
Section: Introductionmentioning
confidence: 99%