Milcom 2006 2006
DOI: 10.1109/milcom.2006.302396
|View full text |Cite
|
Sign up to set email alerts
|

Public Key Cryptographic System Using Mandelbrot Sets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
15
0

Year Published

2011
2011
2024
2024

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(16 citation statements)
references
References 5 publications
0
15
0
Order By: Relevance
“…As a part of that, uses two phases that are encrypt the data by using sierpinski sieve fractal algorithm [9,10,11] as described in the section 3.1 to get the ciphertext (Enc i ) and immediately find the message digest to either original data or encrypted data by using MMD hash algorithm [7] H(d) as mentioned in 3.2. The ciphertext and message digest should be participated in the communication from the seder side.…”
Section: Proposed Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…As a part of that, uses two phases that are encrypt the data by using sierpinski sieve fractal algorithm [9,10,11] as described in the section 3.1 to get the ciphertext (Enc i ) and immediately find the message digest to either original data or encrypted data by using MMD hash algorithm [7] H(d) as mentioned in 3.2. The ciphertext and message digest should be participated in the communication from the seder side.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Based on the keys, the transformation of the plain text is passed out to achieve the cipher text. Both the sender and receiver share the same key so this is symmetric encryption and is normally called as fractal symmetric encryption [9]. First of all the inner triangles are filled with secret key, then the outer triangles are filled with plain text as shown in Fig 1[2, 20].…”
Section: Symmetric Key Encryption Using Fractal Geometrymentioning
confidence: 99%
“…A more detailed review of the topics are as in (Barnsley, 2000;Kumar, 2006). The theory of fractal sets is a modern domain of research.…”
Section: Methodsmentioning
confidence: 99%
“…Since then many studies on a new key agreement protocol based on chaotic maps were undertaken (Gonzalo, 2005;Yoon and Yoo, 2008). There were also proposals for incorporating fractal functions into the design of symmetric and asymmetric encryption schemes using the similar mechanism (Ahmad and Samsudin, 2007;Ali and Ahmad, 2008;Kumar, 2006). However though many of the proposed schemes have several advantages such as computational efficiency, ease of generating public-private key pairs, they fail to explain or do not possess a number of features that are fundamentally important to all kinds of cryptosystems.…”
Section: Introductionmentioning
confidence: 99%
“…The fractals generate infinitely complex patterns and show repetition and self-similarity at different scales. It is the repeating process of images and is familiar patterns since the whole universe consists of fractals in different forms [30][31][32][33][34][35][36][37][38][39][40][41][42][43]. In this context, we have designed a cryptosystem based on shuffling with Julia set of fractals key and chaos theory.…”
mentioning
confidence: 99%