Abstract A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-term fore-cast becomes impossible by the iterations of a chaotic map. These features look similar to the properties of the cryptology. For that reason, it is effective to use chaotic maps for cryptosystems. In this research, we propose a cryptosystem by using iterations of a chaotic map. This cryptosystem uses expansion map for encryption and de-cryption. This cryptosystem is a symmetric-key cryptography that has a public key. We investigate the vulnerability of this cryptosystem. Key words chaotic cryptosystem, logistic map 1
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
Abstract—A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
Abstract—Over last 3 decades, many cryptography algorithms based on chaos have been proposed that ar...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
A chaotic map has various features. A chaotic map has sen-sitivity to a change in initial conditions...
Abstract – This paper shall discuss the design of a Chaos based symmetric key cryptosystem. The stru...
Nowadays, there is a high necessity to create new and robust cryptosystems. Dynamical systems have p...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...
Abstract—A chaotic map has sensitivity to a change in initial conditions and parameters, and a long-...
Abstract A chaotic map has sensitivity to changes in the initial conditions and parameters, and a lo...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
Abstract — A chaotic map has sensitivity to changes in the initial conditions and parameters, and a ...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
AbstractIn this paper, two fatal flaws of the cryptosystem which are based on the logistic map and p...
Abstract—Over last 3 decades, many cryptography algorithms based on chaos have been proposed that ar...
A chaotic map has sensitivity to a change in initial condi-tions and parameters, and a long-term for...
A chaotic map has various features. A chaotic map has sen-sitivity to a change in initial conditions...
Abstract – This paper shall discuss the design of a Chaos based symmetric key cryptosystem. The stru...
Nowadays, there is a high necessity to create new and robust cryptosystems. Dynamical systems have p...
This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaoti...
Abstract: Large numbers of image encryption algorithms using chaotic maps have been suggested in lit...
Includes bibliographical references (pages 59-60).The study of chaotic maps has become increasingly ...