Implementation of Various Cryptosystem Using Chaos
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 4
Abstract
Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic algorithms. In this paper we use most commonly used algorithm AES, RC5, IDEA, RSA, ELGamal. In this paper firstly we implement all the algorithm in MATLAB then Chaos is applied on it. After applying Chaos in these algorithms we observe that both Security and Speed increases as compare to the conventional cryptographic algorithm.
Authors and Affiliations
Bhavana Agrawal
Real Time Zetta Bytes -Universal Memory ASIC SOC IP Core Design Implementation using VHDL and Verilog HDL for High Capacity Data Computing Processors like Cloud/Cluster/Super VLIW Parallel Distributing Pipelined Array Computing Processors
Abstract: The main intention is RTL Design Architecture and HDL Design Implementation of Zetta Bytes Memory ASIC SOC IP Core for Advanced Parallel Array Distributed Pipelined Array Computing /Cloud Computing / Super VLIW...
A Non-restoring Division Algorithm
Abstract: Non-restoring division method originally defined by Robertson in 1958. Restoring and non-restoring division processes are the algorithms conventionally used to program division method on microprocessors t...
Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme
The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such...
Mathematical Programming Approach to Improve WebsiteStructure for Effective User Navigation
Abstract:Due to tremendous growth of web applications. It increases the complexity of web applications andweb navigation. Designing well-structured website has been long challenge because while creating website web...
Secured Employee Attendance Management System Using Fingerprint
In this paper an effective employee attendance management system using fingerprint is introduced. It is used to managed the attendance of employees in any organization. All organizations and institutions are &nbs...