Implementation of Various Cryptosystem Using Chaos

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 4

Abstract

 Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic algorithms. In this paper we use most commonly used algorithm AES, RC5, IDEA, RSA, ELGamal. In this paper firstly we implement all the algorithm in MATLAB then Chaos is applied on it. After applying Chaos in these algorithms we observe that both Security and Speed increases as compare to the conventional cryptographic algorithm.

Authors and Affiliations

Bhavana Agrawal

Keywords

Related Articles

Real Time Zetta Bytes -Universal Memory ASIC SOC IP Core Design Implementation using VHDL and Verilog HDL for High Capacity Data Computing Processors like Cloud/Cluster/Super VLIW Parallel Distributing Pipelined Array Computing Processors

Abstract: The main intention is RTL Design Architecture and HDL Design Implementation of Zetta Bytes Memory ASIC SOC IP Core for Advanced Parallel Array Distributed Pipelined Array Computing /Cloud Computing / Super VLIW...

 A Non-restoring Division Algorithm

 Abstract: Non-restoring division method originally defined by Robertson in 1958. Restoring and non-restoring division processes are the algorithms conventionally used to program division method on microprocessors t...

Cryptanalysis and Improvement of Kang et al. Certificateless Aggregate Signature Scheme

The most important contribution of modern cryptography is the invention of digital signatures. To deal with specific application scenarios, digital signature schemes have been evolved with different variants. One of such...

 Mathematical Programming Approach to Improve WebsiteStructure for Effective User Navigation

 Abstract:Due to tremendous growth of web applications. It increases the complexity of web applications andweb navigation. Designing well-structured website has been long challenge because while creating website web...

 Secured Employee Attendance Management System Using  Fingerprint

 In this paper an effective employee attendance management system using fingerprint is introduced. It is used to managed the attendance of employees in any organization. All organizations and institutions are &nbs...

Download PDF file
  • EP ID EP109833
  • DOI -
  • Views 88
  • Downloads 0

How To Cite

Bhavana Agrawal (2013).  Implementation of Various Cryptosystem Using Chaos. IOSR Journals (IOSR Journal of Computer Engineering), 13(4), 77-84. https://europub.co.uk./articles/-A-109833