Abstract

Recently, chaotic dynamics-based data encryption techniques for wired and wireless networks have become a topic of active research in computer science and network security such as robotic systems, encryption, and communication. The main aim of deploying a chaos-based cryptosystem is to provide encryption with several advantages over traditional encryption algorithms such as high security, speed, and reasonable computational overheads and computational power requirements. These challenges have motivated researchers to explore novel chaos-based data encryption techniques with digital logics dealing with hiding information for fast secure communication networks. This work provides an overview of how traditional data encryption techniques are revised and improved to achieve good performance in a secure communication network environment. A comprehensive survey of existing chaos-based data encryption techniques and their application areas are presented. The comparative tables can be used as a guideline to select an encryption technique suitable for the application at hand. Based on the limitations of the existing techniques, an adaptive chaos based data encryption framework of secure communication for future research is proposed

Highlights

  • Advances in secure wired and wireless communication devices have led to the development of highly secure and fast data encryption techniques, so pervasive surveillance, chaotic-based encryption systems have attracted significant attention in many application domains such as the military, mobile communication, and private data encryption, as well as the intelligent and reliable applications

  • Since this result is by nature asymptotic it is believed that it has no practical consequences, but it does put limits onchaos-based cryptography with the same standards of security and speed as in conventional cryptography [30,31]

  • On the basis of a study of all the above mentioned research papers it is determined that chaos has a number of characteristics such as good pseudo randomness, unpredictability and extreme sensitivity to initial state and structural parameters

Read more

Summary

Introduction

Advances in secure wired and wireless communication devices have led to the development of highly secure and fast data encryption techniques, so pervasive surveillance, chaotic-based encryption systems have attracted significant attention in many application domains such as the military, mobile communication, and private data encryption, as well as the intelligent and reliable applications. In these applications real time, fast, secure and reliable monitoring are essential requirements. For this purpose many traditional encryption algorithms can be used, but some of these algorithms are hard to understand, complex to implement, slow for encryption, and not suitable for real time applications, so a new concept of a chaotic system has arisen for highly secure, fast and easy implemented encryption systems for secure transmission networks

Cryptography
Chaos Theory
Literature Survey
11. Summary
12. Conclusions
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call