Abstract
Chaotic logistic map can be used to generate private key with different dimensions, this can be easily used to secure the process of data cryptography, required to encrypt-decrypt messages, images or audio files. Some of the encrypted-decrypted data (messages images) requires inter values keys, other like audio files require fraction values keys. In this research paper we will perform a detailed study of chaotic logistic map model to give some valuable recommendation of many aspects such as: the suitable range of the growth rate parameter, the suitable range of the initial generation, the sensitivity feature, the required time to generate private keys. It will be show how to generate 1D and 2D private keys with integer values and with fractional values, these key will be generated taking in mined the process of optimizing the generation time and the selected length of key which can optimize the process of cryptography.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Computer Science and Mobile Computing
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.