Abstract

Text file may be confidential and it can contain secret information that required protection from being hacked. In this research paper a simple method of text files cryptography will be introduced, this method will suit any text file with any size; the sequence of required operations will remain the same without any change even if we change the text file and the private key. The introduced method of data cryptography will provide a high level of security; the private key will provide a huge key space making the hacking process impossible. The private key will have a complicated structure with multiple components, these components are to be used to generate three keys needed to apply three rounds of encryption-decryption, the keys will be very sensitive to any minor changes, any changes in the private key components in the decryption phase will be considered as a hacking attempt. The private key will base on chaotic logistic map model to generate 2D chaotic keys. The proposed method will be implemented and the obtained results will be analyzed using various types of analysis to prove the efficiency enhancement provide by the proposed method.

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.