Text encryption algorithm based on chaotic map

14Citations
Citations of this article
38Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

To maintain the confidential data, a scheme or algorithm is needed to protect the data from many attacks. Recently, many cryptography schemes and algorithms have been introduced. One of them is the cryptography algorithm based on chaotic maps. The nature of the chaotic maps gives many advantages to the algorithm. In this paper, an algorithm to encrypt the text is purposed. The algorithm utilizes the nature of the chaotic map by using the MS map as a keystream generator. The ciphertext found by the purposed algorithm is very difficult to be cracked by the bruce-force attack and known-plaintext attack. The decryption process has been tested using 3 different secret keys (that is very similar with the secret key on the encrypted process), and resulting the decrypted text is the same with plaintext only if the input is exactly the same secret key as in encrypted process.

Cite

CITATION STYLE

APA

Irsan, M. Y. T., & Antoro, S. C. (2019). Text encryption algorithm based on chaotic map. In Journal of Physics: Conference Series (Vol. 1341). Institute of Physics Publishing. https://doi.org/10.1088/1742-6596/1341/6/062023

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free