ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Text Files Protection using Chaotic Logistic Keys

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 11)

Publication Date:

Authors : ;

Page : 48-67

Keywords : Cryptography; PK; SK; CLK; CLMM; MSE; PSNR; CC; NSCR; TP;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Text file some times contains secret or personal data which requires for protection from being hacked by unauthorized data hackers. In this research paper a simple, efficient and highly secure method of text file cryptography will be introduced. The text file will be divided into partitions with small sizes to increase the cryptography process throughput. Each partition will be encrypted-decrypted using its associated secret key. Each secret key will be generated from a chaotic logistic map by running a chaotic logistic map model with selected values of chaotic parameters. The chaotic keys will be converted to indices keys to form the secret keys. The secret keys will be used as a lockup tables to apply text file encryption-decryption. The characters of the text file will be rearranged based on the secret key indexes to form the encrypted text file. The characters of the encrypted file will be retrieved by the sequence of the indexes in the secret key. The contents of the decrypted file will be very sensitive to any changes in the chaotic parameters. The PK will have a complicated structure and it will contain the chaotic parameters values and the partition size. The partition size will be a percentage from the total text file size; this complicated structure will increase the key space, making it capable to resist any attack. The proposed method will be implemented using various in size text files, the obtained results will be analyzed to prove the quality, security and efficiency of the proposed method.

Last modified: 2022-11-17 01:58:55