ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Comparative Analysis of using SIK for Message Cryptography

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.12, No. 8)

Publication Date:

Authors : ;

Page : 45-57

Keywords : Cryptography; CK; CLMM; image_key; SIK; MBM; rearrangement;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

The process of selecting the private key, which is used in the process of generating the secret key to encrypt messages, is one of the most important processes used in the encryption process, which determines the efficiency of the method used in terms of security and speed of implementation, because part of the encryption time is consumed in generating the secret key. In this paper research we will introduce two methods of using private keys to generate a secret index key, the first key will be used a chaotic logistic map model to generate a chaotic key, the chaotic key will be converted to secret index key. The second way is using a color image as an image_key, an array will be extracted from this image, and the array will be converted to secret index key. A simple procedure of message encryption-decryption will be used, this procedure is based on the secret index key, this key will be used to rearrange the message characters' binary bits. The two approaches of generating secret index key will be implemented using various messages, the obtained results will be analyzed, and the results of analysis will be used to raise some recommendations regarding the message length, security, quality and the speed of message cryptography.

Last modified: 2023-08-15 23:16:52