Comparative Analysis of using SIK for Message Cryptography
Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.12, No. 8)Publication Date: 2023-08-30
Authors : Ziad Alqadi;
Page : 45-57
Keywords : Cryptography; CK; CLMM; image_key; SIK; MBM; rearrangement;
Abstract
The process of selecting the private key, which is used in the process of generating the secret key to encrypt messages, is one of the most important processes used in the encryption process, which determines the efficiency of the method used in terms of security and speed of implementation, because part of the encryption time is consumed in generating the secret key. In this paper research we will introduce two methods of using private keys to generate a secret index key, the first key will be used a chaotic logistic map model to generate a chaotic key, the chaotic key will be converted to secret index key. The second way is using a color image as an image_key, an array will be extracted from this image, and the array will be converted to secret index key. A simple procedure of message encryption-decryption will be used, this procedure is based on the secret index key, this key will be used to rearrange the message characters' binary bits.
The two approaches of generating secret index key will be implemented using various messages, the obtained results will be analyzed, and the results of analysis will be used to raise some recommendations regarding the message length, security, quality and the speed of message cryptography.
Other Latest Articles
- A Dynamic Zone Adaptive Model for Dynamic Reconfiguration of WSN
- A Study on Issues Associated with WSN Localization
- Surgical Conversion Rates in Urogynaecology at a University Teaching Hospital in the East Midlands, United Kingdom |Biomedgrid
- HIV Positive Adults and Kaposi Sarcoma Cases Prevalence in Namibia |Biomedgrid
- Clinical and Epidemiological Characteristics of COVID-19 in Mayan Pregnant Women of Yucatan, Mexico |Biomedgrid
Last modified: 2023-08-15 23:16:52