ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Application of chaos theory in data security-a survey

Journal: ACCENTS Transactions on Information Security (TIS) (Vol.2, No. 5)

Publication Date:

Authors : ;

Page : 1-15

Keywords : Chaotic functions; Sequence generation; Image encryption; Chaotic systems.;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In cryptography key sequence generation is one of the important areas. Earlier pseudo random number generators were used as key sequence in stream cipher. After the evolution of chaotic systems, it was found that properties of chaotic systems are more superior to pseudo random number generators. In this context, we have tried to explore the basic theoretical background of chaotic systems, their types and properties in this paper. Along with chaotic systems, sequence generation using chaotic systems and the application of sequences in various image encryption methods is also discussed. Finally, a suitable key sequence generation using chaotic system is proposed.

Last modified: 2017-03-15 15:33:29