ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Two Complicated PKs to Protect Secret Messages

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 6)

Publication Date:

Authors : ;

Page : 46-65

Keywords : Cryptography; image key; chaotic key; PSNR; MSE; CC; throughput;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

Increasing the message protection degree is a vital issue. In this paper research a new, simple, secure and efficient method of message cryptography will be proposed. The method will use two private keys for encryption decryption. The first key is to be generated from a secret image_key; the second key is to be generated using chaotic logistic map model. The two key will form a complicated complex key which cannot be hacked, thus will secure the transmitted messages from being hacked. The PK will be very sensitive to any changes: image_key, selected image color, message length and chaotic parameters. Any minor change in the decryption phase will generate new PK, and a corrupted damaged decrypted message will be produced. A set of analyses (sensitivity, quality and throughput) will be performed to prove the improvements and efficiency provides by the proposed method.

Last modified: 2022-06-21 00:33:47