ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Multiple CLMMs Keys to Secure Message Transmission

Journal: International Journal of Computer Science and Mobile Computing - IJCSMC (Vol.11, No. 7)

Publication Date:

Authors : ; ;

Page : 18-36

Keywords : Cryptography; PK; CLMM; CLK; IK; lockup table; throughput;

Source : Downloadexternal Find it from : Google Scholarexternal


A simple, flexible and efficient method of message cryptography will be introduced. The method will suit any message with any length, it can use one or more rounds to apply encryption-decryption. The PK key will have a complicated structure that cannot be hacked. The PK will contain information about chaotic parameters, these parameters will be used to run a CLMMs to generate the needed number of CLKs, the generated CLKs will be converted to induces keys, which are to be used as a lockup tables in the encryption and decryption phases. The generated key will sensitive to any minor changes in the PK, and using another PK in the decryption phase will produce a damaged decrypted message. The method will be implemented and the obtained results will be used to calculate the method throughput. The obtained throughputs will be compared with DES method throughput to show how the proposed method speedup the process of message cryptography.

Last modified: 2022-07-16 23:28:06