首页> 外文期刊>American journal of applied sciences >EVALUATION OF CHAOTIC ENCRYPTION TECHNIQUE
【24h】

EVALUATION OF CHAOTIC ENCRYPTION TECHNIQUE

机译:混沌加密技术的评估

获取原文
获取原文并翻译 | 示例
           

摘要

Drastic growth in multimedia communication resulted to numerous security issues in the transmission of data. Moreover, the network used for the digital communication does not provide much security for the data transfer. During this time, tens of millions people using the internet options for essential communication and is being a tool for commercial field increased, So that security is an enormously important issue to deal with. We need to be protected confidentiality of data and provide secure connections for it. Hence we necessitate recognizing the different aspects of security and their applications. Many of these applications ranging from secure commerce, protecting passwords or pin and payments to private communications. As we know that, Cryptography is now becoming an essential aspect of the secure communication. Cryptography is the science of writing secret code with confident algorithm and key. The basic components of cryptography are encryption and decryption algorithms, digital signature and hashed message authentication code. We know that encryption is the synonym of cryptography. Different kinds of encryption are used in this modern era. Chaotic encryption is the type of the encryption which has adopted the concept of chaos. In this study, we are studying the history of cryptography until chaotic cryptography and analyzing the performance of chaotic encryption technique. The evaluation is performed in terms of encryption speed, the CPU utilization with time and the battery power consumption. The experimental results are specified the efficiency of the algorithms.
机译:多媒体通信的急剧增长导致数据传输中的许多安全问题。而且,用于数字通信的网络不能为数据传输提供很多安全性。在这段时间里,数以千万计的人使用Internet进行必要的通讯,并且正成为商业领域的工具,因此,安全性是一个非常重要的问题。我们需要保护数据的机密性并为其提供安全的连接。因此,我们必须认识到安全性及其应用的不同方面。这些应用程序中的许多应用程序都从安全的商务,保护密码或个人识别码和付款到私人通信不等。众所周知,密码学正在成为安全通信的重要方面。密码学是用自信的算法和密钥编写秘密代码的科学。密码学的基本组成部分是加密和解密算法,数字签名和哈希消息身份验证代码。我们知道加密是加密的同义词。在这个现代时代,使用了不同种类的加密。混沌加密是采用混沌概念的加密类型。在这项研究中,我们正在研究直到混沌密码学为止的密码学历史,并分析混沌加密技术的性能。根据加密速度,随时间变化的CPU利用率和电池功耗进行评估。实验结果表明了算法的有效性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号