2017
DOI: 10.11591/eei.v6i3.627
|View full text |Cite
|
Sign up to set email alerts
|

Chaotic Rivest-Shamir-Adlerman Algorithm with Data Encryption Standard Scheduling

Abstract: Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organiz… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
12
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(12 citation statements)
references
References 18 publications
0
12
0
Order By: Relevance
“…It is important to keep the prime numbers hidden. Anyone may use the public key to encode the data, conversely with current established approaches, if the public key is big enough, the message can only be decoded by someone who knows the prime numbers [10], [11]. The encryption and decryption procedure is described using the following pseudocode ().…”
Section: The Rsa Algorithmmentioning
confidence: 99%
“…It is important to keep the prime numbers hidden. Anyone may use the public key to encode the data, conversely with current established approaches, if the public key is big enough, the message can only be decoded by someone who knows the prime numbers [10], [11]. The encryption and decryption procedure is described using the following pseudocode ().…”
Section: The Rsa Algorithmmentioning
confidence: 99%
“…The most significant concern with any current digital data is the privacy and security, for if they are breached, this will lead to compromise in their confidentiality and integrity [1]. Also, sharing on the data communication network is one of the main security challenge [2].…”
Section: Introductionmentioning
confidence: 99%
“…Chaotic systems are applicable in a wide range of research classifications such as jerk systems [1,2], robotics [3,4], neuron models [5,6], oscillators [7,8], circuits [9][10][11], biological systems [12,13], chemical systems [14,15], and memristors [16,17]. In view of their attractive triangular structure, considerable numbers of papers have been published on the chaos jerk models [18][19][20].…”
Section: Introductionmentioning
confidence: 99%