2022
DOI: 10.47760/ijcsmc.2022.v11i11.003
|View full text |Cite
|
Sign up to set email alerts
|

Improving Standard Methods of Message Cryptography

Abstract: Protecting secret messages from being hacked is a vital issue. In this paper research some standard symmetric and asymmetric methods of data cryptography will be studied and a comparative analysis of these methods will be provided. A simple, highly secure and efficient method of secret messages cryptography will be introduced; the method will use a character private key with variable length. Increasing the PK length will increase the key space making the method capable to resist any attack, the produced decryp… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(7 citation statements)
references
References 23 publications
0
7
0
Order By: Relevance
“…The proposed method as shown in figure 4 extracts the color channels [42][43][44][45][46][47][48][49][50] and each color 2D matrix is encrypted-decrypted using its own generated secret key. Two kinds of chaotic maps are used to generate the secret keys [57]. The first and the third keys are generated by running two chaotic logistic map models (CLMM) and the second key is generated by running chaotic tent map model (CTMM), the parameters of these chaotic models are included in the PK [50][51][52][53][54][55][56][57].…”
Section: The Proposed Methodsmentioning
confidence: 99%
See 3 more Smart Citations
“…The proposed method as shown in figure 4 extracts the color channels [42][43][44][45][46][47][48][49][50] and each color 2D matrix is encrypted-decrypted using its own generated secret key. Two kinds of chaotic maps are used to generate the secret keys [57]. The first and the third keys are generated by running two chaotic logistic map models (CLMM) and the second key is generated by running chaotic tent map model (CTMM), the parameters of these chaotic models are included in the PK [50][51][52][53][54][55][56][57].…”
Section: The Proposed Methodsmentioning
confidence: 99%
“…Two kinds of chaotic maps are used to generate the secret keys [57]. The first and the third keys are generated by running two chaotic logistic map models (CLMM) and the second key is generated by running chaotic tent map model (CTMM), the parameters of these chaotic models are included in the PK [50][51][52][53][54][55][56][57]. The PK will have a complicated structure shown in table 3, this structure will provide a huge key space making the method secure and making the hacking process impossible [45][46][47][48][49].…”
Section: The Proposed Methodsmentioning
confidence: 99%
See 2 more Smart Citations
“…Abu-Faraj, et. al [4], argued that protecting confidential data can be done using cryptography, which will be encrypted when sending data and decrypted when receiving data. In the process of data encryption or cryptography, the algorithm or method that can be used is the vigenere cipher.…”
Section: Introductionmentioning
confidence: 99%