2023
DOI: 10.7753/10.7753/ijcatr1205.1002
|View full text |Cite
|
Sign up to set email alerts
|

Protocol Build by the Chaotic Map and Magic Square for Exchange Key Share

Abstract: In order to reach the level of security between the two parties or a group of parties in the communication channel, the inputs of the protocol algorithm must be characterized by the sensitivity of the initial parameters and conditions involved in the chaotic functions with great ability to change in any very slight manipulation of the inputs by the attacker or intruder because there will be Much of the fundamental change in the values of the shared keys of the two parties or participants in the system, as well… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 18 publications
(23 reference statements)
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?