2016
DOI: 10.1016/j.jare.2015.07.002
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric encryption algorithms using chaotic and non-chaotic generators: A review

Abstract: Graphical abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
46
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
7
1
1

Relationship

0
9

Authors

Journals

citations
Cited by 100 publications
(46 citation statements)
references
References 41 publications
0
46
0
Order By: Relevance
“…The combined chaotic system tends to overcome the disadvantages of 1D and higher order chaotic maps [37][38][39][40][41][42][43][44][45]. In [44], three 1D combined chaotic maps are proposed to achieve the tradeoff between computational cost and security.…”
Section: Introductionmentioning
confidence: 99%
“…The combined chaotic system tends to overcome the disadvantages of 1D and higher order chaotic maps [37][38][39][40][41][42][43][44][45]. In [44], three 1D combined chaotic maps are proposed to achieve the tradeoff between computational cost and security.…”
Section: Introductionmentioning
confidence: 99%
“…The key space should be large enough to resist the attacks such as brute force attack as much as possible. Here we determine the initial conditions and canonical parameters x 0 , y 0, z 0, , , , SK 1 , SK 2 and SK 3 as keys. The computational precision of the floating point number is about 10 14 , so the key space can grow up to 10 126 this is large enough to beat out the attacks.…”
Section: B Key Space Analysismentioning
confidence: 99%
“…Considering the fact that a good cipher should generate cipher-images that cannot be discerned from true random images in order to prevent entropy attacks and reduce the information leakage [32]. Therefore, entropy of encryptedimages should approach the maximum possible value.…”
Section: Information Entropy Analysismentioning
confidence: 99%
“…Differential cryptanalysis aims to reveal some insightful relationships between the encrypted and plain images by figuring out the effects of a tiny change (e.g., just a single pixel) in plain-images on their corresponding cipher-images [32]. Hence one of the vital assessment for a cipher is to measure to what extent a minor change in plain-image can yield a completely different ciphered images.…”
Section: Cipher Cycle Analysismentioning
confidence: 99%