2017
DOI: 10.5815/ijcnis.2017.04.01
|View full text |Cite
|
Sign up to set email alerts
|

Symmetric Key Encryption using Iterated Fractal Functions

Abstract: Abstract-With the advancement in the network transmission media, need for secure data communication is strongly felt. Recently fractal based cryptosystem has become a topic of active research in computer network system because of its chaotic behavior. The proposed method utilizes the intrinsic relationship between Mandelbrot function and Julia function to develop a nontransitional key cryptosystem. The process starts with the formation of public key using superior Mandelbrot set with the help of few global as … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
7
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
7
2

Relationship

2
7

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 26 publications
(23 reference statements)
0
7
0
Order By: Relevance
“…Later, in 2004, an approach was suggested to use fractal based encryption/decryption key and USA navy published the patent for the same [35]. There are numerous fractal functions, that can be employed in many applications such as Mandelbrot set, Julia set and more [36]. In this paper a conjugate transcendental fractal function is used to create a set of initial values.…”
Section: Related Workmentioning
confidence: 99%
“…Later, in 2004, an approach was suggested to use fractal based encryption/decryption key and USA navy published the patent for the same [35]. There are numerous fractal functions, that can be employed in many applications such as Mandelbrot set, Julia set and more [36]. In this paper a conjugate transcendental fractal function is used to create a set of initial values.…”
Section: Related Workmentioning
confidence: 99%
“…Some of the described algorithms have been mentioned earlier in previous articles of the author [1][2][3][4][5][6][7], but some names, designations, definitions, steps and actions may be partially or completely different, due to constant research and development of this "family" of algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…Cryptography first appeared applying a symmetric algorithm or the so-called secret key algorithm or secret cipher. Where, this algorithm also has the same encryption key as the decryption key [4].…”
Section: Introductionmentioning
confidence: 99%