2022
DOI: 10.47760/ijcsmc.2022.v11i11.006
|View full text |Cite
|
Sign up to set email alerts
|

Text Files Protection using Chaotic Logistic Keys

Abstract: Text file some times contains secret or personal data which requires for protection from being hacked by unauthorized data hackers. In this research paper a simple, efficient and highly secure method of text file cryptography will be introduced. The text file will be divided into partitions with small sizes to increase the cryptography process throughput. Each partition will be encrypted-decrypted using its associated secret key. Each secret key will be generated from a chaotic logistic map by running a chaoti… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 25 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?