Implementation of Various Cryptosystem Using Chaos
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 4
Abstract
Cryptography is the science of secret codes, enabling the confidentiality of communication through an insecure channel to make the system more complex and robust Chaos is applied in the various cryptographic algorithms. In this paper we use most commonly used algorithm AES, RC5, IDEA, RSA, ELGamal. In this paper firstly we implement all the algorithm in MATLAB then Chaos is applied on it. After applying Chaos in these algorithms we observe that both Security and Speed increases as compare to the conventional cryptographic algorithm.
Authors and Affiliations
Bhavana Agrawal
Data Usage Monitor for a Shared Wireless NetworkConnection
Abstract: This paper proposes a novel method to monitor and control the network usage of a shared wirelessconnection. The main objective of this technique is to balance and restrict the shared network data. It faci...
Gauging the Performance of Re-routing in VANET Using Moments
Abstract: Conventional routing protocols are not applicable for VANETs due their specific network characteristics i.e. frequent network topology and frequent disconnections. Data Fusion techniques are combined with local...
Analysis of Time Complexities and Accuracy of Depression FillingAlgorithms in DEM
Abstract: The recent development of digital representation has stimulated the development of automaticextraction of topographic and hydrologic information from Digital Elevation Model (DEM). A DEM is used tocreate hydrol...
Implementation of Cellular IP and Its Performance Analysis
In the current Cellular IP architecture, only one gateway serves the entire CIP network. So, the gateway is single point of failure for all the mobile hosts who rely on it to be connected to the Internet. Cellul...
Mining Weakly Labeled Web Facial Images For Search-BasedFace Annotation
Abstract: This paper investigates a framework of search-based face annotation (SBFA) by mining weaklylabeled facial images that are freely available on the World Wide Web (WWW). One challenging problem forsearch-based fa...