Enhance the performance of Chaotic Generator in the Filed of Cryptography: A Secret Key Generation Approach

Sona Mishra
Sona Mishra
Asst. Prof. Amit Mishra
Asst. Prof. Amit Mishra
Rajiv Gandhi Technical University Rajiv Gandhi Technical University

Send Message

To: Author

Enhance the performance of Chaotic Generator in the Filed of Cryptography: A Secret Key Generation  Approach

Article Fingerprint

ReserarchID

V8F24

Enhance the performance of Chaotic Generator in the Filed of Cryptography: A Secret Key Generation  Approach Banner

AI TAKEAWAY

Connecting with the Eternal Ground
  • English
  • Afrikaans
  • Albanian
  • Amharic
  • Arabic
  • Armenian
  • Azerbaijani
  • Basque
  • Belarusian
  • Bengali
  • Bosnian
  • Bulgarian
  • Catalan
  • Cebuano
  • Chichewa
  • Chinese (Simplified)
  • Chinese (Traditional)
  • Corsican
  • Croatian
  • Czech
  • Danish
  • Dutch
  • Esperanto
  • Estonian
  • Filipino
  • Finnish
  • French
  • Frisian
  • Galician
  • Georgian
  • German
  • Greek
  • Gujarati
  • Haitian Creole
  • Hausa
  • Hawaiian
  • Hebrew
  • Hindi
  • Hmong
  • Hungarian
  • Icelandic
  • Igbo
  • Indonesian
  • Irish
  • Italian
  • Japanese
  • Javanese
  • Kannada
  • Kazakh
  • Khmer
  • Korean
  • Kurdish (Kurmanji)
  • Kyrgyz
  • Lao
  • Latin
  • Latvian
  • Lithuanian
  • Luxembourgish
  • Macedonian
  • Malagasy
  • Malay
  • Malayalam
  • Maltese
  • Maori
  • Marathi
  • Mongolian
  • Myanmar (Burmese)
  • Nepali
  • Norwegian
  • Pashto
  • Persian
  • Polish
  • Portuguese
  • Punjabi
  • Romanian
  • Russian
  • Samoan
  • Scots Gaelic
  • Serbian
  • Sesotho
  • Shona
  • Sindhi
  • Sinhala
  • Slovak
  • Slovenian
  • Somali
  • Spanish
  • Sundanese
  • Swahili
  • Swedish
  • Tajik
  • Tamil
  • Telugu
  • Thai
  • Turkish
  • Ukrainian
  • Urdu
  • Uzbek
  • Vietnamese
  • Welsh
  • Xhosa
  • Yiddish
  • Yoruba
  • Zulu
Font Type
Font Size
Font Size
Bedground

Abstract

The main focus of this research paper is to propose and improvement of the data security using encryption and decryption method in ANN based chaotic generator of original value. The Binary value sequence of ASCII CODE is converted with two initial parameter, and converted value is again decrypted with same initial parameter. In which consists of Binary value of ASCII Code, chaotic neural network algorithm was used for encryption and decryption and it generates the chaotic sequence of random value for each A to Z letter. The generated random value is the encrypted binary ASCII values of A to Z sequence of original ASCII Code binary value, with same initial parameter. For simulation MATLAB software is used. This paper also includes improved experimental results and complete demonstration that ANN Based Chaotic Generator is successfully perform the cryptography.

References

9 Cites in Article
  1. B Shweta,Suryawanshi,D Devesh (2012). Nawgaje-a triple-key chaotic neural network for cryptography in image processing International Journal of Engineering Sciences & Emerging Technologies.
  2. Tatiana Estrina,Alvin Huang,Vincent Hui,Kristen Sarmiento (2021). TRANSITIONING ARCHITECTURAL PEDAGOGY INTO THE VIRTUAL ERA VIA DIGITAL LEARNING METHODS.
  3. Dalkiran Ilker (2010). Kenan DANIS¸MAN -Artificial neural network based chaotic generator for cryptology.
  4. Jason Wright Milos Manic -Neural Network Approach to Locating Cryptography in Object Code.
  5. Eva Volna,Martin Kotyrba,Vaclav Kocian,Michal Janosek (2012). Cryptography Based On Neural Network.
  6. M Karam,Mohammed Othman,Al (2011). JAMMAS -IMPLEMENTATION OF NEURAL -CRYPTOGRAPHIC SYSTEM USING FPGA.
  7. Harpreet Kaur (2011). Tripatjot Singh Panag CRYPTOGRAPHY.
  8. E Laskari,G Meletiou,D Tasoulis,M Vrahatis (2006). Studying the performance of artificial neural networks on problems related to cryptography.
  9. Scott Su,Alvin Lin,Jui-Cheng Yen (2012). Design and realization of a new chaotic neural encryption/decryption network.

Funding

No external funding was declared for this work.

Conflict of Interest

The authors declare no conflict of interest.

Ethical Approval

No ethics committee approval was required for this article type.

Data Availability

Not applicable for this article.

How to Cite This Article

Sona Mishra. 2015. \u201cEnhance the performance of Chaotic Generator in the Filed of Cryptography: A Secret Key Generation Approach\u201d. Global Journal of Computer Science and Technology - D: Neural & AI GJCST-D Volume 15 (GJCST Volume 15 Issue D1).

Download Citation

Journal Specifications

Crossref Journal DOI 10.17406/gjcst

Print ISSN 0975-4350

e-ISSN 0975-4172

Keywords
Classification
GJCST-D Classification D.4.6
Version of record

v1.2

Issue date
November 4, 2015

Language
en
Experiance in AR

Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.

Read in 3D

Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.

Article Matrices
Total Views: 8068
Total Downloads: 1986
2026 Trends
Related Research
Our website is actively being updated, and changes may occur frequently. Please clear your browser cache if needed. For feedback or error reporting, please email [email protected]

Request Access

Please fill out the form below to request access to this research paper. Your request will be reviewed by the editorial or author team.
X

Quote and Order Details

Contact Person

Invoice Address

Notes or Comments

This is the heading

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

High-quality academic research articles on global topics and journals.

Enhance the performance of Chaotic Generator in the Filed of Cryptography: A Secret Key Generation Approach

Sona Mishra
Sona Mishra <p>Rajiv Gandhi Technical University</p>
Asst. Prof. Amit Mishra
Asst. Prof. Amit Mishra

Research Journals