Skip to main content

Posts

Showing posts from June, 2021
 ****Popular Article**** Message Embedded Cipher Using 2-D Chaotic Map Mina Mishra 1 and V.H. Mankar 2 A BSTRACT   This paper constructs two encryption methods using 2-D chaotic maps, Duffings and Arnold’s cat maps respectively. Both of the methods are designed usin g message embedded scheme and are analyzed for their validity, for plaintext sensitivity, key sens itivity, known plaintext and brute-force attacks. D ue to the less key space generally many chaotic cryptosystem developed are found to be weak against Brute force attack which is an essential issue to be solved. Fo r this issue, concept of identifiability proved to be a necessary condition to be fulfilled by the designed chaotic cipher to resist brute force attack, which is a basic attack. As 2-D chaotic maps provide more key space than 1-D maps thus they are considered to be more suitable. This work is accompanied with analys is results obtained fro...
  #AIRCC #IJCCMS Call for Papers..!!! #Simulation #Modeling #optimization #choas International Journalof Chaos, Control, Modelling and Simulation (IJCCMS) Web page UR L: http://airccse.org/journal/ijccms/index.html A Review on Predictive Analytics in Data Mining   Originial Source URL : http://airccse.org/journal/ijccms/papers/5316ijccms01.pdf   Submission URL : http://coneco2009.com/submissions/imagination/home.html   Contact Us: ijccms@aircconline.com