****Popular Article**** Message Embedded Cipher Using 2-D Chaotic Map Mina Mishra 1 and V.H. Mankar 2 A BSTRACT This paper constructs two encryption methods using 2-D chaotic maps, Duffings and Arnold’s cat maps respectively. Both of the methods are designed usin g message embedded scheme and are analyzed for their validity, for plaintext sensitivity, key sens itivity, known plaintext and brute-force attacks. D ue to the less key space generally many chaotic cryptosystem developed are found to be weak against Brute force attack which is an essential issue to be solved. Fo r this issue, concept of identifiability proved to be a necessary condition to be fulfilled by the designed chaotic cipher to resist brute force attack, which is a basic attack. As 2-D chaotic maps provide more key space than 1-D maps thus they are considered to be more suitable. This work is accompanied with analys is results obtained fro...