Cryptanalysis Driven Chaotic Image Encryption And Its Applications

Download Cryptanalysis Driven Chaotic Image Encryption And Its Applications full books in PDF, epub, and Kindle. Read online free Cryptanalysis Driven Chaotic Image Encryption And Its Applications ebook anywhere anytime directly on your device. Fast Download speed and no annoying ads. We cannot guarantee that every ebooks is available!

Cryptanalysis-Driven Chaotic Image Encryption and Its Applications

Cryptanalysis-Driven Chaotic Image Encryption and Its Applications
Author :
Publisher : Scientific Research Publishing, Inc. USA
Total Pages : 202
Release :
ISBN-10 : 9781649975454
ISBN-13 : 1649975457
Rating : 4/5 (457 Downloads)

Book Synopsis Cryptanalysis-Driven Chaotic Image Encryption and Its Applications by : Heping Wen

Download or read book Cryptanalysis-Driven Chaotic Image Encryption and Its Applications written by Heping Wen and published by Scientific Research Publishing, Inc. USA. This book was released on 2022-12-27 with total page 202 pages. Available in PDF, EPUB and Kindle. Book excerpt: Chaos cryptography is an inter discipline that combines chaotic theory and cryptography, which includes chaotic secure communication system, chaotic symmetric cipher, chaotic public key cipher and chaotic hash function [1]. In this academic monograph, the main object of our discussion is symmetric chaotic cryptography. The block diagram of symmetrical encryption and communication transmission is shown as Figure 1 [2]. The encryption process is ( , ) EK =CP, in which P means plaintext while K means secret key and () E ? represents encryption function. Alice sends the ciphertext which has been encrypted to Bob, the receiving end. Bob makes use of the same secret key which is sent by a secure channel to decrypt and recover the original plaintext ( , ) DK =PC, in which ()D ? is the decryption function. For an attacker Oscar, the ciphertext C is available but the secret key for the secure channel transmission is not known.


Cryptanalysis-Driven Chaotic Image Encryption and Its Applications Related Books