Crypto Key Protection Generated from Images and Chaotic Logistic Maps
Autor: | Vinjamuri Janaki, P. KumarSwamy, Kalyanapu Srinivas, Vuppu Shankar |
---|---|
Rok vydání: | 2021 |
Předmět: |
Scheme (programming language)
Focus (computing) Key generation business.industry Strong key Computer science TheoryofComputation_GENERAL Cryptography Computer security computer.software_genre Image (mathematics) Symmetric-key algorithm Key (cryptography) business computer computer.programming_language |
Zdroj: | Communications in Computer and Information Science ISBN: 9789811636523 |
DOI: | 10.1007/978-981-16-3653-0_21 |
Popis: | Cryptography is a mechanism used for protection of valuable information from unacceptable users in the networking world. It’s a challenging task to protect such assets from illegal users. This necessitated for the development of Cryptographic techniques to provide security as large volumes of digital data traveling through the shared media. These techniques range from traditional security systems to crypto image techniques. This brings forward to focus on cryptographic techniques that have strong algorithm and strong key. The strength of any crypto algorithm depends on the strongness of the crypto key used. Therefore, both the algorithm technique and key generation methodology are equally important. This motivated to propose and concentrate on a novel scheme that includes crypto key generation and crypto key protection where the protected key and its methodology cannot be traced by an ineligible user. |
Databáze: | OpenAIRE |
Externí odkaz: |