A New Key Generator for Data Encryption Using Chaos in Digital Filter

被引:0
作者
Pich, Reatrey [1 ]
Chivapreecha, Sorawat [2 ]
Prabnasak, Jaruwit [1 ]
机构
[1] King Mongkuts Inst Technol, Int Coll, Bangkok 10520, Thailand
[2] King Mongkuts Inst Technol, Fac Engn, Dept Telecommun Engn, Bangkok 10520, Thailand
来源
2017 IEEE 8TH CONTROL AND SYSTEM GRADUATE RESEARCH COLLOQUIUM (ICSGRC) | 2017年
关键词
cryptography; chaos; chaotic enciyption; digital filter; key generator;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The presented work of this paper is to propose the implementation of chaotic crypto-system with the new key generator using chaos in digital filter for data encryption and decryption. The chaos in digital filter of the second order system is produced by the coefficients which are initialed in the key generator to produce other new coefficients. Private key system using the initial coefficients value condition and dynamic input as password of 16 characters is to generate the coefficients for crypto-system. In addition, we have tension specifically to propose the solution of data security in lightweight cryptography based on external and internal key in which conducts with the appropriate key sensitivity plus high performance. The chaos in digital filter has functioned as the main major in the system. The experimental results illustrate that the proposed data encryption with new key generator system is the high sensitive system with accuracy key test 99% and can make data more secure with high performance.
引用
收藏
页码:87 / 92
页数:6
相关论文
共 50 条
[41]   Monitoring data encryption method for howitzer shell transfer arm using chaos and compressive sensing [J].
Liu, Xi ;
Hou, Baolin ;
Zhao, Qiangqiang .
JOURNAL OF ALGORITHMS & COMPUTATIONAL TECHNOLOGY, 2019, 13
[42]   An improved chaos-based secure communication technique using a novel encryption function with an embedded cipher key [J].
Zaher, Ashraf A. .
CHAOS SOLITONS & FRACTALS, 2009, 42 (05) :2804-2814
[43]   Chaos Theory on Generative Adversarial Networks for Encryption and Decryption of Data [J].
Purswani, Juhi ;
Rajagopal, Rajesh ;
Khandelwal, Riya ;
Singh, Anuraj .
ADVANCES IN BIOINFORMATICS, MULTIMEDIA, AND ELECTRONICS CIRCUITS AND SIGNALS, 2020, 1064 :251-260
[44]   Image Encryption Using Chaos Based Heuristic Diffusion [J].
Manivannan D. ;
Murugan B. .
SN Computer Science, 4 (3)
[45]   A new approach based on artificial neural networks and chaos for designing deterministic random number generator and its application in image encryption [J].
Alloun Y. ;
Azzaz M.S. ;
Kifouche A. .
Multimedia Tools and Applications, 2025, 84 (9) :5825-5860
[46]   Combining Public-Key Encryption with Digital Signature Scheme [J].
Alia, Mohammad Ahmad .
PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON ADVANCED INTELLIGENT SYSTEMS AND INFORMATICS 2016, 2017, 533 :870-878
[47]   A Variable Length Data Encryption Technique using Square Grid Transposition with Key Wrapping [J].
Rao, Allam Appa ;
Shashi, M. ;
Pandarinath, P. ;
Chakka, Sai Pradeep .
INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (05) :295-304
[48]   Period extension method and its implementation for a new type of digital chaotic key sequence generator [J].
Ding, Qun ;
Wang, Lu .
Yi Qi Yi Biao Xue Bao/Chinese Journal of Scientific Instrument, 2011, 32 (10) :2316-2323
[49]   An image encryption scheme based on hybridizing digital chaos and finite state machine [J].
Alawida, Moatsum ;
Teh, Je Sen ;
Samsudin, Azman ;
Alshoura, Wafa Hamdan .
SIGNAL PROCESSING, 2019, 164 :249-266
[50]   A Digital Watermarking Method by Double Encryption Based on Arnold and Chaos in DCT Domain [J].
Song, Jianhua ;
Zhu, Yong .
MECHATRONIC SYSTEMS AND AUTOMATION SYSTEMS, 2011, 65 :104-107