A STUDY AND IMPLEMENTATION OF ENCRYPTION, WITH EMPHASIS ON CHAOTIC MAPS

The security of data transmitted over public communication networks and valuable data storage have necessitated the need for very secure cryptography. Applications like video teleconferencing, cable TV broadcast, etc use encryption extensively. Hence researches for better ways of protecting data...

Full description

Saved in:
Bibliographic Details
Main Author: TEBOHO M., LEEPILE
Format: Final Year Project
Language:English
Published: Universiti Teknologi Petronas 2006
Subjects:
Online Access:http://utpedia.utp.edu.my/6773/1/2006%20-%20A%20STUDY%20AND%20IMPLEMENTATION%20OF%20ENCRYPTION%2C%20WITH%20EMPHASIS%20ON%20CHAOTIC%20MAPS.pdf
http://utpedia.utp.edu.my/6773/
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:The security of data transmitted over public communication networks and valuable data storage have necessitated the need for very secure cryptography. Applications like video teleconferencing, cable TV broadcast, etc use encryption extensively. Hence researches for better ways of protecting data are still underway. And this project was aimed at finding secure cipher by implementing Logistic Map Cipher for plaintext encryption and decryption. The research was based on both symmetric ciphers and asymmetric ciphers. The symmetric cryptosystem was chosenand finally implemented. In trying to implement logistic map, Chaotic Maps were briefly analyzed and other types of encryption were investigated in order to understand intensive and extensive applications of cryptography. The three main parts of focus are keys' generator, the encryption and decryption parts, which are the main steps before cryptanalysis can be carried out. In encryption, the individual success of different parts will guarantee a complete cipher.