Security

Cryptography Using Chaotic Neural Network

Download Now Free registration required

Executive Summary

The goal of any cryptographic system is the exchange of information among the intended users without any leakage of information to others who may have unauthorized access to it. In 1976, Diffie and Hellmann found that a common secret key could be created over public channel accessible to any opponent. Since, then many public key cryptography have been presented which are based on number theory and they demand large computational power. Moreover, the process involved in generating public key is very complex and time consuming.

  • Format: PDF
  • Size: 467.59 KB