Security

Survey Report on Chaos Based Public-key Cryptosystem

Free registration required

Executive Summary

In recent years, encryption technology has been developed rapidly the chaos based cryptographic algorithms. Chaos owns certain critical properties such as sensitive dependence on initial condition, random-like behavior, and continuous broadband power spectrum, which match the confusion, diffusion, and key sensitivity requirements for cryptography. Chaos based cryptographic offer sundry features over the traditional encryption algorithms such as high security, speed, and sensible computational overheads and power. This paper presents a survey of public key encryption methods based on chaos system.

  • Format: PDF
  • Size: 423.14 KB