Asymmetric Key Cryptography

Asymmetric Key Cryptography

Source publication
Article
Full-text available
In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a...

Contexts in source publication

Context 1
... Pair Key Finder, the base key is inputted and the resulting pair key is: { 19, 23, 36, 62, 67, 19, 26, 88, 67, 9, 23, 55, 61, 84, 0, 11, 34, 21, 53, 43, 41, 22, 74, 36, 23, 52, 45, 20, 65, 45, 54, 11, 9, 11, 2, 11, 32, 26, 61, 12, 6, 37, 47, 8, 55, 26, 46, 50, 15, 33, 11, 21, 26, 29, 45, 37, 5, 15, 41, 24, 11, 36, 20, 17, 20, 21, 17, 24, 27, 11, 27, 24, 15, 18, 22, 12, 7, 2, 16, 6, 13, 10, 17, 1, 15 , 2, 11, 12, 4, 5, 8, 3, 6, 1, 3, 1, 2, 2, 1}. ...
Context 2
... is applied using both keys in the pair, the encryption result of the base key (key1) is stored in the variable 'ciphertext1' (Figure 10), while the encryption result of the pair key (key2) is stored in the variable 'ciphertext2' (Figure 11). The decryption function test is carried out using the ciphertext generated from the encryption experiment, namely 'ciphertext1' and 'ciphertext2'. ...
Context 3
... is applied using both keys in the pair, the encryption result of the base key (key1) is stored in the variable 'ciphertext1' (Figure 10), while the encryption result of the pair key (key2) is stored in the variable 'ciphertext2' (Figure 11). The decryption function test is carried out using the ciphertext generated from the encryption experiment, namely 'ciphertext1' and 'ciphertext2'. ...
Context 4
... is performed using the PCMP key as opposed to the key used for encryption. 'ciphertext1' is decrypted using the key pair 'key2' (Figure 12), while 'ciphertext2' is decrypted using the base key 'key1'. ...

Similar publications

Chapter
Full-text available
The security risks caused by illegal access increase greatly with the device expansion in the State Grid Intelligent Electrical System. This paper analyzes the necessity of identity authentication of the Intelligent Electrical Terminal with the northern Master Station, the southern end terminal, the same level terminal and other extensive modules i...
Article
Full-text available
The advantages of using mutual information to evaluate the correlation between randomness tests have recently been demonstrated. However, it has been pointed out that the high complexity of this method limits its application in batteries with a greater number of tests. The main objective of this work is to reduce the complexity of the method based...
Article
Full-text available
The research of quantum secure multiparty computation is a subject of great importance in modern cryptography. In this study, we construct a verifiable quantum protocol for dynamic secure multiparty summation based on the cyclic property of d-level MUBs. Our protocol can realize dynamic parameter update in the aspect of members and secret inputs, im...