Fig 1 - available via license: Creative Commons Attribution-ShareAlike 4.0 International
Content may be subject to copyright.
Source publication
In digital computing, cryptographic methods considers performance in both speed and security. This study aims to explore and improve a permutation-based symmetric chaotic cryptography technique called Chaotic Permutation Multicircular (CPMC). In this study, a method is proposed to implement asymmetric key system from CPMC technique by generating a...
Contexts in source publication
Context 1
... Pair Key Finder, the base key is inputted and the resulting pair key is: { 19, 23, 36, 62, 67, 19, 26, 88, 67, 9, 23, 55, 61, 84, 0, 11, 34, 21, 53, 43, 41, 22, 74, 36, 23, 52, 45, 20, 65, 45, 54, 11, 9, 11, 2, 11, 32, 26, 61, 12, 6, 37, 47, 8, 55, 26, 46, 50, 15, 33, 11, 21, 26, 29, 45, 37, 5, 15, 41, 24, 11, 36, 20, 17, 20, 21, 17, 24, 27, 11, 27, 24, 15, 18, 22, 12, 7, 2, 16, 6, 13, 10, 17, 1, 15 , 2, 11, 12, 4, 5, 8, 3, 6, 1, 3, 1, 2, 2, 1}. ...
Context 2
... is applied using both keys in the pair, the encryption result of the base key (key1) is stored in the variable 'ciphertext1' (Figure 10), while the encryption result of the pair key (key2) is stored in the variable 'ciphertext2' (Figure 11). The decryption function test is carried out using the ciphertext generated from the encryption experiment, namely 'ciphertext1' and 'ciphertext2'. ...
Context 3
... is applied using both keys in the pair, the encryption result of the base key (key1) is stored in the variable 'ciphertext1' (Figure 10), while the encryption result of the pair key (key2) is stored in the variable 'ciphertext2' (Figure 11). The decryption function test is carried out using the ciphertext generated from the encryption experiment, namely 'ciphertext1' and 'ciphertext2'. ...
Similar publications
The security risks caused by illegal access increase greatly with the device expansion in the State Grid Intelligent Electrical System. This paper analyzes the necessity of identity authentication of the Intelligent Electrical Terminal with the northern Master Station, the southern end terminal, the same level terminal and other extensive modules i...
The advantages of using mutual information to evaluate the correlation between randomness tests have recently been demonstrated. However, it has been pointed out that the high complexity of this method limits its application in batteries with a greater number of tests. The main objective of this work is to reduce the complexity of the method based...
The research of quantum secure multiparty computation is a subject of great importance in modern cryptography. In this study, we construct a verifiable quantum protocol for dynamic secure multiparty summation based on the cyclic property of d-level MUBs. Our protocol can realize dynamic parameter update in the aspect of members and secret inputs, im...