ACCENTS Transactions on Information Security (TIS) ISSN (Print): XXXX ISSN (Online): 2455-7196 Volume - 2 Issue - 5 January - 2017

  1. Google Scholar
Application of chaos theory in data security-a survey

Sheela S.and S. V. Sathyanarayana

Abstract

In cryptography key sequence generation is one of the important areas. Earlier pseudo random number generators were used as key sequence in stream cipher. After the evolution of chaotic systems, it was found that properties of chaotic systems are more superior to pseudo random number generators. In this context, we have tried to explore the basic theoretical background of chaotic systems, their types and properties in this paper. Along with chaotic systems, sequence generation using chaotic systems and the application of sequences in various image encryption methods is also discussed. Finally, a suitable key sequence generation using chaotic system is proposed.

Keyword

Chaotic functions, Sequence generation, Image encryption, Chaotic systems.

Cite this article

.Application of chaos theory in data security-a survey. ACCENTS Transactions on Information Security. 2017;2(5):1-15. DOI:10.19101/TIS.2017.25001

Refference