Detailed Information

Cited 2 time in webofscience Cited 8 time in scopus
Metadata Downloads

Cryptanalysis of encryption scheme based on compound coupled logistic map and anti-codifying technique for secure data transmission

Full metadata record
DC Field Value Language
dc.contributor.authorMunir, Noor-
dc.contributor.authorKhan, Majid-
dc.contributor.authorHussain, Iqtadar-
dc.contributor.authorAlanazi, Ammar S.-
dc.date.accessioned2023-07-11T06:40:40Z-
dc.date.available2023-07-11T06:40:40Z-
dc.date.created2023-07-11-
dc.date.issued2022-10-01-
dc.identifier.issn0030-4026-
dc.identifier.urihttps://scholarworks.bwise.kr/gachon/handle/2020.sw.gachon/88422-
dc.description.abstractThe aim of this article is to provide cryptanalysis of chaos-based technique based on anti-codifying mechanism. The use of chaos in information security is deemed a secure trace of randomness. Many cryptosystems offer robust security against classical attacks having vulnerability in their structure. Recently, a compound coupled logistic chaotic map-based image encryption scheme was suggested. The encryption structure reveals some security flaws in the implementation. The original model includes input-independent swapping and substitution-based operations. In this work, we have intended a chosen-plaintext attack on a recently offered cryptosystem and suggested an anti-codifying technique for secure data transmission. The simulation and experimental outcomes reveal that the improvement suggestions can resist classical attacks.-
dc.language영어-
dc.language.isoen-
dc.publisherELSEVIER GMBH-
dc.relation.isPartOfOPTIK-
dc.titleCryptanalysis of encryption scheme based on compound coupled logistic map and anti-codifying technique for secure data transmission-
dc.typeArticle-
dc.type.rimsART-
dc.description.journalClass1-
dc.identifier.wosid000835163200001-
dc.identifier.doi10.1016/j.ijleo.2022.169628-
dc.identifier.bibliographicCitationOPTIK, v.267-
dc.description.isOpenAccessN-
dc.identifier.scopusid2-s2.0-85134893358-
dc.citation.titleOPTIK-
dc.citation.volume267-
dc.contributor.affiliatedAuthorMunir, Noor-
dc.type.docTypeArticle-
dc.subject.keywordAuthorChaotic encryption-
dc.subject.keywordAuthorCryptanalysis-
dc.subject.keywordAuthorAnti-codifying technique-
dc.subject.keywordAuthorChosen-plaintext attack-
dc.subject.keywordPlusSEMI-TENSOR PRODUCT-
dc.subject.keywordPlusIMAGE ENCRYPTION-
dc.subject.keywordPlusALGORITHM-
dc.subject.keywordPlusPERMUTATION-
dc.subject.keywordPlusDIFFUSION-
dc.relation.journalResearchAreaOptics-
dc.relation.journalWebOfScienceCategoryOptics-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
Files in This Item
There are no files associated with this item.
Appears in
Collections
ETC > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher ,  photo

,
College of IT Convergence (컴퓨터공학부(스마트보안전공))
Read more

Altmetrics

Total Views & Downloads

BROWSE