Loading

Novel Method of Secure Communication using Logistic Map
Supriya Khaitan1, Rashi Agarwal2, Mandeep Kaur3

1Supriya Khaitan, Research Scholar, Assistant Professor, Department of CSE, SET Sharda University, (Uttar Pradesh), India.
2Rashi Agarwal, Master, Department of Computer Applications, Galgotia College of Engineering & Technology, (Uttar Pradesh), India.
3Mandeep Kaur, Department of CSE, SET Sharda University, (Uttar Pradesh), India.
Manuscript received on 06 August 2019 | Revised Manuscript received on 29 August 2019 | Manuscript Published on 05 September 2019 | PP: 603-605 | Volume-8 Issue-2S7 July 2019 | Retrieval Number: B10840782S719/2019©BEIESP | DOI: 10.35940/ijrte.B1084.0782S719
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Significant research efforts have been invested in recent years to export new concepts for secure cryptographic methods. Many mathematicians are attracted by Chaos functions as it has sensitive nature toward its initial conditions and their colossal suitability to problems in daily life. Inspired by new researches, a new chaotic cryptography algorithm is proposed in this paper. The key feature of this approach is that instantaneous key is generated at host independently that is used to determine the type of operations on each pixel. The information available in images is 24 bit RGB these value are modified mathematically using eight reversible operations. Also during encryption, the control parameter of the chaotic system is updated timely.
Keywords: Chaotic Map, Encryption, Decryption, Security, Logistic Map.
Scope of the Article: 6G Communication