PQ key-a novel key generation algorithm for processing big data using quantum computing

Author(s):  
K.G. Pradeep Kumar
2015 ◽  
Vol 743 ◽  
pp. 379-384 ◽  
Author(s):  
Zhang Li Lan ◽  
Lin Zhu ◽  
Yi Cai Li ◽  
Jun Liu

Key space will be reduced after using the traditional DES algorithm to directly encrypt color images. Through combining the chaotic capability of the logistic function and by means of a specific algorithm, the fake chaotic son key’s space which is produced by the logistic chaotic pseudo-random function could be acquired. Then use the key generation algorithm to replace the traditional DES key generation algorithm. Experiment illustrates that the proposed algorithm has stronger robustness and anti-jamming capability to noise, and larger key’s space, sensitive initial keys, and better encryption effect, meanwhile it is better immune to multiple attacks.


2016 ◽  
Vol 45 (2) ◽  
pp. 199-213 ◽  
Author(s):  
Alejandro Cabrera Aldaya ◽  
Raudel Cuiman Márquez ◽  
Alejandro J. Cabrera Sarmiento ◽  
Santiago Sánchez-Solano

2020 ◽  
Vol 47 (2) ◽  
pp. 216-225
Author(s):  
Sangrok Lee ◽  
Jiwoo Park ◽  
Sooyong Park

2018 ◽  
Vol 44 (2) ◽  
pp. 35-40
Author(s):  
Tanya jabor ◽  
Hiba Taresh ◽  
Alaa Raheema

All the important information is exchanged between facilities using the internet and networks, all these data should besecret and secured probably, the personal information of person in each of these institutions day by day need to organized secretlyand the need of the cryptography systems is raised which can easily encrypt the personal and critical data and it can be shared withother centers via internet without and concerns about privacy. Chaotic performance is added to different phases of AES but very few apply it on key generation and choosing ChebyshevPolynomial will provide a chaotic map which will led to random strong key. our system based on modified advanced encryptionstandard (AES) , with encryption and decryption in real time taking to consideration the criticality of data images that beenencrypted the main encryption algorithm is the same the modification is done by replacing the key generation algorithm byChebyshev Polynomial to generate key with the required key size.


Sign in / Sign up

Export Citation Format

Share Document