International Journal of Computer Applications |
Foundation of Computer Science (FCS), NY, USA |
Volume 130 - Number 10 |
Year of Publication: 2015 |
Authors: Yamini Goyal, Geet Kalani, Shreya Sharma |
10.5120/ijca2015907082 |
Yamini Goyal, Geet Kalani, Shreya Sharma . 2-Step Logistic map Chaotic Cryptography using Dynamic Look-up Table. International Journal of Computer Applications. 130, 10 ( November 2015), 20-24. DOI=10.5120/ijca2015907082
Encryption is to reorganize the message into discrepancy form so that the message is keep secret. The goal of encryption is to give an easy and inexpensive means of encryption and decryption to all authoritative users in possession of the suitable key and difficult and expensive means to estimate the plain text without use of the key. The Baptista proposed a Chaotic Encryption technique, which seems to be much better than traditional encryption methods used today. Chaotic encryption is the new trend of cryptography. It makes use of chaotic system properties such as sensitive to initial condition and lot of information. It is possible to encrypt a message (a text composed by some alphabet) using the Ergodic property of the simple low-dimensional and chaotic logistic equation. But it still has several problems, such as slow in speed and suffering from floating point operations and has less security. This paper is to overcome these problems with dynamic loop up table.