(Publisher of Peer Reviewed Open Access Journals)

ACCENTS Transactions on Information Security (TIS)

ISSN (Print):XXXX    ISSN (Online):2455-7196
Volume-2 Issue-5 January-2017
Full-Text PDF
DOI:10.19101/TIS.2017.25001
Paper Title : Application of chaos theory in data security-a survey
Author Name : Sheela S.and S. V. Sathyanarayana
Abstract :

In cryptography key sequence generation is one of the important areas. Earlier pseudo random number generators were used as key sequence in stream cipher. After the evolution of chaotic systems, it was found that properties of chaotic systems are more superior to pseudo random number generators. In this context, we have tried to explore the basic theoretical background of chaotic systems, their types and properties in this paper. Along with chaotic systems, sequence generation using chaotic systems and the application of sequences in various image encryption methods is also discussed. Finally, a suitable key sequence generation using chaotic system is proposed.

Keywords : Chaotic functions, Sequence generation, Image encryption, Chaotic systems.
Cite this article : Sheela S.and S. V. Sathyanarayana, " Application of chaos theory in data security-a survey " , ACCENTS Transactions on Information Security (TIS), Volume-2, Issue-5, January-2017 ,pp.1-15.DOI:10.19101/TIS.2017.25001