Performance Evaluation of Chaotic Encryption Technique
- 1 School of Information Technology and Engineering, VIT University, Vellore, Tamil Nadu, India
Abstract
Drastic growth in multimedia communication resulted to numerous security issues in the transmission of data. Moreover, the network used for the digital communication does not provide much security for the data transfer. During this time, tens of millions people using the internet options for essential communication and is being a tool for commercial field increased, So that security is an enormously important issue to deal with. We need to be protected confidentiality of data and provide secure connections for it. Hence we necessitate recognizing the different aspects of security and their applications. Many of these applications ranging from secure commerce, protecting passwords or pin and payments to private communications. As we know that, Cryptography is now becoming an essential aspect of the secure communication. Cryptography is the science of writing secret code with confident algorithm and key. The basic components of cryptography are encryption and decryption algorithms, digital signature and hashed message authentication code. We know that encryption is the synonym of cryptography. Different kinds of encryption are used in this modern era. Chaotic encryption is the type of the encryption which has adopted the concept of chaos. In this study, we are studying the history of cryptography until chaotic cryptography and analyzing the performance of chaotic encryption technique. The evaluation is performed in terms of encryption speed, the CPU utilization with time and the battery power consumption. The experimental results are specified the efficiency of the algorithms.
DOI: https://doi.org/10.3844/ajassp.2013.35.41
Copyright: © 2013 Ancy Mariam Babu and K. John Singh. This is an open access article distributed under the terms of the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original author and source are credited.
- 3,312 Views
- 3,927 Downloads
- 5 Citations
Download
Keywords
- Chaotic Encryption
- Chaotic Video Encryption Scheme
- Non-Linear Chaotic Algorithm
- Escrowed Encryption Scheme
- Scaleable Encryption Algorithm