{"title":"通过CHAOS加密数据","authors":"S. Aejaz, I. M. Ghauri","doi":"10.1109/ICICT.2005.1598634","DOIUrl":null,"url":null,"abstract":"Security of information being transmitted or stored is of vital importance. Different encryption schemes have been suggested in this regard. These schemes modify the contents in an apparently random fashion. Chaotic systems are those systems that are governed by a precise set of mathematical equations but exhibit an apparently random behavior. The behavior is also aperiodic and extremely sensitive to initial conditions. This investigation is aimed at describing an encryption mechanism for data using chaotic signals. The complete procedure is presented and demonstrated using examples. The effectiveness of this procedure is also proved.","PeriodicalId":276741,"journal":{"name":"2005 International Conference on Information and Communication Technologies","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2005-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Encrypting Data through CHAOS\",\"authors\":\"S. Aejaz, I. M. Ghauri\",\"doi\":\"10.1109/ICICT.2005.1598634\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Security of information being transmitted or stored is of vital importance. Different encryption schemes have been suggested in this regard. These schemes modify the contents in an apparently random fashion. Chaotic systems are those systems that are governed by a precise set of mathematical equations but exhibit an apparently random behavior. The behavior is also aperiodic and extremely sensitive to initial conditions. This investigation is aimed at describing an encryption mechanism for data using chaotic signals. The complete procedure is presented and demonstrated using examples. The effectiveness of this procedure is also proved.\",\"PeriodicalId\":276741,\"journal\":{\"name\":\"2005 International Conference on Information and Communication Technologies\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2005-08-27\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2005 International Conference on Information and Communication Technologies\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICICT.2005.1598634\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2005 International Conference on Information and Communication Technologies","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICICT.2005.1598634","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Security of information being transmitted or stored is of vital importance. Different encryption schemes have been suggested in this regard. These schemes modify the contents in an apparently random fashion. Chaotic systems are those systems that are governed by a precise set of mathematical equations but exhibit an apparently random behavior. The behavior is also aperiodic and extremely sensitive to initial conditions. This investigation is aimed at describing an encryption mechanism for data using chaotic signals. The complete procedure is presented and demonstrated using examples. The effectiveness of this procedure is also proved.