The chaotic encryption technology discussed in this study was the third generation, chaotic secret communication technology. It had a greater breakthrough in both theory and practice and had higher security and practicability, which basically met the needs of con- temporary people.
Nov 11, 2019 · Chaotic encryption technology has high sensitivity, orderliness and matching. It is an effective network communication security technology. It ...
People also ask
Which technology can be used in encrypting the message to provide confidentiality?
What technology is used to create encrypted connection over a less secure network in response to government imposed security restrictions?
Zhongmin Cai: Security and confidentiality of network communication using chaotic encryption technology. J. Comput. Methods Sci. Eng. 19(4): 1083-1092 (2019).
Q. Huang, Analysis on the security enhancement model of communication system based on chaotic encryption and analytic hierarchy process, (10) (2016), 28–30.
A variety of flaws weaken the efficacy of a new chaos-based encryption algorithm for secure communication networks, which is a major concern [1]. Recent ...
Apr 27, 2024 · The efficacy of chaotic encryption lies in its ability to generate keys with high entropy, rendering brute-force attacks computationally ...
The use of robust information hiding with chaotic encryption presents a multi-level security to the data, besides providing check on data integrity. Multiple ...
Oct 23, 2024 · This paper presents a pioneering approach to bolstering network security and privacy by implementing chaotic optical communication with a hybrid optical ...
This research introduces an innovative image encryption technique that is based on a modified Skew Tent chaotic map.
Aug 29, 2022 · The purpose of this paper is to study the application of data encryption technology in computer network communication to provide better suggestions and explore ...