all InfoSec news
A review of cryptosystems based on multi layer chaotic mappings. (arXiv:2208.06002v1 [cs.CR])
Aug. 15, 2022, 1:20 a.m. | Awnon Bhowmik, Emon Hossain, Mahmudul Hasan
cs.CR updates on arXiv.org arxiv.org
In recent years, a lot of research has gone into creating multi-layer chaotic
mapping-based cryptosystems. Random-like behavior, a continuous broadband power
spectrum, and a weak baseline condition dependency are all characteristics of
chaotic systems. Chaos could be helpful in the three functional components of
compression, encryption, and modulation in a digital communication system. To
successfully use chaos theory in cryptography, chaotic maps must be built in
such a way that the entropy they produce can provide the necessary confusion
and …
More from arxiv.org / cs.CR updates on arXiv.org
Jobs in InfoSec / Cybersecurity
Information Technology Specialist II: Network Architect
@ Los Angeles County Employees Retirement Association (LACERA) | Pasadena, CA
Cybersecurity Skills Challenge -- Sponsored by DoD
@ Correlation One | United States
Security Operations Center (SOC) Analyst
@ GK Cybersecurity Group | Remote
Cyber Consultant
@ Frazer-Nash Consultancy | Gloucester, England, United Kingdom
Senior Vulnerability Management Reporting & Analytics Developer
@ Baker Hughes | IN-KA-BANGALORE-NEON BUILDING WEST TOWER
Product Security Architect
@ ChargePoint | Italy