Search results

Filters

  • Journals
  • Authors
  • Keywords
  • Date
  • Type

Search results

Number of results: 2
items per page: 25 50 75
Sort by:
Download PDF Download RIS Download Bibtex

Abstract

This paper constructs a six-term new simple 3D jerk system modeled by chaotic model memory oscillators with four parameters that control the behavior. The suitable choice of one of these parameters helps the system describe behavior and attractors. This means that the choice is a parameter of the associated behavior (dissipative or conservative) and attractors (self-excited or hidden). Some features of the equilibrium are observed that are related to the dependence on these parameters, such as saddle-foci, non-hyperbolic, and node-foci. This system is rich in dynamic features including chaotic, quasi-periodic (2-torus), and periodic via the utilization of bifurcation diagrams and Lyapunov spectrum. Finally, a new image encryption algorithm is introduced that utilizes the jerk system. The algorithm is assessed through statistical performance analysis, according to the results of the experiments and security tests, it has been verified that the suggested image encryption algorithm is highly secure and could be a viable option for real-world applications.
Go to article

Authors and Affiliations

Saad Fawzi Al-Azzawi
1
ORCID: ORCID

  1. Department of Mathematics, Collegeof Computer Science and Mathematics, University of Mosul, Mosul, Iraq
Download PDF Download RIS Download Bibtex

Abstract

Nowadays, information security management systems are important parts of managing a system for better handling of the information security. In scenarios and situations where safety management is done by managing protection of malwares, it is important to manage security issues properly. Cryptography is an approach which makes possible for a recipient to encrypt and decrypt the information. A combination of two different strategies for encryption and decryption in the text encoding will be transformed into the used all content. The encryption and decryption key of the content decryption key is used. There are different types of information. A number, such as finding two large prime numbers with that product. The number, the size of the RSA key is large enough to make, it's hard to pinpoint these numbers. The key, known as the RSA public key, is the most prominent open encryption. Calculations were used for information exchange. In this paper, we created a program for simulation and testing of apply cryptography of Advance Encryption Standard (AES) algorithm with Rivest-Shamir-Adleman (RSA) algorithm for better performance. In this study, this program is an application of a new algorithm to be the AES&RSA principle of using a public key instead of a private key for cryptography, and the testing of encryption and decryption for the AES&RSA algorithm resulted in time is no different on the AES algorithm and more secure encryption and decryption. The results indicated that the time needed for encoding and decoding of AES&RSA algorithm has been reduced (i.e., efficiency has been improved).
Go to article

Authors and Affiliations

Santi Pattanavichai
1

  1. Rajamangala University of Technology Thanyaburi, Information Technology Department, Thailand

This page uses 'cookies'. Learn more