Acoustics, Speech, and Signal Processing, IEEE International Conference on
Download PDF

Abstract

Methods of attacking chaotic encryption algorithms have been developed. These methods have been applied to all the published chaotic encryption systems and all these systems are broken in very short computer times. Counter measures have also been developed in order to make chaotic encryption secure. Several examples and results are given.
Like what you’re reading?
Already a member?
Get this article FREE with a new membership!