Mamta Rani

Work place: Dept. of Computer Science, Central University of Rajasthan, INDIA

E-mail: mamtarsingh@curaj.ac.in

Website:

Research Interests: Applied computer science, Computer systems and computational processes, Theoretical Computer Science

Biography

Mamta Rani is Associate Professor in Department of Computer Science at Central University of Rajasthan from last 3 years. Before it she has worked in many educational organizations at different posts. She has received Ph.D. in Computer Science from Gurukula Kangri Vishwavidyalaya, Haridwar, Uttarakhand in 2002. Her area of interest is Fractal Graphics and Chaos. She has published more than 40 research publications in reputed International and National Journals. She has also presented more than 15 research articles in National and International Conference Proceedings.

Author Articles
Improving Security of the Baptista’s Cryptosystem Using Two-step Logistic Map

By Balram Nitharwal Mamta Rani Hukam Chand Saini

DOI: https://doi.org/10.5815/ijcnis.2015.05.05, Pub. Date: 8 Apr. 2015

Over last 3 decades, many cryptography algorithms based on chaos have been proposed that are very fast in computation. Chaos is used for secured communication in two ways as analog secured communication and digital chaotic ciphers. This paper is mainly focused at digital chaotic cryptosystem. In symmetric cryptosystems, same key is used for both encryption and decryption purpose. In 1998, Baptista gave the most used symmetric cryptosystem based on Ergodic property of logistic map. Later on, many refinements were done in Baptista’s algorithm. By going through later proposed refinements in this cryptosystem, some flaws are observed. Proposed scheme has a two-step logistic map that is a feedback mechanism using an extra variable to come over these flaws. At last, there is comparison between proposed scheme and other version of Baptista type cryptosystem, which shows that the proposed scheme is better than previous ones and it is resist against behavior analysis attack and partial key recovery attack.

[...] Read more.
Other Articles