Information Security Management Handbook
Information Security Management Handbook
Fractional Fourier transform based key exchange for optical asymmetric key cryptography
WSEAS Transactions on Computers
Image encryption using Pseudo random number and chaotic sequence generators
ISP'08 Proceedings of the 7th WSEAS international conference on Information security and privacy
Hi-index | 0.00 |
This paper presents a method for encrypting messages, which uses for this operation an image or a part of an image as an encryption/decryption key. The need to encrypt messages for protecting their content knew an increase from the apparition of Internet and electronic transactions. The great number of messages that flows in a computer network and over the Internet is requiring very fast encrypt/decrypt processes for assuring real-time secured communications. Complex algorithms used in present for encrypting/decrypting messages use complex keys and complex encrypt/decrypt functions that need an increased computer power for real-time applications (media).