An encryption algorithm using chaotic tent map security evaluation

Information and Signal Processing
Authors:
Abstract:

A general security evaluation guideline is given for cryptosystems using simple chaotic maps. We provide the experimental results to reveal the details for tent map cryptosystem features estimation (such as avalanche property and key dimension).