Loading

Voice and Text Encryption using Chaotic Circuits
Baby H. T.1, Sujatha B.R.2

1Baby H.T.*, Associate Professor, Department of E&CE, Government Engineering College, Hassan.
2Dr. B. R. Sujatha, Professor and HOD, Department of E&CE, Malnad College of Engineering, Hassan.
Manuscript received on March 15, 2020. | Revised Manuscript received on March 25, 2020. | Manuscript published on April 10, 2020. | PP: 1181-1184 | Volume-9 Issue-6, April 2020. | Retrieval Number: B7915129219/2020©BEIESP | DOI: 10.35940/ijitee.B7915.049620
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: An ever-increasing usage of internet from simple data transmission to highly sensitive data storage has given rise to the need to establish techniques for securing such transactions. Cryptography has been widely used in recent decades to provide protection for the Internet data, although mainly used in the diplomatic and military societies. These regularities have made randomness in data processing a key element for security. The generation of random numbers is a subject which continues to interest the researchers since several decades. Chaos theory is one such approach to demonstrate the randomness of the data in Cryptosystems. Chaotic circuits have been used in this paper to produce different multiple keys to be used for both text and voice encryption. The significant difference in the initial constraints of chaotic circuits is seen to produce entirely different keys and cipher text. 
Keywords: Cipher Text, Chaos Function, Chaotic Circuit, Cryptography, Decryption, Encryption, Plain Text.
Scope of the Article: Nanometer-scale integrated circuits