Skip to main content
. 2020 Nov 4;22(11):1253. doi: 10.3390/e22111253
Algorithm 2 Key steps of the proposed text encryption scheme.
  • Input: Plain-text file Pt.

  • Output: Cipher text file Ct.

  • Begin
    1. Convert the plaintext file into a one-dimensional (1-D) array, SPt.
    2. Generate the chaotic sequence by selecting two of the proposed maps (Equations (1)–(4): α=0.9, x(0)=0.1, and y(0)=0.1).
    3. Change the chaotic sequence into a uniformly distributed sequence by changing the initial values and parameters.
    4. Permute SPt using the proposed chaotic map for the secret key
    5. Create the new vector as: SPt = SKt (index).
    6. Adjust and change SPt utilizing the proposed chaotic map and the accompanying condition: SPt(i)=mod(round(1012SPt(i)),256).
    7. Create the diffused vector SDt=SPtSKt, where ⊕ denotes the bit-by-bit exclusive OR operation.
    8. Create the final cipher text matrix Ct = reshape (SDt,Pt).
  • End