Abstract:
Toensureconfidentialityandavoidhumainattacksagainstourdata, we exchange encryption and decryption keys. In our proposal scheme, we use the commutative properties of the product of circular matrices to create a com monencryptionkeybyapplyingtheprotocolof Diffie-Hellmanexchangethrough a classic channel. To raise the security level of our system we have introduced the sensibility of chaotic logistic maps in another exchange protocol which is the BB84throuth a quantum channal.
Publisher's Version