Introduction - If you have any usage issues, please Google them yourself
Proposed two types of randomness of the chaotic system a good combination of superimposed signals generated chaotic key encryption scheme. The program draws on the initial value of the chaotic sequence, the system parameters and the superposition coefficients of secret algorithms efficient fast, time and space overhead small. Through simulation analysis, the system can effectively resist the system to identify attacks, and the encrypted ciphertext is very suitable for effective resource overhead, limited and real-time secure communications for better occasions.