Introduction - If you have any usage issues, please Google them yourself
The first step: According to the characteristics of chaotic sequences to determine an initial value of x0 as a key, the use of formula chaotic sequence H (n) the second step: identifying encryption function f (x) the third step: the system has to keep password encrypted and stored in the password file and the results are set to HK1 (n) the fourth step: the result of user input password encryption for HK2 (n) Step five: to HK1 (n), HK2 (n)-by-bit comparison outcome