Table 4 Key sensitivity analysis.
From: Secure data transmission through fractal-based cryptosystem: a Noor iteration approach
Key sensitivity analysis | Sensitivity level | Impact on security |
|---|---|---|
Length of fractal key | High | Longer key provide increased security |
Key rotation Frequency | Medium | More frequent rotation enhances security |
Complexity of fractal | High | More complex fractals increase security |
External key exposure | High | Exposure increases vulnerability |
Encryption algorithm | Medium | The strength of the algorithm impacts security |