Research Article

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

Figure 6

The controlled trajectories of (7). For a better view, we have used a larger step 0.05 yielding a lesser number of points. The points contained in rectangles are marked as 1 and 3, 2 and 4 are symmetric pairs along the axis given by the line .