Genetic Symmetric Key Generation for IDEA

被引:4
作者
Malhotra, Nandini [1 ]
Nagpal, Geeta [1 ]
机构
[1] Natl Inst Technol, Dept Comp Sci & Engn, Jalandhar 144011, Punjab, India
来源
JOURNAL OF INFORMATION PROCESSING SYSTEMS | 2015年 / 11卷 / 02期
关键词
Crossover; IDEA; Genetic Algorithm; Mutation; Symmetric Key Generation;
D O I
10.3745/JIPS.03.0017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cryptography aims at transmitting secure data over an unsecure network in coded version so that only the intended recipient can analyze it. Communication through messages, emails, or various other modes requires high security so as to maintain the confidentiality of the content. This paper deals with IDEA's shortcoming of generating weak keys. If these keys are used for encryption and decryption may result in the easy prediction of ciphertext corresponding to the plaintext. For applying genetic approach, which is well-known optimization technique, to the weak keys, we obtained a definite solution to convert the weaker keys to stronger ones. The chances of generating a weak key in IDEA are very rare, but if it is produced, it could lead to a huge risk of attacks being made on the key, as well as on the information. Hence, measures have been taken to safeguard the key and to ensure the privacy of information.
引用
收藏
页码:239 / 247
页数:9
相关论文
共 10 条
  • [1] Abed I. A., 2010, J BASRAH RES SCI, V36, P72
  • [2] Bhowmik S., 2011, 2011 Proceedings of IEEE International Conference on Computer Science and Automation Engineering (CSAE), P223, DOI 10.1109/CSAE.2011.5952458
  • [3] Biryukov A, 2002, LECT NOTES COMPUT SC, V2513, P315
  • [4] Daemen J., 1994, Advances in Cryptology - CRYPTO '93. 13th Annual International Cryptology Conference Proceedings, P224
  • [5] De-Hong Zhu, 2010, 2010 IEEE International Conference on Intelligent Computing and Intelligent Systems (ICIS 2010), P18, DOI 10.1109/ICICISYS.2010.5658827
  • [6] Ghosh R., 2012, INT J ADV RES COMPUT, V2, P263
  • [7] Goldberg D.E., 2009, GENETIC ALGORITHMS S
  • [8] Goyat S., 2012, INT J SOFT COMPUTING, V2
  • [9] Hawkes P, 1998, LECT NOTES COMPUT SC, V1403, P112, DOI 10.1007/BFb0054121
  • [10] Schneier B., 1996, APPL CRYPTOGRAPHY PR