XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals

被引:6
|
作者
Jawed, Md Saquib [1 ]
Sajid, Mohammad [1 ]
机构
[1] Aligarh Muslim Univ, Dept Comp Sci, Aligarh, Uttar Pradesh, India
关键词
Genetic algorithm; Encryption; Decryption; Elitism; Shannon entropy; Avalanche effect; CLOUD SECURITY; ISSUES; CHALLENGES; ENCRYPTION; THREATS;
D O I
10.1007/s12530-022-09462-0
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Cloud computing has become a pivotal component of all digital organizations and its adoption poses many security concerns for organizations' data and stakeholders. Data integrity and privacy is prominent security threats that demand the development of efficient security models based on exact algorithms, heuristics, and meta-heuristic algorithms. This paper proposes a genetic algorithm-based block cipher, XECryptoGA, to generate the 128-bit random keys to maximizing Shannon's entropy. The XECryptoGA employs the shift cipher, XOR-operation, the concept of elitism, and the roulette wheel selection method. In XECryptoGA, the shift cipher, XOR operation, GA, and application of crossover and mutation are used for the encryption and decryption process. The shift cipher, GA, and XOR operation create confusion, while the application of crossover and mutation is used to generate the diffusion in the model. The proposed XECryptoGA has been tested using several small and large datasets on various security parameters: Key generation time, brute-force attacks, avalanche effects, and encryption and decryption throughputs. The simulation study confirms that the proposed XECryptoGA has achieved security goals: confidentiality, integrity, and privacy. The experiment results show that the proposed model performs better than CryptoGA regarding Key generation time, Brute force attacks, avalanche effect, and security providence. While better than the state-of-art algorithms AES, DES, 3DES, and BLOWFISH in terms of encryption throughput and decryption throughput.
引用
收藏
页码:749 / 770
页数:22
相关论文
共 12 条
  • [1] XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals
    Md Saquib Jawed
    Mohammad Sajid
    Evolving Systems, 2023, 14 : 749 - 770
  • [2] Optimized Hybrid Security Model using Base 64 Algorithm in conjunction with Substitution Cipher to Enhance Text Security
    Maitlo, Abdullah
    Arain, Rafaqat Hussain
    Shaikh, Riaz Ahmed
    Shaikh, Hidayatullah
    Shah, Mahmood Hussain
    Shah, Safdar Ali
    Mahar, Mumtaz Hussain
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (03): : 93 - 98
  • [3] Study and VHDL implementation of a novel chaos-based block cipher algorithm for digital image security
    Hajjaji, Mohamed Ali
    Albouchi, Adnen
    JOURNAL OF ELECTRONIC IMAGING, 2024, 33 (01)
  • [4] A Survey on the Quantum Security of Block Cipher-Based Cryptography
    Bootsma, S. E.
    De Vries, M.
    IEEE ACCESS, 2024, 12 : 194711 - 194727
  • [5] A modification of RC6TM block cipher algorithm for data security (MRC6)
    El-Fishawy, NA
    El-Danaf, TE
    Zaid, OMA
    ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 222 - 226
  • [6] An application of a metaheuristic algorithm-based clustering ensemble method to APP customer segmentation
    Kuo, R. J.
    Mei, C. H.
    Zulvia, F. E.
    Tsai, C. Y.
    NEUROCOMPUTING, 2016, 205 : 116 - 129
  • [7] A hybrid algorithm-based optimization protocol to ensure data security in the cloud
    Zubair S.
    Ahmed H.M.A.
    International Journal of Information Technology, 2024, 16 (5) : 3057 - 3064
  • [8] Genetic algorithm-based stereo vision with no block-partitioning of input images
    Wang, B
    Chung, R
    Shen, CL
    2003 IEEE INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN ROBOTICS AND AUTOMATION, VOLS I-III, PROCEEDINGS, 2003, : 830 - 836
  • [9] Genetic Algorithm-Based Strategy for Routing in Virtual Electrical Substations Aiming for Security
    Barreto, Camilo
    Cardoso, Alexandre
    Lamounier, Edgard
    Yamanaka, Keiji
    2018 XLIV LATIN AMERICAN COMPUTER CONFERENCE (CLEI 2018), 2018, : 200 - 206
  • [10] Implementation of a block cipher algorithm for medical information security on cloud environment: using modified advanced encryption standard approach
    Adeniyi, A. E.
    Abiodun, K. M.
    Awotunde, J. B.
    Olagunju, M.
    Ojo, O. S.
    Edet, N. P.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2023, 82 (13) : 20537 - 20551