An Efficient Stream Cipher using Genetic Algorithm

被引:0
|
作者
Kumar, Ankit [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol Patna, Comp Sci & Engn, Patna 800005, Bihar, India
来源
PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET) | 2016年
关键词
Cryptography; Genetic Algorithm; Fitness Function;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cryptography is essential to protect and secure data using a key. Different types of cryptographic techniques are found for data security. Genetic Algorithm is essentially used for obtaining optimal solution. Also, it can be efficiently used for random number generation which are very important in cryptography. This paper discusses the application of genetic algorithms for stream ciphers. Key generation is the most important factor in stream ciphers. In this paper Genetic Algorithm is used in the key generation process where key selection depends upon the fitness function. Here genetic algorithm is repeated for key selection. In each iteration, the key having highest fitness value is selected which further be compared with the threshold value. Selected key was unique and non-repeating. Therefore encryption with selected key are highly encrypted because of more randomness of key. This paper shows that the generated keys using GA are unique and more secure for encryption of data.
引用
收藏
页码:2322 / 2326
页数:5
相关论文
共 50 条
  • [1] Genetic Algorithm in Stream Cipher Cryptanalysis
    Polak, Iwona
    Boryczka, Mariusz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE (ICCCI 2015), PT II, 2015, 9330 : 149 - 158
  • [2] Application Study on Genetic Algorithm Scheduling in Data Stream Cipher System
    Li, Li
    Shi, Guo-zhen
    Wang, Shuai-bing
    Zhao, Cheng
    2015 INTERNATIONAL CONFERENCE ON ELECTRICAL AND ELECTRONICS: TECHNIQUES AND APPLICATIONS (EETA 2015), 2015, : 292 - 297
  • [3] Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
    Putera, Andysah
    Siahaan, Utama
    Rahim, Robbi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 173 - 180
  • [4] Genetic Algorithm with Elitism for Cryptanalysis of Vigenere Cipher
    Bhateja, Aditi
    Kumar, Shailender
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 373 - 377
  • [5] Chaotic encryption algorithm based on alternant of stream cipher and block cipher
    Wang, Xingyuan
    Wang, Xiaojuan
    Zhao, Jianfeng
    Zhang, Zhenfeng
    NONLINEAR DYNAMICS, 2011, 63 (04) : 587 - 597
  • [6] An efficient cryptosystem Delta for stream cipher applications
    Kanso, Ali A.
    COMPUTERS & ELECTRICAL ENGINEERING, 2009, 35 (01) : 126 - 140
  • [7] An Enhanced Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm
    Garg, Poonam
    Shastri, Aditya
    Agarwal, D. C.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 12, 2006, 12 : 145 - +
  • [8] BRRC: A Hybrid Approach Using Block Cipher and Stream Cipher
    Kumar, Binay
    Hussain, Muzzammil
    Kumar, Vijay
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 221 - 231
  • [9] Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
    Nedjmeddine Kantour
    Sadek Bouroubi
    Mobile Networks and Applications, 2020, 25 : 211 - 222
  • [10] Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
    Kantour, Nedjmeddine
    Bouroubi, Sadek
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 211 - 222