An Efficient Stream Cipher using Genetic Algorithm

被引:0
|
作者
Kumar, Ankit [1 ]
Chatterjee, Kakali [1 ]
机构
[1] Natl Inst Technol Patna, Comp Sci & Engn, Patna 800005, Bihar, India
关键词
Cryptography; Genetic Algorithm; Fitness Function;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Cryptography is essential to protect and secure data using a key. Different types of cryptographic techniques are found for data security. Genetic Algorithm is essentially used for obtaining optimal solution. Also, it can be efficiently used for random number generation which are very important in cryptography. This paper discusses the application of genetic algorithms for stream ciphers. Key generation is the most important factor in stream ciphers. In this paper Genetic Algorithm is used in the key generation process where key selection depends upon the fitness function. Here genetic algorithm is repeated for key selection. In each iteration, the key having highest fitness value is selected which further be compared with the threshold value. Selected key was unique and non-repeating. Therefore encryption with selected key are highly encrypted because of more randomness of key. This paper shows that the generated keys using GA are unique and more secure for encryption of data.
引用
收藏
页码:2322 / 2326
页数:5
相关论文
共 50 条
  • [21] An improved algorithm of stream cipher based on LFSR
    Feng, Lifeng
    Wang, Xiaofeng
    Fang, Yingjue
    2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
  • [22] Research on the Randomness of Stream Cipher Algorithm LEX
    Deng, Yuanqing
    Shi, Hui
    Li, Guanlin
    Lai, Tianxing
    Zhao, Yazhou
    Gong, Jing
    INTERNATIONAL CONFERENCE ON SUSTAINABLE ENERGY AND ENVIRONMENT PROTECTION (ICSEEP 2015), 2015, : 911 - 914
  • [23] LEA: Link Encryption Algorithm Proposed Stream Cipher Algorithm
    El Hennawy, Hadia M. S.
    Omar, Alaa E. A.
    Kholaif, Salah M. A.
    AIN SHAMS ENGINEERING JOURNAL, 2015, 6 (01) : 57 - 65
  • [24] An Enhanced Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm
    Garg, Poonam
    Shastri, Aditya
    Agarwal, D. C.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 12, 2006, 12 : 145 - +
  • [25] Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
    Putera, Andysah
    Siahaan, Utama
    Rahim, Robbi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 173 - 180
  • [26] Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
    Song, Jun
    Yang, Fan
    Wang, Maocai
    Zhang, Huanguo
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2008, 5370 : 795 - +
  • [27] A COMPOSITE IMAGE CIPHER USING DNA SEQUENCE AND GENETIC ALGORITHM
    Saranya, M. R.
    Mohan, Arun K.
    Anusudha, K.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1022 - 1026
  • [28] K2: A stream cipher algorithm using dynamic feedback control
    Kiyomoto, Shinsaku
    Tanaka, Toshiaki
    Sakurai, Kouichi
    SECRYPT 2007: PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2007, : 204 - +
  • [29] Block Cipher and Stream Cipher Algorithm Performance Comparison in a Personal VPN Gateway
    Ismoyo, Dimas Dwiki
    Wardhani, Rini Wisnu
    2016 1ST INTERNATIONAL SEMINAR ON APPLICATION FOR TECHNOLOGY OF INFORMATION AND COMMUNICATION (ISEMANTIC): SCIENCE AND TECHNOLOGY FOR A BETTER FUTURE, 2016, : 207 - 210
  • [30] BRRC: A Hybrid Approach Using Block Cipher and Stream Cipher
    Kumar, Binay
    Hussain, Muzzammil
    Kumar, Vijay
    PROGRESS IN ADVANCED COMPUTING AND INTELLIGENT ENGINEERING, PROCEEDINGS OF ICACIE 2016, VOLUME 1, 2018, 563 : 221 - 231