Overview of Information Security Using Genetic Algorithm and Chaos

被引:11
|
作者
Kumar, Anil [1 ]
Ghose, M. K. [1 ]
机构
[1] Sikkim Manipal Inst Technol, Sikkim, India
来源
INFORMATION SECURITY JOURNAL | 2009年 / 18卷 / 06期
关键词
chaos; cryptography; genetic algorithms;
D O I
10.1080/19393550903327558
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Security, integrity, nonrepudiation, confidentiality, and authentication services are the most important factors in information security. Genetic algorithms (GAs) are a class of optimization algorithms. Many problems can be solved using genetic algorithms through modeling a simplified version of genetic processes. The application of a genetic algorithm to the field of cryptology is unique. Few works exist on this topic. In this article, an attempt has been made to give an overview of genetic algorithm-based cryptography and to propose a new approach to GA with pseudorandom sequence to encrypt data stream. The feature of such an approach includes high data security and high feasibility for easy integration with commercial multimedia transmission applications. The experimental results of the proposed technique confirm that high throughput rate needed for real time data protection is achieved.
引用
收藏
页码:306 / 315
页数:10
相关论文
共 50 条
  • [1] Genetic Algorithm using Theory of Chaos
    Snaselova, Petra
    Zboril, Frantisek
    [J]. INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE, ICCS 2015 COMPUTATIONAL SCIENCE AT THE GATES OF NATURE, 2015, 51 : 316 - 325
  • [2] Data Information Security Algorithm Based on Chaos and Hash Function
    Liu, Hui
    [J]. APPLIED MATHEMATICS AND NONLINEAR SCIENCES, 2023,
  • [3] Research on Multimedia Data Information Security Algorithm Based on Chaos Theory
    College of Electronic Information Science, Fujian Jiangxia University, Fuzhou, Fujian
    350108, China
    [J]. Informatica, 2023, 8 (57-66):
  • [4] Chaos Genetic Algorithm Instead Genetic Algorithm
    Javidi, Mohammad
    Hosseinpourfard, Roghiyeh
    [J]. INTERNATIONAL ARAB JOURNAL OF INFORMATION TECHNOLOGY, 2015, 12 (02) : 163 - 168
  • [5] INFORMATION SECURITY - AN OVERVIEW
    ANDREASSEN, AL
    LEIGHTON, WJ
    SCHREIBER, DF
    [J]. AT&T TECHNICAL JOURNAL, 1988, 67 (03): : 2 - 8
  • [6] Computer application under the management of network information security technology using genetic algorithm
    Qiang, Xu Jian
    [J]. SOFT COMPUTING, 2022, 26 (16) : 7871 - 7876
  • [7] Computer application under the management of network information security technology using genetic algorithm
    Xu Jian Qiang
    [J]. Soft Computing, 2022, 26 : 7871 - 7876
  • [8] Matching information security vulnerabilities to organizational security profiles: a genetic algorithm approach
    Gupta, M
    Rees, J
    Chaturvedi, A
    Chi, J
    [J]. DECISION SUPPORT SYSTEMS, 2006, 41 (03) : 592 - 603
  • [9] Social network security using genetic algorithm
    Benyamin MazhariSefat
    Soodeh Hosseini
    [J]. Evolving Systems, 2023, 14 : 175 - 190
  • [10] Social network security using genetic algorithm
    MazhariSefat, Benyamin
    Hosseini, Soodeh
    [J]. EVOLVING SYSTEMS, 2023, 14 (02) : 175 - 190