Genetic Operators Applied to Symmetric Cryptography

Authors

  • Jefferson Rodríguez Universidad Distrital Francisco José de Caldas image/svg+xml
  • Brayan Corredor Universidad Distrital Francisco José de Caldas image/svg+xml
  • César Suárez Universidad Distrital Francisco José de Caldas image/svg+xml

DOI:

https://doi.org/10.9781/ijimai.2019.07.006

Keywords:

Security, Cryptography, Genetic Algorithms

Abstract

In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, which redistributes and modifies the parameters and phases of the genetic algorithm that directly affect its behavior, carrying out a constant evaluation using the fitness function, in order to optimize the results. An independent encryption is established for the auxiliary key, using a main key, in charge of increasing security. The tests are performed over different text sizes, manipulating the parameters and criteria proposed to obtain their appropriate values. Finally, a comparison is presented against the following cryptographic algorithms DES (Data Encryption Standard), RSA (Rivest, Shamir and Adleman) and AES (Advanced Encryption Standard), exposing factors such as processing time, scalability, key size, etc. It is shown that the proposed algorithm has a better performance.

Downloads

Download data is not yet available.

References

Carle, G. (2003). “Network Security Chapter 7: Cryptographic Protocols.” Disponible en: http://www.ccs-labs.org/~dressler/teaching/netzsicherheit-ws0304/07_CryptoProtocols_2on1.pdf

Abd, D., Abdual, H., and Hadhoud, M. (2010). “Evaluating the Performance of Symmetric Encryption Algorithms.” International Journal of Network Security, vol. 10, no. 3, pp. 213–219.

Mahajan, P. and Sachdeva, A. (2013). “A Study of Encryption Algorithms AES, DES, and RSA for Security.” Global Journal of Computer Science and Technology, vol. 13. Disponible en: https://computerresearch.org/index.php/computer/article/view/272/272

Beegom, B. and Jose, S. (2017). “An Enhanced Cryptographic Model Based on DNA Approach.” Presented at: 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), Idukki, India. https://doi.org/10.1109/ICECA.2017.8212824

Srilatha, N. and Murali, G. (2016). “Fast three level DNA Cryptographic technique to provide better security.” Presented at: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Bangalore. https://doi.org/10.1109/ICATCCT.2016.7912037

Lawrence, E. (2006). “HTTPS Security Improvements in Internet Explorer 7.” Disponible en: https://msdn.microsoft.com/en-us/library/bb250503(v=vs.85).aspx

Dierks, T. and Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol, Version 1.2 (RFC 5246). Disponible en: https://tools.ietf.org/html/rfc5246

Holland, J. (1975). Adaptation in Natural and Artificial Systems. London, England: MIT Press, pp. 6–16.

Goldberg, D. (1989). Genetic Algorithms in Search, Optimization and Machine Learning. Boston, USA: Addison-Wesley, pp. 1–68.

Hermawanto, D. (2013). “Genetic Algorithm for Solving Simple Mathematical Equality Problem.” arXiv e-print: 1308.4675.

Syswerda, G. (1991). “Schedule optimization using genetic algorithms.” New York, USA: Lawrence Davis, pp. 322–349.

Jhajharia, S., Mishra, S., and Bali, S. (2013). “Public key cryptography using neural networks and genetic algorithms.” Presented at: 2013 Sixth International Conference on Contemporary Computing (IC3), Noida, India. https://doi.org/10.1109/IC3.2013.6612177

Simmons, G. J. (1988). “A survey of Information Authentication.” IEEE Proceedings, vol. 76, pp. 603–620. https://doi.org/10.1109/5.4445

Bhowmik, S. and Acharyya, S. (2011). “Image Cryptography: The Genetic Algorithm Approach.” Presented at: International Conference on Computer Science and Automation Engineering, Shanghai, China. https://doi.org/10.1109/CSAE.2011.5952458

Conci, A., Brazil, A. L., Leal, S. B., and MacHenr, T. (2015). “AES Cryptography in Color Image Steganography by Genetic Algorithms.” Presented at: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), Marrakech, Morocco. https://doi.org/10.1109/AICCSA.2015.7507100

Al-Tabtabai, H. and Alex, A. P. (1999). “Using Genetic Algorithms to solve optimization problems in construction.” Engineering, Construction and Architectural Management, vol. 6, issue 2, pp. 121–132. https://doi.org/10.1108/eb021105

Traberg, G., Moliari, L., Venosa, P., and Macia, N. (2015). “Automatizando el descubrimiento de portales de autenticación y evaluación de la seguridad mediante ataques de fuerza bruta en el marco de una auditoría de seguridad.” Presented at: XXI Congreso Argentino de Ciencias de la Computación, Argentina. Disponible en: http://sedici.unlp.edu.ar/handle/10915/50589

Shannon, C. E. (1949). “Communication Theory of Secrecy Systems.” The Bell System Technical Journal, vol. 28, issue 4. http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x

Othman, H., Hassoun, Y., and Owayjan, M. (2015). “Entropy Model for Symmetric Key Cryptography Algorithms Based on Numerical Methods.” Presented at: 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beirut, Lebanon. https://doi.org/10.1109/ARCSE.2015.7338142

Gauss, C. F. (1801) and Clarke, A. A. (1965). Disquisitiones Arithmeticae (Translated). New Haven, Connecticut, USA, pp. 1–4.

Jimenez, R., Gordillo, E., and Rubiano, G. (2012). Teoría de Números (para principiantes). Bogotá, Colombia: Pro–Offset Editorial Ltda., pp. 98–104.

Narasimham, C. and Jayaram, P. (2008). “Evaluation of performance characteristics of Cryptosystem using text files.” Journal of Theoretical and Applied Information Technology, pp. 55–59.

Zaldaña, H. R. and Castañeda, E. (2015). “The Use of Genetic Algorithms in UV Disinfection of Drinking Water.” International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, pp. 43–48.

Downloads

Published

2019-12-01
Metrics
Views/Downloads
  • Abstract
    31
  • PDF
    15

How to Cite

Rodríguez, J., Corredor, B., and Suárez, C. (2019). Genetic Operators Applied to Symmetric Cryptography. International Journal of Interactive Multimedia and Artificial Intelligence, 5(7), 39–49. https://doi.org/10.9781/ijimai.2019.07.006