Genetic Operators Applied to Symmetric Cryptography
DOI:
https://doi.org/10.9781/ijimai.2019.07.006Keywords:
Security, Cryptography, Genetic AlgorithmsAbstract
In this article, a symmetric-key cryptographic algorithm for text is proposed, which applies Genetic Algorithms philosophy, entropy and modular arithmetic. An experimental methodology is used over a deterministic system, which redistributes and modifies the parameters and phases of the genetic algorithm that directly affect its behavior, carrying out a constant evaluation using the fitness function, in order to optimize the results. An independent encryption is established for the auxiliary key, using a main key, in charge of increasing security. The tests are performed over different text sizes, manipulating the parameters and criteria proposed to obtain their appropriate values. Finally, a comparison is presented against the following cryptographic algorithms DES (Data Encryption Standard), RSA (Rivest, Shamir and Adleman) and AES (Advanced Encryption Standard), exposing factors such as processing time, scalability, key size, etc. It is shown that the proposed algorithm has a better performance.Downloads
References
Carle, G. (2003). “Network Security Chapter 7: Cryptographic Protocols.” Disponible en: http://www.ccs-labs.org/~dressler/teaching/netzsicherheit-ws0304/07_CryptoProtocols_2on1.pdf
Abd, D., Abdual, H., and Hadhoud, M. (2010). “Evaluating the Performance of Symmetric Encryption Algorithms.” International Journal of Network Security, vol. 10, no. 3, pp. 213–219.
Mahajan, P. and Sachdeva, A. (2013). “A Study of Encryption Algorithms AES, DES, and RSA for Security.” Global Journal of Computer Science and Technology, vol. 13. Disponible en: https://computerresearch.org/index.php/computer/article/view/272/272
Beegom, B. and Jose, S. (2017). “An Enhanced Cryptographic Model Based on DNA Approach.” Presented at: 2017 International Conference of Electronics, Communication and Aerospace Technology (ICECA), Idukki, India. https://doi.org/10.1109/ICECA.2017.8212824
Srilatha, N. and Murali, G. (2016). “Fast three level DNA Cryptographic technique to provide better security.” Presented at: 2016 2nd International Conference on Applied and Theoretical Computing and Communication Technology (iCATccT), Bangalore. https://doi.org/10.1109/ICATCCT.2016.7912037
Lawrence, E. (2006). “HTTPS Security Improvements in Internet Explorer 7.” Disponible en: https://msdn.microsoft.com/en-us/library/bb250503(v=vs.85).aspx
Dierks, T. and Rescorla, E. (2008). The Transport Layer Security (TLS) Protocol, Version 1.2 (RFC 5246). Disponible en: https://tools.ietf.org/html/rfc5246
Holland, J. (1975). Adaptation in Natural and Artificial Systems. London, England: MIT Press, pp. 6–16.
Goldberg, D. (1989). Genetic Algorithms in Search, Optimization and Machine Learning. Boston, USA: Addison-Wesley, pp. 1–68.
Hermawanto, D. (2013). “Genetic Algorithm for Solving Simple Mathematical Equality Problem.” arXiv e-print: 1308.4675.
Syswerda, G. (1991). “Schedule optimization using genetic algorithms.” New York, USA: Lawrence Davis, pp. 322–349.
Jhajharia, S., Mishra, S., and Bali, S. (2013). “Public key cryptography using neural networks and genetic algorithms.” Presented at: 2013 Sixth International Conference on Contemporary Computing (IC3), Noida, India. https://doi.org/10.1109/IC3.2013.6612177
Simmons, G. J. (1988). “A survey of Information Authentication.” IEEE Proceedings, vol. 76, pp. 603–620. https://doi.org/10.1109/5.4445
Bhowmik, S. and Acharyya, S. (2011). “Image Cryptography: The Genetic Algorithm Approach.” Presented at: International Conference on Computer Science and Automation Engineering, Shanghai, China. https://doi.org/10.1109/CSAE.2011.5952458
Conci, A., Brazil, A. L., Leal, S. B., and MacHenr, T. (2015). “AES Cryptography in Color Image Steganography by Genetic Algorithms.” Presented at: 2015 IEEE/ACS 12th International Conference of Computer Systems and Applications (AICCSA), Marrakech, Morocco. https://doi.org/10.1109/AICCSA.2015.7507100
Al-Tabtabai, H. and Alex, A. P. (1999). “Using Genetic Algorithms to solve optimization problems in construction.” Engineering, Construction and Architectural Management, vol. 6, issue 2, pp. 121–132. https://doi.org/10.1108/eb021105
Traberg, G., Moliari, L., Venosa, P., and Macia, N. (2015). “Automatizando el descubrimiento de portales de autenticación y evaluación de la seguridad mediante ataques de fuerza bruta en el marco de una auditoría de seguridad.” Presented at: XXI Congreso Argentino de Ciencias de la Computación, Argentina. Disponible en: http://sedici.unlp.edu.ar/handle/10915/50589
Shannon, C. E. (1949). “Communication Theory of Secrecy Systems.” The Bell System Technical Journal, vol. 28, issue 4. http://dx.doi.org/10.1002/j.1538-7305.1949.tb00928.x
Othman, H., Hassoun, Y., and Owayjan, M. (2015). “Entropy Model for Symmetric Key Cryptography Algorithms Based on Numerical Methods.” Presented at: 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR), Beirut, Lebanon. https://doi.org/10.1109/ARCSE.2015.7338142
Gauss, C. F. (1801) and Clarke, A. A. (1965). Disquisitiones Arithmeticae (Translated). New Haven, Connecticut, USA, pp. 1–4.
Jimenez, R., Gordillo, E., and Rubiano, G. (2012). Teoría de Números (para principiantes). Bogotá, Colombia: Pro–Offset Editorial Ltda., pp. 98–104.
Narasimham, C. and Jayaram, P. (2008). “Evaluation of performance characteristics of Cryptosystem using text files.” Journal of Theoretical and Applied Information Technology, pp. 55–59.
Zaldaña, H. R. and Castañeda, E. (2015). “The Use of Genetic Algorithms in UV Disinfection of Drinking Water.” International Journal of Interactive Multimedia and Artificial Intelligence, vol. 3, pp. 43–48.
Downloads
Published
-
Abstract31
-
PDF15






