A High Security Symmetric Key Generation by Using Genetic Algorithm Based on a Novel Similarity Model

Author(s):  
Min-Yan Tsai ◽  
Hsin-Hung Cho
2017 ◽  
Vol 6 (3) ◽  
pp. 219-227
Author(s):  
Edwin R. Arboleda ◽  
Joel L. Balaba ◽  
John Carlo L. Espineli

Cryptography, which involves the use of a cipher, describes a process of encrypting information so that its meaning is hidden and thus, secured from those who do not know how to decrypt the information. Cryptography algorithms come with the various types including the symmetric key algorithms and asymmetric key algorithms. In this paper, the authors applied the most commonly used algorithm, which is the RSA algorithm together with the Chaos system and the basic security device employed in the worldwide organizations which is the Data Encryption Standard (DES) with the objective to make a hybrid data encryption. The advantage of a chaos system which is its unpredictability through the use of multiple keys and the secrecy of the RSA which is based on integer factorization’s difficulty is combined for a more secure and reliable cryptography. The key generation was made more secure by applying the DES schedule to change the keys for encryption. The main strength of the proposed system is the chaotic variable key generator that chages the value of encrypted message whenever a different number of key is used. Using the provided examples the strength of security of the proposed system was tested and demonstrated.


Recently, security for the image is becoming very important. Image Encryption is the only choice in protecting the digital image by transforming the image into an unreadable format. There are many methods used to protect against unauthorized access. This research proposes a framework for image encryption using Chaos Baker map with SHA-1 algorithm. The Chaotic Baker map is a randomization technique used to make the pixels more shuffled. Key generation is essential part of image encryption, which will be carried out by SHA-1 algorithm. Experimental results show that the proposed method is well suited for high security, key sensitivity and resists various attacks.


Cloud computing is an extensive technology from which the client could access several services through a remote server. Authentication of the remote services needs a common key between the client and the server in a secured manner. The existing key agreement protocols utilized various techniques for the preservation of the data security. The proposed work attempted to provide a high secure data by optimizing the key generation for encryption and decryption process. Hybridization of a novel ECC (Elliptic Curve Cryptography) algorithm and homomorphic ElGamal algorithm for encryption and decryption and also employment of a bio-inspired Genetic algorithm for the generation of maximum secured key is performed. A random 128 bit hash have been developed for the generation of two input points to run the homomorphic property in the ElGamal algorithm secures the key and make it as a non breakable one. The integrated property of ECC and the ElGamal associated with the Genetic algorithm makes the key more stabilized and a confidential one that is more resistant to the various kinds of attacks. The performance analysis depicted that the proposed technique outperform the existing with respect to computational time.


2020 ◽  
Vol 17 (12) ◽  
pp. 5217-5223
Author(s):  
Supriya Khaitan ◽  
Shrddha Sagar ◽  
Rashi Agarwal

Now is the era of online data and transaction, all this happens on an unsecured channel. With this huge data transfer, comes the need of protecting this data. Thus, to achieve security during transmission, several symmetric key encryption algorithms have been proposed. Inspired from researchers, we propose an asymmetric key image security algorithm based on chaotic tent map integrated with Optimized Salp Swarm Algorithm (SSA) for key generation and encryption for gray scale images. Diffusion and confusion are carried out in each round to mix plain text and key to it more secure. Experimental analysis shown by SSA are encouraging and is secure enough to resist brute force, differential cryptoanalysis and key sensitivity analysis attack and is suitable for practical application.


Sign in / Sign up

Export Citation Format

Share Document