Abstract
Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process. Therefore, this paper considers this problem, and presents an attempt to find a general approach for designing good cipher systems automatically. In this paper we focus on an important class of cipher systems which is stream ciphers. The proposed approach is based on the evolutionary computation techniques, and the method chosen here is the simulated annealing programming which is an integration of genetic programming and simulated annealing algorithm. The proposed algorithm has been implemented in order to test its effectiveness in solving the underlying problem.
Highlights
The explosive growth in computer systems and their interconnections via network has increased the dependence of organizations on the information stored and communicated using these systems
The main purpose of this paper is to design an effective algorithm for designing keystream generators, and to study the effectiveness of Genetic Programming (GP) and simulated annealing (SA) to solve this problem
In this paper, a new approach for designing keystream generators automatically is presented, which is a new promising direction for stream cipher design. It has been shown the capability of GP and SA in designing the desired stream ciphers
Summary
The explosive growth in computer systems and their interconnections via network has increased the dependence of organizations on the information stored and communicated using these systems. A lot of work has been done information security and cryptography, which is the science of protecting private information against unauthorized access by encrypting it. You can find many cipher systems (cryptosystems), used for encrypting the private information, of different types, and a number of cipher systems have been proposed which are of different levels of security; these cryptosystems can be classified into modern and classical systems. Block ciphers divide the plaintext into blocks and encipher each block independently, such as Data Encryption Standard (DES) and Advanced Encryption Standards (AES) systems, which are iterated product systems combining substitution and transposition [1,2]. Stream ciphers are extremely fast and easy to implement. They usually have very minimal hardware resource requirements. Stream ciphers can operate one data unit as small as a bit or a character
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
More From: International Journal of Computational Intelligence Systems
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.