Abstract

Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process. Therefore, this paper considers this problem, and presents an attempt to find a general approach for designing good cipher systems automatically. In this paper we focus on an important class of cipher systems which is stream ciphers. The proposed approach is based on the evolutionary computation techniques, and the method chosen here is the simulated annealing programming which is an integration of genetic programming and simulated annealing algorithm. The proposed algorithm has been implemented in order to test its effectiveness in solving the underlying problem.

Highlights

  • The explosive growth in computer systems and their interconnections via network has increased the dependence of organizations on the information stored and communicated using these systems

  • The main purpose of this paper is to design an effective algorithm for designing keystream generators, and to study the effectiveness of Genetic Programming (GP) and simulated annealing (SA) to solve this problem

  • In this paper, a new approach for designing keystream generators automatically is presented, which is a new promising direction for stream cipher design. It has been shown the capability of GP and SA in designing the desired stream ciphers

Read more

Summary

Introduction

The explosive growth in computer systems and their interconnections via network has increased the dependence of organizations on the information stored and communicated using these systems. A lot of work has been done information security and cryptography, which is the science of protecting private information against unauthorized access by encrypting it. You can find many cipher systems (cryptosystems), used for encrypting the private information, of different types, and a number of cipher systems have been proposed which are of different levels of security; these cryptosystems can be classified into modern and classical systems. Block ciphers divide the plaintext into blocks and encipher each block independently, such as Data Encryption Standard (DES) and Advanced Encryption Standards (AES) systems, which are iterated product systems combining substitution and transposition [1,2]. Stream ciphers are extremely fast and easy to implement. They usually have very minimal hardware resource requirements. Stream ciphers can operate one data unit as small as a bit or a character

Objectives
Results
Conclusion
Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.