Evolutionary_genetic_algorithm_for_encryption
Evolutionary_genetic_algorithm_for_encryption
Su Su Maung and others in [8] have proposed a fast In next section, provide an implementation on GA in
encryption by adapting chaotic maps. Logistic map will be encryption process.
used to produce Two dimensional standard map; 8*8 S-box.
Then, a sequence of random bytes is generated by using 2D IV. GENETIC ALGORITHM INTO IMPLEMENTATION
chaotic cat map to index the entries of the S-box. Finally,
ciphertext will be produced from implementing S-box and GA used to enforce expanding in population size and
XOR on plaintext. diversity through crossover and mutation. The main steps for
encryption which starts from plaintext to ciphertext are
Artificial Neural Network (ANN) in [9] has been used to described as follow:
generate ciphertext by simulating natural noise. For
implementing ANN, several decisions must be taken which A. Plaintext Presentation:
concern about number of ANN layers, and weight for each
input from plaintext. In addition, Researchers in [4] have In this step, suitable representation method will influence
applied artificial neural network. They focused on receiving the effectiveness of GA in encryption.
plaintext as input processed through multilayer neural network. There are different ways for encoding and represent
While key is represented as a weight and neural function as plaintext which consists from user message and secret key.
internal components for multilayer neural network Here, binary coding will be implemented because ASCII code
will be implemented on plaintext. Furthermore, crossover and
mutation work efficiently on binary code and we must take into
So, there are different approaches have been used in account that the selected method depends on the problem itself.
encryption and generation of secure key [10, 13]. Some of
these approaches are listed as follows: Message text will be formatted using two dimension a
matrix =n*n, here matrix=3*3. To increase complexity, shift
• Artificial Neural Network can be performed on plaintext by shift bits to left or right
several bits.
• Bayesian Network
Another process will be applied which concerns about
• Artificial Immune System adding secret information to message called key. Key must be
• K- nearest neighbor algorithm presented using matrix =n*n as size of plaintext to enable
additive operation between text and key, for example user
• Support Vector Machine message=NETWORK which mapped into matrix=3*3 which
later converted into ASCII matrix and shifted 2 bits, as shown
• Decision Tree
in Fig.3 and Fig.4 respectively. Same operation implemented
• Fuzzy Logic on secret key e.g. SECURITY.
• Machine Learning
Authorized licensed use limited to: Banasthali Vidyapith. Downloaded on February 12,2025 at 13:12:32 UTC from IEEE Xplore. Restrictions apply.
2014 IEEE International Conference on Computational Intelligence and Computing Research
B. Applying crossover and mutation After mutation, final ciphertext is produced and converted
into readable format by using hexadecimal or octal or decimal
system.
Crossover is one of main characteristics that distinguished
GA from other revolution techniques. Crossover is a process of In decryption, the steps for encryption process are reversed
and start with ciphertext instead of plaintext.
exchange of information between two texts to reproduce new
text, individual, inherent their parent's behavior. For comparison, the expected complexity for the proposed
All crossover methods depend on encoding method and method by using GA in encryption will be O (n ). 2
Authorized licensed use limited to: Banasthali Vidyapith. Downloaded on February 12,2025 at 13:12:32 UTC from IEEE Xplore. Restrictions apply.
2014 IEEE International Conference on Computational Intelligence and Computing Research
Authorized licensed use limited to: Banasthali Vidyapith. Downloaded on February 12,2025 at 13:12:32 UTC from IEEE Xplore. Restrictions apply.