{"title":"Crypto Genetic Approach in Information Security","authors":"Andon Lazarov, P. Petrova","doi":"10.1109/SIELA54794.2022.9845775","DOIUrl":null,"url":null,"abstract":"The present work focuses on a combined crypto genetic algorithm to ensure high level of confidential information security. At the data transmission stage of the information system, the algorithm starts with generating two arbitrary non-coprime numbers, determining a least common multiple and a great common divisor, and producing private and public keys. First, the information is encrypted with a public key to obtain the initial cipher. The initial cipher is additionally manipulated by applying operators of the genetic algorithm. Final cipher is produced. At the receiver, the final cipher first is manipulated by operators of the genetic algorithm. The initial cipher is to restored. Then, a private key is applied to obtain the transmitted information. The main contribution of the present study is the introduction of random generated two non-coprime numbers in the determination of the public and private key at the beginning of the algorithm, which enriches the asymmetric crypto technique and expanses substantially the application area of asymmetric RSA crypto codes.","PeriodicalId":150282,"journal":{"name":"2022 22nd International Symposium on Electrical Apparatus and Technologies (SIELA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 22nd International Symposium on Electrical Apparatus and Technologies (SIELA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIELA54794.2022.9845775","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
The present work focuses on a combined crypto genetic algorithm to ensure high level of confidential information security. At the data transmission stage of the information system, the algorithm starts with generating two arbitrary non-coprime numbers, determining a least common multiple and a great common divisor, and producing private and public keys. First, the information is encrypted with a public key to obtain the initial cipher. The initial cipher is additionally manipulated by applying operators of the genetic algorithm. Final cipher is produced. At the receiver, the final cipher first is manipulated by operators of the genetic algorithm. The initial cipher is to restored. Then, a private key is applied to obtain the transmitted information. The main contribution of the present study is the introduction of random generated two non-coprime numbers in the determination of the public and private key at the beginning of the algorithm, which enriches the asymmetric crypto technique and expanses substantially the application area of asymmetric RSA crypto codes.