Crypto Genetic Approach in Information Security

Andon Lazarov, P. Petrova
{"title":"Crypto Genetic Approach in Information Security","authors":"Andon Lazarov, P. Petrova","doi":"10.1109/SIELA54794.2022.9845775","DOIUrl":null,"url":null,"abstract":"The present work focuses on a combined crypto genetic algorithm to ensure high level of confidential information security. At the data transmission stage of the information system, the algorithm starts with generating two arbitrary non-coprime numbers, determining a least common multiple and a great common divisor, and producing private and public keys. First, the information is encrypted with a public key to obtain the initial cipher. The initial cipher is additionally manipulated by applying operators of the genetic algorithm. Final cipher is produced. At the receiver, the final cipher first is manipulated by operators of the genetic algorithm. The initial cipher is to restored. Then, a private key is applied to obtain the transmitted information. The main contribution of the present study is the introduction of random generated two non-coprime numbers in the determination of the public and private key at the beginning of the algorithm, which enriches the asymmetric crypto technique and expanses substantially the application area of asymmetric RSA crypto codes.","PeriodicalId":150282,"journal":{"name":"2022 22nd International Symposium on Electrical Apparatus and Technologies (SIELA)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 22nd International Symposium on Electrical Apparatus and Technologies (SIELA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SIELA54794.2022.9845775","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The present work focuses on a combined crypto genetic algorithm to ensure high level of confidential information security. At the data transmission stage of the information system, the algorithm starts with generating two arbitrary non-coprime numbers, determining a least common multiple and a great common divisor, and producing private and public keys. First, the information is encrypted with a public key to obtain the initial cipher. The initial cipher is additionally manipulated by applying operators of the genetic algorithm. Final cipher is produced. At the receiver, the final cipher first is manipulated by operators of the genetic algorithm. The initial cipher is to restored. Then, a private key is applied to obtain the transmitted information. The main contribution of the present study is the introduction of random generated two non-coprime numbers in the determination of the public and private key at the beginning of the algorithm, which enriches the asymmetric crypto technique and expanses substantially the application area of asymmetric RSA crypto codes.
信息安全中的密码遗传方法
本文研究了一种组合的密码遗传算法,以确保高度机密信息的安全。在信息系统的数据传输阶段,该算法首先生成任意两个非素数,确定最小公倍数和大公因数,生成私钥和公钥。首先,使用公钥对信息进行加密以获得初始密码。通过应用遗传算法的算子对初始密码进行额外的操作。生成最终密码。在接收端,最终的密码首先由遗传算法的操作者来操作。将恢复初始密码。然后,使用私钥获取传输的信息。本研究的主要贡献是在算法开始时引入随机生成的两个非素数来确定公钥和私钥,丰富了非对称加密技术,大大扩展了非对称RSA密码码的应用领域。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信