M. Bougrine, Fouzia Omaiy, S. Trichni, B. Boulahiat
{"title":"New evolutionary tools for a new ciphering system SEC version","authors":"M. Bougrine, Fouzia Omaiy, S. Trichni, B. Boulahiat","doi":"10.1109/CCST.2012.6393549","DOIUrl":null,"url":null,"abstract":"This paper suggests a new cryptographic system based on evolutionary algorithms. The system is inspired from the symmetric encryption SEC. First, it transforms the problem of encryption to a combinatorial optimization problem. Second, it introduces a new evaluation function which allows the appearance frequencies to be equal .As a consequence the system will end the frequency analysis attack. Furthermore, the system uses a new mechanism of mutation in the context of genetic operators. The fact that this mechanism is based on the partition problem makes the attack against our system a difficult problem. During the ciphering, our system generates two keys, the first one is generated at the end of the algorithm and the second one is generated when the mutation operator. Both of them are session keys which might be beneficial for the security.","PeriodicalId":405531,"journal":{"name":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2012-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2012 IEEE International Carnahan Conference on Security Technology (ICCST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCST.2012.6393549","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
This paper suggests a new cryptographic system based on evolutionary algorithms. The system is inspired from the symmetric encryption SEC. First, it transforms the problem of encryption to a combinatorial optimization problem. Second, it introduces a new evaluation function which allows the appearance frequencies to be equal .As a consequence the system will end the frequency analysis attack. Furthermore, the system uses a new mechanism of mutation in the context of genetic operators. The fact that this mechanism is based on the partition problem makes the attack against our system a difficult problem. During the ciphering, our system generates two keys, the first one is generated at the end of the algorithm and the second one is generated when the mutation operator. Both of them are session keys which might be beneficial for the security.