{"title":"Key Transposition Cipher and Decipher based on Genetic Algorithm","authors":"Dalal N. Hamood","doi":"10.1109/ICAIoT57170.2022.10121893","DOIUrl":null,"url":null,"abstract":"For increasing attackers and their risks in life, the two parties (sender and receiver) can be using a safe environment to send and receive the secret message by encrypting the message (unreadable message) and send to the receiver. The symmetric key algorithm is more efficient and very fast than an asymmetric key algorithm. This paper used a key transposition cipher for encrypting and decrypting messages, the key obtained by the genetic algorithm when the GA generated the best key after many iterations, and for each iteration treated the individuals by selection and crossover and mutation. The fitness function calculated the difference between letters occurrence between the plaintext and ciphertext. After testing, the proposed method’s success in passing six types of attacks when the traditional transposition fails for two attacks. Also, the proposed method is faster than traditional transposition and it is suited for use in online chatting and live communications.","PeriodicalId":297735,"journal":{"name":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 International Conference on Artificial Intelligence of Things (ICAIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICAIoT57170.2022.10121893","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
For increasing attackers and their risks in life, the two parties (sender and receiver) can be using a safe environment to send and receive the secret message by encrypting the message (unreadable message) and send to the receiver. The symmetric key algorithm is more efficient and very fast than an asymmetric key algorithm. This paper used a key transposition cipher for encrypting and decrypting messages, the key obtained by the genetic algorithm when the GA generated the best key after many iterations, and for each iteration treated the individuals by selection and crossover and mutation. The fitness function calculated the difference between letters occurrence between the plaintext and ciphertext. After testing, the proposed method’s success in passing six types of attacks when the traditional transposition fails for two attacks. Also, the proposed method is faster than traditional transposition and it is suited for use in online chatting and live communications.