{"title":"使用遗传算法的位级对称密钥加密","authors":"A. Sen, Attri Ghosh, A. Nath","doi":"10.1109/CSNT.2017.8418536","DOIUrl":null,"url":null,"abstract":"Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted. The different generated cipher texts can be decrypted using the same user key. This is done by using genetic algorithm. Genetic algorithm has been used to generate an intermediate key which is unique each time the algorithm is executed. This intermediate key combined with a first level cipher text generates the second level cipher text. In the later stage the intermediate key is embedded with the second level cipher text using the user given key to produce the third and final cipher text. The process of embedding is done by using a completely new algorithm. The technique introduced may be implemented to encrypt any kind of confidential data. After encryption the size of the original file will change. The hackers or intruders will not be able to apply the standard attacks such as brute force attack, known plain text attack, differential attack or statistical attack. Without having any knowledge of the key, decryption of the text will not be possible. The present method has been tested on various known plain texts and the results show quite satisfactory.","PeriodicalId":382417,"journal":{"name":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"7","resultStr":"{\"title\":\"Bit level symmetric key cryptography using genetic algorithm\",\"authors\":\"A. Sen, Attri Ghosh, A. Nath\",\"doi\":\"10.1109/CSNT.2017.8418536\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted. The different generated cipher texts can be decrypted using the same user key. This is done by using genetic algorithm. Genetic algorithm has been used to generate an intermediate key which is unique each time the algorithm is executed. This intermediate key combined with a first level cipher text generates the second level cipher text. In the later stage the intermediate key is embedded with the second level cipher text using the user given key to produce the third and final cipher text. The process of embedding is done by using a completely new algorithm. The technique introduced may be implemented to encrypt any kind of confidential data. After encryption the size of the original file will change. The hackers or intruders will not be able to apply the standard attacks such as brute force attack, known plain text attack, differential attack or statistical attack. Without having any knowledge of the key, decryption of the text will not be possible. The present method has been tested on various known plain texts and the results show quite satisfactory.\",\"PeriodicalId\":382417,\"journal\":{\"name\":\"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-11-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"7\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSNT.2017.8418536\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2017 7th International Conference on Communication Systems and Network Technologies (CSNT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSNT.2017.8418536","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Bit level symmetric key cryptography using genetic algorithm
Symmetric key encryption is known to produce the same cipher text from the same set of plain text and key, each time the encryption process is carried out. Here the authors have developed a technique in which different cipher texts will be generated for the same set of plain text and key each time the plain text is encrypted. The different generated cipher texts can be decrypted using the same user key. This is done by using genetic algorithm. Genetic algorithm has been used to generate an intermediate key which is unique each time the algorithm is executed. This intermediate key combined with a first level cipher text generates the second level cipher text. In the later stage the intermediate key is embedded with the second level cipher text using the user given key to produce the third and final cipher text. The process of embedding is done by using a completely new algorithm. The technique introduced may be implemented to encrypt any kind of confidential data. After encryption the size of the original file will change. The hackers or intruders will not be able to apply the standard attacks such as brute force attack, known plain text attack, differential attack or statistical attack. Without having any knowledge of the key, decryption of the text will not be possible. The present method has been tested on various known plain texts and the results show quite satisfactory.