2018
DOI: 10.1002/spy2.37
|View full text |Cite
|
Sign up to set email alerts
|

An efficient mechanism to generate dynamic keys based on genetic algorithm

Abstract: Sharing information and providing services are the key factors of the computer network. Due to publically in nature of computer network and improvement of various technology in the field of computer science, the chances of hacking and licking the confidentiality of shared messages have increased exponentially. Hence, preventing such possibilities and maintaining the confidentiality over the computer network has become the primary and forth most requirement. According to Shannon's perfect secrecy, the confident… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
7
0

Year Published

2021
2021
2022
2022

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(7 citation statements)
references
References 17 publications
0
7
0
Order By: Relevance
“…Dynamic keys have been used in several encryption approaches to overcome multiround computational complexity [28][29][30]. These approaches follow a dynamic structure where the structure of all cipher primitives, such as substitution and permutation tables, changes depending on the dynamic key, which allows a reduction in the number of rounds, leading to a reduction in computational overhead without lowering the security level [28].…”
Section: Background and Related Workmentioning
confidence: 99%
“…Dynamic keys have been used in several encryption approaches to overcome multiround computational complexity [28][29][30]. These approaches follow a dynamic structure where the structure of all cipher primitives, such as substitution and permutation tables, changes depending on the dynamic key, which allows a reduction in the number of rounds, leading to a reduction in computational overhead without lowering the security level [28].…”
Section: Background and Related Workmentioning
confidence: 99%
“…One of the uses of computer technologies in human lives is to protect private information from random access by unauthorized people and cryptographic techniques is one of the methods used to do this task [1,2].…”
Section: Introductionmentioning
confidence: 99%
“…In either case, the fact that the document is encrypted does not prevent unauthorized people from accessing it, but it does ensure that they cannot understand what they see. In addition to many encryption algorithms, the genetic algorithm GA, or its genetic operations, is used in a variety of aspects of data security [1,[3][4][5][6][7].…”
Section: Introductionmentioning
confidence: 99%