2011
DOI: 10.1002/sec.132
|View full text |Cite
|
Sign up to set email alerts
|

Swarm intelligence based key generation for stream cipher

Abstract: Encryption of data traffic in a network is essential since it is vulnerable to eavesdropping. The security of data traffic becomes important since the communications over open network occur frequently. This paper focuses on encryption of plain text using a stream cipher method. However, the keys for encryption are generated using a swarm intelligence approach. Swarm intelligence is the emergent collective intelligence of groups of simple autonomous agents. The Ant Colony Optimization key Generation Algorithm (… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2012
2012
2023
2023

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 6 publications
(5 reference statements)
0
4
0
Order By: Relevance
“…The authors also proposed swarm intelligence approach [8] or otherwise termed as Ant Colony Optimization key Generation Algorithm (AKGA), for generating keys to encrypt the text message. In this method, stream cipher is used to encode the secret text and AKGA is used for generating keys.…”
Section: Cryptographic Based Optimization Methodsmentioning
confidence: 99%
“…The authors also proposed swarm intelligence approach [8] or otherwise termed as Ant Colony Optimization key Generation Algorithm (AKGA), for generating keys to encrypt the text message. In this method, stream cipher is used to encode the secret text and AKGA is used for generating keys.…”
Section: Cryptographic Based Optimization Methodsmentioning
confidence: 99%
“…Sreelaja and Vijayalakshmi Pai [33] came up with the idea for an approach to text encryption that was based on swarm intelligence. In this method, an Ant Colony Optimization Key Generation Algorithm, also known as an AKGA, is utilized to produce the encryption keys for the content that is being protected.…”
Section: Review Of Literaturementioning
confidence: 99%
“…According to Kerckhoff's principle the secrecy of key only provides security, even though the cryptographic system is more complicated [8]. Many researchers have studied different methods and innovative approaches for key generation in public clouds [5,16,21]. Still, attackers prove too smart to overthrow all known security systems.…”
Section: B Celluar Automatamentioning
confidence: 99%