COMPUTATIONAL SCIENCE GUIDED SOFT COMPUTING BASED CRYPTOGRAPHIC TECHNIQUE USING ANT COLONY INTELLIGENCE FOR WIRELESS COMMUNICATION (ACICT)

In this paper, a computational science guided soft computing based cryptographic technique using Ant Colony Intelligence (ACICT) has been proposed. In this proposed approach at first a metamorphosed based strategy is used to produce intermediate cipher text. Finally, ACI generated keystream is used to further encrypt the intermediate cipher text to produce the final cipher text. In this approach an ant agent having a pheromone deposition consisting of a group of alphanumeric characters is called a key stream and each character in the key stream is known as key. The key stream length always be less than or equal to the plaintext to be encrypt. The keystream generation is based on distribution of characters in the plaintext. Instead of transmitting the plain keystream to the receiver, further encryption is done on keystream and encrypted keystream get transmitted to the receiver. Parametric tests are done and results are compared with some existing classical techniques, which show comparable results for the proposed system.

[1]  Andreas Ruttor,et al.  Genetic attack on neural cryptography. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[2]  Wolfgang Kinzel,et al.  Neural cryptography , 2002, Proceedings of the 9th International Conference on Neural Information Processing, 2002. ICONIP '02..

[3]  Jungkyu Han,et al.  An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices , 2007, SAC '07.

[4]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[5]  William Stallings,et al.  Cryptography and network security , 1998 .

[6]  I Kanter,et al.  Secure key-exchange protocol with an absence of injective functions. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[7]  C.-C. Jay Kuo,et al.  Design of integrated multimedia compression and encryption systems , 2005, IEEE Transactions on Multimedia.

[8]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[9]  Eli Biham,et al.  Py (Roo): A Fast and Secure Stream Cipher using Rolling Arrays , 2005, IACR Cryptol. ePrint Arch..