Overview of Information Security Using Genetic Algorithm and Chaos

ABSTRACT Security, integrity, nonrepudiation, confidentiality, and authentication services are the most important factors in information security. Genetic algorithms (GAs) are a class of optimization algorithms. Many problems can be solved using genetic algorithms through modeling a simplified version of genetic processes. The application of a genetic algorithm to the field of cryptology is unique. Few works exist on this topic. In this article, an attempt has been made to give an overview of genetic algorithm-based cryptography and to propose a new approach to GA with pseudorandom sequence to encrypt data stream. The feature of such an approach includes high data security and high feasibility for easy integration with commercial multimedia transmission applications. The experimental results of the proposed technique confirm that high throughput rate needed for real time data protection is achieved.

[1]  L. Chua,et al.  CLARIFYING CHAOS: EXAMPLES AND COUNTEREXAMPLES , 1996 .

[2]  Leon O. Chua,et al.  Secure Communications via Chaotic Synchronization II: Noise Reduction by Cascading Two Identical Receivers , 1993 .

[3]  J. Fridrich Symmetric Ciphers Based on Two-Dimensional Chaotic Maps , 1998 .

[4]  A F Mohammed Al-Husainy Image Encryption Using Genetic Algorithm , 2006 .

[5]  A. Tragha,et al.  ICIGA: Improved Cryptography Inspired by Genetic Algorithms , 2006, 2006 International Conference on Hybrid Information Technology.

[6]  Gonzalo Alvarez,et al.  Cryptanalysis of a chaotic secure communication system , 2003 .

[7]  David E. Goldberg,et al.  Genetic Algorithms in Search Optimization and Machine Learning , 1988 .

[8]  Jan Awrejcewicz,et al.  Bifurcation and Chaos , 1995 .

[9]  X. Mou,et al.  On the security of a chaotic encryption scheme: problems with computerized chaos in finite computing precision , 2003 .

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  X. Mou,et al.  Improving security of a chaotic encryption approach , 2001, Physics Letters A.

[12]  C. Wu,et al.  Studying chaos via 1-D maps-a tutorial , 1993 .

[13]  Adi Shamir,et al.  A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.

[14]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[15]  Vincent Rijmen,et al.  The Design of Rijndael: AES - The Advanced Encryption Standard , 2002 .

[16]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[17]  G. Álvarez,et al.  Cryptanalysis of a discrete chaotic cryptosystem using external key , 2003 .