Security Vs cost: An issue of multi-objective optimization for choosing PGP algorithms

PGP (Pretty Good Privacy) is most widely used standard in the world for securing electronic mails. It promises for confidentiality, integrity and authentication to its users. These security services are provided at a cost of various cryptographic algorithms. Given a data, choosing particular algorithms for its security, according to the user requirements, is a non-trivial task. As various algorithms with different security levels and cost are available. In this paper we have proposed a meta-heuristic based on Evolutionary Multi-objective Optimization for selecting appropriate algorithms for PGP according to the user requirements of cost and security levels.

[1]  C. Fonseca,et al.  GENETIC ALGORITHMS FOR MULTI-OBJECTIVE OPTIMIZATION: FORMULATION, DISCUSSION, AND GENERALIZATION , 1993 .

[2]  Peter J. Fleming,et al.  Genetic Algorithms for Multiobjective Optimization: FormulationDiscussion and Generalization , 1993, ICGA.

[3]  Marco Laumanns,et al.  Combining Convergence and Diversity in Evolutionary Multiobjective Optimization , 2002, Evolutionary Computation.

[4]  Marco Laumanns,et al.  SPEA2: Improving the Strength Pareto Evolutionary Algorithm For Multiobjective Optimization , 2002 .

[5]  Jon Callas,et al.  OpenPGP Message Format , 1998, RFC.

[6]  Xiao-Min Zhu,et al.  Multi-Dimensional Scheduling for Real-Time Tasks on Heterogeneous Clusters , 2009, Journal of Computer Science and Technology.

[7]  Behrouz A. Forouzan,et al.  Data Communications and Networking , 2000 .

[8]  Thomas Hanne,et al.  Global Multiobjective Optimization with Evolutionary Algorithms: Selection Mechanisms and Mutation Control , 2001, EMO.

[9]  Jingjun Zhang,et al.  An Improved Multi-Objective Adaptive Niche Genetic Algorithm Based On Pareto Front , 2009, 2009 IEEE International Advance Computing Conference.

[10]  Carlos A. Coello Coello,et al.  Evolutionary multi-objective optimization: a historical view of the field , 2006, IEEE Comput. Intell. Mag..

[11]  Kalyanmoy Deb,et al.  A Fast and Effective Method for Pruning of Non-dominated Solutions in Many-Objective Problems , 2006, PPSN.

[12]  Kalyanmoy Deb,et al.  Local search based evolutionary multi-objective optimization algorithm for constrained and unconstrained problems , 2009, 2009 IEEE Congress on Evolutionary Computation.

[13]  C. A. Coello Coello,et al.  Evolutionary multi-objective optimization: a historical view of the field , 2006, IEEE Computational Intelligence Magazine.

[14]  David W. Coit,et al.  Multi-objective optimization using genetic algorithms: A tutorial , 2006, Reliab. Eng. Syst. Saf..

[15]  William Stallings,et al.  Cryptography and Network Security: Principles and Practice , 1998 .

[16]  Marco Laumanns,et al.  A Tutorial on Evolutionary Multiobjective Optimization , 2004, Metaheuristics for Multiobjective Optimisation.

[17]  Kalyanmoy Deb,et al.  Muiltiobjective Optimization Using Nondominated Sorting in Genetic Algorithms , 1994, Evolutionary Computation.