
AN EFFICIENT CHAOS-BASED OPTIMIZATION ALGORITHM APPROACH FOR CRYPTOGRAPHY
Author(s) -
Rashi Vohra,
Brajesh Patel
Publication year - 2012
Publication title -
international journal of communication networks and security
Language(s) - English
Resource type - Journals
ISSN - 2231-1882
DOI - 10.47893/ijcns.2012.1056
Subject(s) - cryptography , cryptosystem , computer science , encryption , chaos (operating system) , chaotic , key (lock) , key space , neural cryptography , theoretical computer science , algorithm , pseudorandom number generator , authentication (law) , public key cryptography , computer security , artificial intelligence
The utmost negative impact of advancement of technology is an exponential increase in security threats, due to which tremendous demand for effective electronic security is increasing importantly. The principles of any security mechanism are confidentiality, authentication, integrity, non-repudiation, access control and availability. Cryptography is an essential aspect for secure communications. Many chaotic cryptosystem has been developed, as a result of the interesting relationship between the two field chaos and cryptography phenomenological behavior. In this paper, an overview of cryptography, optimization algorithm and chaos theory is provided and a novel approach for encryption and decryption based on chaos and optimization algorithms is discussed. In this article, the basic idea is to encrypt and decrypt the information using the concept of genetic algorithm with the pseudorandom sequence further used as a key in genetic algorithm operation for encryption: which is generated by application of chaotic map. This attempt result in good desirable cryptographic properties as a change in key will produce undesired result in receiver side. The suggested approach complements standard, algorithmic procedures, providing security solutions with novel features.