SURVEY : CRYPTOGRAPHY OPTIMIZATION ALGORITHMS
(1) KRS College of Engineering, Tamilnadu
(2) KRS College of Engineering, Tamilnadu
Corresponding Author
Abstract
With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.
Abstract
With the advent of e-commerce, it has become extremely essential to tackle the sensitive issues of affording data security, especially in the ever-blooming open network environment of the modern era. The encrypting technologies of the time-honored cryptography are generally employed to shelter data safety extensively. The term ‘cryptography’ refers to the process of safeguarding the secret data against access by unscrupulous persons in scenarios where it is humanly impossible to furnish physical protection. It deals with the methods which convert the data between intelligible and unintelligible forms by encryption/decryption functions with the management of key(s). Nowadays cryptographic key management issues that arise due to the distributed nature of IT resources, as well the distributed nature of their control. Recently these issues are solved by optimization algorithms utilized in the cryptographic algorithms. The purpose of this paper is to give a survey of optimal cryptographic keys that can be developed with the help of optimization algorithms, and to address their merits to the real-worldscenarios.
Keywords:Cryptography; Encryption; Decryption; Key Management; Optimization algorithm;
Keywords
References
Behrouz A. Forouzen, “Cryptography & Network security”, McGraw-Hill Companies, pp.1-56, 2007.
Shankar, K., and P. Eswaran. “An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm”, Artificial Intelligence and Evolutionary Computations in Engineering Systems. Springer India, 2016. 705-714.
https://en.wikipedia.org/wiki/Mathematical_optimization#Computationa l_optimization_techniques].
A.Durga Bhavani and P.Soundarya Mala, “Optimized Elliptic Curve Cryptography”, International Journal of Engineering Research and Applications (IJERA), Vol. 2, Issue 5, pages(s): 412–419, 2012.
Aarti Soni and Suyash Agrawal, “Using genetic algorithm for symmetric key generation in image encryption”, International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol.1, issue.10, page(s): 137–140, 2012.
K. Shankar, Dr.P.Eswaran: ECC Based Image Encryption Scheme with aid of Optimization Technique using Differential Evolution Algorithm. International Journal of Applied Engineering Research 2015; 10:5:1841- 1845.
N.K. Sreelaja and G.A. Vijayalakshmi Pai, “Stream cipher for binary image encryption using Ant Colony Optimization based key generation”, Applied Soft Computing, vol. 12, issue.9, age(s): 2879–2895, 2012.
N. K. Sreelaja1 and G. A. Vijayalakshmi Pai, “Swarm intelligence based key generation for stream cipher”, Security and Communication Networks, vol. 4, issue.2, page(s): 181–194, 2011.
Sreelaja.N.K and G.A.Vijayalakshmi Pai, “Design of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation”, Journal of Information Assurance and Security, vol. 4, page(s): 30–41, 2009.
P. Saveetha, S. Arumugam and K. Kiruthikadevi, “Cryptography and the Optimization Heuristics Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, vol.4, issue.10, page(s): 408–413, 2014.
Abdel-karim S.O. Hassan, Ahmed F, Shalash and Naglaa F. Saudy, “Modifications on RSA Cryptosystem Using Genetic Optimization”, International Journal of Research and Reviews in Applied Sciences, vol.19, issue.2, page(s): 150, 2014.
Xuanwu Zhou, “Scheme Optimization in Key Management with Cryptograph Methods”, Applied Mechanics and Materials, vol. 20, page(s): 539–545, 201.
Shankar, K., and P. Eswaran. “RGB-Based Secure Share Creation in Visual Cryptography Using Optimal Elliptic Curve Cryptography Technique”, Journal of Circuits, Systems and Computers 25.11 (2016): 1650138.
V.S.Shankar Sriram, S.Dinesh and G.Sahoo, “Multiplication Based Elliptic Curve Encryption Scheme with Optimized Scalar Multiplication (MECES)”, International Journal of Computer Applications, vol.1, no. 11, page(s): 65–70, 2010.
Aarti Soni and Suyash Agrawal, “Key Generation Using Genetic Algorithm for Image Encryption”, International Journal of Computer Science and Mobile Computing (IJCSMC), vol. 2, issue. 6, page(s):376– 383, 2013.
Binitha S, S Siva Sathya, “A Survey of Bio inspired Optimization Algorithms “, International Journal of Soft Computing and Engineering, Volume.2, Issue.2, page(s):137-151, May 2012.
Sindhuja K and Pramela Devi S, “A symmetric key encryption technique using genetic algorithm”, International Journal of Computer Science and Information Technologies, vol. 5, issue.1, page(s): 414–416, 2014.
J.Sai Geetha and D.I.George Amalarethinam, “ABCRNG-Swarm Intelligence in Public key Cryptography for Random Number Generation”, International Journal of Fuzzy Mathematical Archive, vol. 6, issue.2, page(s): 177–186, 2015
Jansirani, A., Rajesh, R., Balasubramanian, R., & Eswaran, P. (2011). Hi-tech authentication for pslette images using digital signature and data hiding. Int. Arab J. Inf. Technol., 8(2), 117-123.
Shankar, K., Lakshmanaprabu, S. K., Gupta, D., Khanna, A., & de Albuquerque, V. H. C. Adaptive optimal multi key based encryption for digital image security. Concurrency and Computation: Practice and Experience, e5122.
Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1-15.
K. Shankar, Lakshmanaprabu S. K, “Optimal key based homomorphic encryption for color image security aid of ant lion optimization algorithm”, International Journal of Engineering & Technology, Volume. 7, Issue. 9, page(s): 22-27, 2018.
Gupta, D., Khanna, A., Shankar, K., Furtado, V., & Rodrigues, J. J. Efficient artificial fish swarm based clustering approach on mobility aware energy efficient for MANET. Transactions on Emerging Telecommunications Technologies, e3524.
Uthayakumar, J., Metawa, N., Shankar, K., & Lakshmanaprabu, S. K. (2018). Financial crisis prediction model using ant colony optimization. International Journal of Information Management.
Uthayakumar, J., Metawa, N., Shankar, K., & Lakshmanaprabu, S. K. (2018). Intelligent hybrid model for financial crisis prediction using machine learning techniques. Information Systems and e-Business Management, 1-29.
Shankar, K., Elhoseny, M., Kumar, R. S., Lakshmanaprabu, S. K., & Yuan, X. (2018). Secret image sharing scheme with encrypted shadow images using optimal homomorphic encryption technique. Journal of Ambient Intelligence and Humanized Computing, 1-13.
Lakshmanaprabu, S. K., Mohanty, S. N., Shankar, K., Arunkumar, N., & Ramirez, G. (2019). Optimal deep learning model for classification of lung cancer on CT images. Future Generation Computer Systems, 92, 374-382.
Elhoseny, M., Shankar, K., Lakshmanaprabu, S. K., Maseleno, A., & Arunkumar, N. (2018). Hybrid optimization with cryptography encryption for medical image security in Internet of Things. Neural Computing and Applications, 1-15.
Avudaiappan, T., Balasubramanian, R., Pandiyan, S. S., Saravanan, M., Lakshmanaprabu, S. K., & Shankar, K. (2018). Medical image security using dual encryption with oppositional based optimization algorithm. Journal of medical systems, 42(11), 208.
Lakshmanaprabu, S. K., Shankar, K., Gupta, D., Khanna, A., Rodrigues,
J. J., Pinheiro, P. R., & de Albuquerque, V. H. C. (2018). Ranking analysis for online customer reviews of products using opinion mining with clustering. Complexity, 2018.
Karthikeyan, K., Sunder, R., Shankar, K., Lakshmanaprabu, S. K., Vijayakumar, V., Elhoseny, M., & Manogaran, G. (2018). Energy consumption analysis of Virtual Machine migration in cloud using hybrid swarm optimization (ABC–BA). The Journal of Supercomputing, 1-17.
Shankar K, Mohamed Elhoseny, Lakshmanaprabu S K, Ilayaraja M, Vidhyavathi RM, Mohamed A. Elsoud, Majid Alkhambashi. Optimal feature level fusion based ANFIS classifier for brain MRI image classification. Concurrency Computat Pract Exper. 2018;e4887.https://doi.org/10.1002/cpe.4887
Lydia, E. L., Kumar, P. K., Shankar, K., Lakshmanaprabu, S. K., Vidhyavathi, R. M., & Maseleno, A. (2018). Charismatic Document Clustering Through Novel K-Means Non-negative Matrix Factorization (KNMF) Algorithm Using Key Phrase Extraction. International Journal of Parallel Programming, 1-19.
Lakshmanaprabu SK, K. Shankar, Ashish Khanna, Deepak Gupta, Joel
J. P. C. Rodrigues, Plácido R. Pinheiro, Victor Hugo C. de Albuquerque, “Effective Features to Classify Big Data using Social Internet of Things”, IEEE Access, Volume.6, page(s):24196-24204, April 2018.
Nur Aminudin, Andino Maseleno, K. Shankar, S. Hemalatha, K. Sathesh kumar, Fauzi, Rita Irviani, Muhamad Muslihudin, “Nur Algorithm on Data Encryption and Decryption”, International Journal of Engineering & Technology, Volume. 7, Issue-2.26, page(s): 109- 118, June 2018.
Pandi Selvam Raman, K. Shankar, Ilayaraja M, “Securing cluster based routing against cooperative black hole attack in mobile ad hoc network”, International Journal of Engineering & Technology, Volume. 7, Issue. 9, page(s): 6-9, 2018.
K. Sathesh Kumar, K. Shankar, M. Ilayaraja, M. Rajesh, “Sensitive Data Security in Cloud Computing Aid of Different Encryption Techniques”, Journal of Advanced Research in Dynamical and Control Systems, Volume. 9, Issue. 18, page(s): 2888-2899, December 2017.
I. Ramya Princess Mary, P. Eswaran, K. Shankar, “Multi Secret Image Sharing Scheme based on DNA Cryptography with XOR”, International Journal of Pure and Applied Mathematics, Volume 118, No. 7, page(s) 393-398, February 2018.
K. Shankar, Mohamed Elhoseny, E. Dhiravida chelvi, SK. Lakshmanaprabu, Wanqing Wu, , IEEE Access, Vol.6, Issue.1, page(s): 77145-77154, December 2018. https://doi.org/10.1109/ACCESS.2018.2874026
E. Laxmi Lydia, K. Shankar, J. Pamina, J. Beschi Raja, “Correlating NoSQL Databases With a Relational Database: Performance and Space”, International Journal of Pure and Applied Mathematics, Volume 118, No. 7, page(s) 235-244, February 2018.
K. Shankar, G. Devika and M. Ilayaraja, “Secure and Efficient Multi- Secret Image Sharing Scheme based on Boolean Operations and Elliptic Curve Cryptography”, International Journal of Pure and Applied Mathematics, Volume 116, Issue. 10, page(s): 293-300, October 2017.
M. Ilayaraja, K. Shankar and G. Devika, “A Modified Symmetric Key Cryptography Method for Secure Data Transmission”, International Journal of Pure and Applied Mathematics, Volume 116, Issue. 10, page(s): 301-308, October 2017.
G. Devika, M. Ilayaraja and K. Shankar, “Optimal Radial Basis Neural Network (ORB-NN) For Effective Classification of Clouds in Satellite Images with Features”, International Journal of Pure and Applied Mathematics, Volume 116, Issue. 10, page(s): 309-329, October 2017.
K. Shankar. “An Optimal RSA Encryption Algorithm for Secret Images”, International Journal of Pure and Applied Mathematics, Volume 118, No. 20 page(s): 2491-2500, 2018.
M Elhoseny, X Yuan, Z Yu, C Mao, H El-Minir, and A Riad,. Balancing Energy Consumption in Heterogeneous Wireless Sensor Networks using Genetic Algorithm”, IEEE Communications Letters, IEEE, (2015), 19(12), pp, 2194 -2197.
Mohamed Elhoseny, Khaled Elleithy, Hamdi Elminir, Xiaohui Yuan, and Alaa Riad. Dynamic Clustering of Heterogeneous Wireless Sensor Networks using a Genetic Algorithm, Towards Balancing Energy Exhaustion. International Journal of Scientific & Engineering Research, (2015), 6(8), pp, 1243-1252.
Mohamed Elhoseny, Xiaohui Yuan, Hamdy K El-Minir, and AM Riad, “ Extending self-organizing network availability using genetic algorithm”, In 2014 International Conference on Computing, Communication and Networking Technologies (ICCCNT), (2014),pp, 11-13.
K. Shankar and P.Eswaran. “An Efficient Image Encryption Technique Based on Optimized Key Generation in ECC Using Genetic Algorithm”, Advances in Intelligent Systems and Computing, Springer, Volume: 394, Page(s): 705-714, 2016.
Noura Metawaa, M. Kabir Hassana, and Mohamed Elhoseny. Genetic algorithm based model for optimizing bank lending decisions. Expert Systems with Applications, 2017, 80, pp, 75–82.
Xiaohui Yuan, Daniel Li, Deepankar Mohapatra, Mohamed Elhoseny. Automatic removal of complex shadows from indoor videos using transfer learning and dynamic thresholding. Computers and Electrical Engineering, 2017, 70, pp, 813-825.
Hamid Reza Boveiri, Raouf Khayami, Mohamed Elhoseny, M. Gunasekaran. An efficient Swarm-Intelligence approach for task scheduling in cloud-based internet of things applications, Journal of Ambient Intelligence and Humanized Computing, 2018. https://doi.org/10.1007/s12652-018-1071-1
K. Shankar and P.Eswaran. “Sharing a Secret Image with Encapsulated Shares in Visual Cryptography”, Procedia Computer Science, Elsevier, Volume: 70, Page(s): 462-468, 2015.
Farahat I.S., Tolba A.S., Elhoseny M., Eladrosy W. Data Security and Challenges in Smart Cities. In: Hassanien A., Elhoseny M., Ahmed S., Singh A. (eds) Security in Smart Cities: Models, Applications, and Challenges. Lecture Notes in Intelligent Transportation and Infrastructure. Springer, Cham, 2019. https://doi.org/10.1007/978-3-030- 01560-2_6
Elhoseny M., Hassanien A.E. Expand Mobile WSN Coverage in Harsh Environments. In: Dynamic Wireless Sensor Networks. Studies in Systems, Decision and Control, Springer, Cham, 2019, 165,pp, 29-52. https://doi.org/10.1007/978-3-319-92807-4_2
Mohamed Elhoseny, Xiaohui Yuan, Hamdy K. El-Minir, Alaa Mohamed Riad. An energy
Article Metrics
Abstract View : 549 timesPDF Download : 94 times
DOI: 10.56327/ijiscs.v2i3.708
Refbacks
- There are currently no refbacks.