Stream Cipher for Text Encryption Using Swarm Intelligence Based Key Generation
ثبت نشده
چکیده
The third important aspect of security is encryption to transfer messages among the users in a secure manner. Group key management discussed in the earlier chapter is applicable for transferring messages securely to the members in a group. Apart from transferring messages to the members in a group, messages can be transferred securely to an individual user. Encryption plays a major role in such cases. This chapter discusses the application of swarm intelligence approaches for text encryption and the next chapter discusses the application of swarm intelligence for image encryption.
منابع مشابه
Design of Stream Cipher for Text Encryption using Particle Swarm Optimization based Key Generation
Encryption of data traffic in a network is essential since it is vulnerable to eavesdropping. Thus the data transferred in a network is encrypted. Encryption can be done using stream cipher method such as Vernam Cipher which is considered to be the perfect cipher. However this method suffers from the drawback of storing and distributing a large number of keys. In this paper we propose a Particl...
متن کاملStream cipher for binary image encryption using Ant Colony Optimization based key generation
Encryption of binary images is essential since it is vulnerable to eavesdropping in wired and wireless networks. The security of data becomes important since the communications over open network occur frequently. This paper focuses on encryption of binary image using a stream cipher method. In this paper we propose an Ant Colony Optimization (ACO) based approach of generating keys for encryptio...
متن کاملSwarm Intelligence based Faster Public- Key Cryptography in Wireless Communication (SIFPKC)
In this paper a Particle Swarm Organization guided faster version of public-key cryptography in wireless communication has been proposed by minimizing total number of modular multiplication, so that faster exponentiation can efficiently implemented which in turn progress the time requirements of the encryption / decryption of large number of plain or cipher text. Minimization of number of modul...
متن کاملHardware Implementation of Modified RC4 Stream Cipher Using FPGA
— In this project work, an efficient hardware Implementation of modified RC4 stream-cipher is proposed. In contrary to previous design, which requires four memories each of size 256 X 8, the proposed system can be implemented by using only two memories each of size 128 X 7. Due to the reduction in the memory size the strength of encryption can be increased. Design of RC4 stream cipher for data ...
متن کاملAnalysis of Different Cryptosystems Using Meta-heuristic Techniques
With the increasing usage of internet, the need of securing the information is also getting more important. The most widely used technique to make the information secure is cryptography. Cryptanalysis is a method to break the unreadable cipher text without having the key. This paper describes a method of deciphering encrypted messages of Vigenere cipher cryptosystems, Simple substitution crypto...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014