Recently, a genetic-based random key generator (GRKG) for the one-time pad (OTP) cryptosystem has been proposed in the literature which has certain limitations. In this paper, two main characteristics (speed and randomness) of the GRKG method are significantly improved by presenting the IGRKG method (improved genetic-based random key generator method). The proposed IGRKG method generates an initial pad by using linear congruential generator (LCG) and improves the randomness of the initial pad using genetic algorithm. There are three reasons behind the use of LCG: it is easy to implement, it can run efficiently on computer hardware, and it has good statistical properties. The experimental results show the superiority of the IGRKG over GRKG i...
The focus of network security is to provide the secure, effective and private communication between ...
It is important to create a cryptographic system such that the encryption system does not depend on ...
Abstract: Random sequences play an important role in all aspects of Cryptography. All cryptographic ...
Genetic algorithms (GA) are random algorithms as random numbers that are generated during the operat...
A random-key genetic algorithm is an evolutionary metaheuristic for discrete and global optimization...
<div>This article describes a method to use Genetic Algorithm to generate keys for the fully homomor...
Data encryption is being widely employed to secure data in order to provide confidentiality, authent...
This paper focuses on generating a random bit sequence using Trellis coded Genetic Algorithm (TCGA) ...
Cryptographic applications such as online banking, and securing medical and military data require th...
In this study, has shown how to design asymmetric encryption algorithm based on using two pseudorand...
Linear Congruential Generators (LCGs) are one model of pseudorandom number generators used in a grea...
Abstract. Cryptography is an important tool for protecting and securing data. In public key cryptogr...
In this article, we propose a new regenerator of pseudo-random sequences R.A NMJ, based on evolution...
<div>Slides describe a method to use Genetic Algorithm to generate keys for the fully homomorphic en...
International audienceRandom number generators (RNGs) are computational or physical functions genera...
The focus of network security is to provide the secure, effective and private communication between ...
It is important to create a cryptographic system such that the encryption system does not depend on ...
Abstract: Random sequences play an important role in all aspects of Cryptography. All cryptographic ...
Genetic algorithms (GA) are random algorithms as random numbers that are generated during the operat...
A random-key genetic algorithm is an evolutionary metaheuristic for discrete and global optimization...
<div>This article describes a method to use Genetic Algorithm to generate keys for the fully homomor...
Data encryption is being widely employed to secure data in order to provide confidentiality, authent...
This paper focuses on generating a random bit sequence using Trellis coded Genetic Algorithm (TCGA) ...
Cryptographic applications such as online banking, and securing medical and military data require th...
In this study, has shown how to design asymmetric encryption algorithm based on using two pseudorand...
Linear Congruential Generators (LCGs) are one model of pseudorandom number generators used in a grea...
Abstract. Cryptography is an important tool for protecting and securing data. In public key cryptogr...
In this article, we propose a new regenerator of pseudo-random sequences R.A NMJ, based on evolution...
<div>Slides describe a method to use Genetic Algorithm to generate keys for the fully homomorphic en...
International audienceRandom number generators (RNGs) are computational or physical functions genera...
The focus of network security is to provide the secure, effective and private communication between ...
It is important to create a cryptographic system such that the encryption system does not depend on ...
Abstract: Random sequences play an important role in all aspects of Cryptography. All cryptographic ...