EconPapers    
Economics at your fingertips  
 

Evaluation of cryptographic key generation performance using evolutionary algorithm

M. Ragavan () and K. Prabu ()
Additional contact information
M. Ragavan: Bharathidasan University
K. Prabu: Bharathidasan University

International Journal of System Assurance Engineering and Management, 2022, vol. 13, issue 1, No 49, 487 pages

Abstract: Abstract The process of key generation is at the heart of each cryptography method’s encryption and decryption. As a result, it is necessary to make the key as strong as possible in order to eliminate the risk of hacking, resulting in extremely secure data. The process of key detection will be difficult if all key generating methods are defined with a high level of randomness. Author has proposed an evolutionary method of genetic algorithm to improve key generation performance. It also includes a frame with a population gene size of 16 bytes. After generating the population size ‘M', the fitness function is used to choose the best genes. The selected genes are then subjected to mutation and crossover functions. The best genes are then added to the population based on the results of the operations. Finally, we generate a key from the population set by selecting a gene at random. The technique described above is repeated N times. The sole gene is usually measured from a 16-byte key. If a 32-byte key is required, technique chooses two genes at random and merge them to generate the appropriate key. Method compares the performance of key creation with two built-in evolutionary methods using Python. In addition to the time complexity many other parameters like entropy values, and size of ciphertexthave been considered for evaluation in this proposed work. This proposed system depicts that the Evolutionary key generation (EKG) approach is nearly as good as the Password key generation technique, and that EKG is significant than the Random key generation technique.

Keywords: Security; Evolutionary algorithm; Secrete key generation; Cryptography; Applications; Encryption; Decryption (search for similar items in EconPapers)
Date: 2022
References: View complete reference list from CitEc
Citations: View citations in EconPapers (1)

Downloads: (external link)
http://link.springer.com/10.1007/s13198-021-01478-0 Abstract (text/html)
Access to the full text of the articles in this series is restricted.

Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.

Export reference: BibTeX RIS (EndNote, ProCite, RefMan) HTML/Text

Persistent link: https://EconPapers.repec.org/RePEc:spr:ijsaem:v:13:y:2022:i:1:d:10.1007_s13198-021-01478-0

Ordering information: This journal article can be ordered from
http://www.springer.com/engineering/journal/13198

DOI: 10.1007/s13198-021-01478-0

Access Statistics for this article

International Journal of System Assurance Engineering and Management is currently edited by P.K. Kapur, A.K. Verma and U. Kumar

More articles in International Journal of System Assurance Engineering and Management from Springer, The Society for Reliability, Engineering Quality and Operations Management (SREQOM),India, and Division of Operation and Maintenance, Lulea University of Technology, Sweden
Bibliographic data for series maintained by Sonal Shukla () and Springer Nature Abstracting and Indexing ().

 
Page updated 2025-03-20
Handle: RePEc:spr:ijsaem:v:13:y:2022:i:1:d:10.1007_s13198-021-01478-0