Abstract
Information security is very important in the current era as we share most of the information through digital media/Internet. Cryptography is a technique which converts the secret information into some other form which is referred to as ciphertext. In order to have a strong ciphertext, one should have a strong cryptography algorithm as well as the secured key. The performance of any cryptography algorithm can be measured through the secret text input file size (number of bytes), performance time to encrypt input file and how fast it can be retrieved the secret text through cryptanalysis attack. In this paper, a socio-inspired optimization algorithm referred as cohort intelligence (CI) is applied to the secret text to retrieve the optimized ciphertext. The efficiency of the algorithm is also analyzed in this paper with respect to the secret text capacity and time.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243–250
Paul S, Dutt I, Choudhri SN (2013) Design and implementation of network security using genetic algorithm. Int J Res Eng Technol 2(2):172–177
Omran SS, Al-Khalid AS, Al-Saady DM (2010) Using genetic algorithm to break a mono-alphabetic substitution cipher. In: 2010 IEEE conference open systems (ICOS), pp 63–67
Sindhuja K, Devi PS (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inf Technol 5(1):414–416
Abdul Halim MF, Bara’a, AA, Hameed SM (2008) May. a binary particle swarm optimization for attacking knapsacks cipher algorithm. In: International Conference Computer and communication engineering, 2008. ICCCE 2008, pp 77–81
Pandey S, Mishra M (2012) Particle swarm optimization in cryptanalysis of DES. Int J Adv Res Comput Eng Technol (IJARCET) 1(4):379
Khan S, Shahzad W, Khan FA (2010) Cryptanalysis of four-rounded DES using ant colony optimization. In: 2010 International conference information science and applications (ICISA), pp 1–7
Biham E, Seberry J (2005) Py (Roo): a fast and secure stream cipher using rolling arrays. IACR Cryptology ePrint Archive, pp 155
Kim H, Han J, Cho S (2007) An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. In: Proceedings of the 2007 ACM symposium on applied computing pp 1171–1175
Sreelaja NK, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895
Kulkarni AJ, Durugkar IP, Kumar M (2013) Cohort intelligence: a self-supervised learning behavior. In: 2013 IEEE international conference, systems, man, and cybernetics (SMC), pp 1396–1400
Kulkarni AJ, Baki MF, Chaouch BA (2016) Application of the cohort-intelligence optimization method to three selected combinatorial optimization problems. Eur J Oper Res 250(2):427–447
Kale IR, Kulkarni AJ (2017) Cohort intelligence algorithm for discrete and mixed variable engineering problems. Int J Parall Emergent Distributed Syst 1–36
Sarmah DK, Kulkarni AJ (2017) Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods. Arabian J Sci Eng 1–24
Kulkarni AJ, Krishnasamy G, Abraham A (2017) Cohort intelligence: a socio-inspired optimization method. Springer, Heidelberg, Germany
Dhavle SV, Kulkarni AJ, Shastri A, Kale IR (2016) Design and economic optimization of shell-and-tube heat exchanger using cohort intelligence algorithm. Neural Comput Appl 1–15
Sreelaja NK, Vijayalakshmi Pai GA (2011) Swarm intelligence based key generation for stream cipher. Security Commun Networks 4(2):181–194
Author information
Authors and Affiliations
Corresponding authors
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Sarmah, D.K., Kale, I.R. (2019). Cryptography Algorithm Based on Cohort Intelligence. In: Kulkarni, A., Satapathy, S., Kang, T., Kashan, A. (eds) Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-13-1610-4_44
Download citation
DOI: https://doi.org/10.1007/978-981-13-1610-4_44
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-1609-8
Online ISBN: 978-981-13-1610-4
eBook Packages: EngineeringEngineering (R0)