Skip to main content

Cryptography Algorithm Based on Cohort Intelligence

  • Conference paper
  • First Online:

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 828))

Abstract

Information security is very important in the current era as we share most of the information through digital media/Internet. Cryptography is a technique which converts the secret information into some other form which is referred to as ciphertext. In order to have a strong ciphertext, one should have a strong cryptography algorithm as well as the secured key. The performance of any cryptography algorithm can be measured through the secret text input file size (number of bytes), performance time to encrypt input file and how fast it can be retrieved the secret text through cryptanalysis attack. In this paper, a socio-inspired optimization algorithm referred as cohort intelligence (CI) is applied to the secret text to retrieve the optimized ciphertext. The efficiency of the algorithm is also analyzed in this paper with respect to the secret text capacity and time.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Coppersmith D (1994) The data encryption standard (DES) and its strength against attacks. IBM J Res Dev 38(3):243–250

    Article  Google Scholar 

  2. Paul S, Dutt I, Choudhri SN (2013) Design and implementation of network security using genetic algorithm. Int J Res Eng Technol 2(2):172–177

    Article  Google Scholar 

  3. Omran SS, Al-Khalid AS, Al-Saady DM (2010) Using genetic algorithm to break a mono-alphabetic substitution cipher. In: 2010 IEEE conference open systems (ICOS), pp 63–67

    Google Scholar 

  4. Sindhuja K, Devi PS (2014) A symmetric key encryption technique using genetic algorithm. Int J Comput Sci Inf Technol 5(1):414–416

    Google Scholar 

  5. Abdul Halim MF, Bara’a, AA, Hameed SM (2008) May. a binary particle swarm optimization for attacking knapsacks cipher algorithm. In: International Conference Computer and communication engineering, 2008. ICCCE 2008, pp 77–81

    Google Scholar 

  6. Pandey S, Mishra M (2012) Particle swarm optimization in cryptanalysis of DES. Int J Adv Res Comput Eng Technol (IJARCET) 1(4):379

    Google Scholar 

  7. Khan S, Shahzad W, Khan FA (2010) Cryptanalysis of four-rounded DES using ant colony optimization. In: 2010 International conference information science and applications (ICISA), pp 1–7

    Google Scholar 

  8. Biham E, Seberry J (2005) Py (Roo): a fast and secure stream cipher using rolling arrays. IACR Cryptology ePrint Archive, pp 155

    Google Scholar 

  9. Kim H, Han J, Cho S (2007) An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices. In: Proceedings of the 2007 ACM symposium on applied computing pp 1171–1175

    Google Scholar 

  10. Sreelaja NK, Pai GV (2012) Stream cipher for binary image encryption using ant colony optimization based key generation. Appl Soft Comput 12(9):2879–2895

    Article  Google Scholar 

  11. Kulkarni AJ, Durugkar IP, Kumar M (2013) Cohort intelligence: a self-supervised learning behavior. In: 2013 IEEE international conference, systems, man, and cybernetics (SMC), pp 1396–1400

    Google Scholar 

  12. Kulkarni AJ, Baki MF, Chaouch BA (2016) Application of the cohort-intelligence optimization method to three selected combinatorial optimization problems. Eur J Oper Res 250(2):427–447

    Article  MathSciNet  Google Scholar 

  13. Kale IR, Kulkarni AJ (2017) Cohort intelligence algorithm for discrete and mixed variable engineering problems. Int J Parall Emergent Distributed Syst 1–36

    Google Scholar 

  14. Sarmah DK, Kulkarni AJ (2017) Image steganography capacity improvement using cohort intelligence and modified multi-random start local search methods. Arabian J Sci Eng 1–24

    Google Scholar 

  15. Kulkarni AJ, Krishnasamy G, Abraham A (2017) Cohort intelligence: a socio-inspired optimization method. Springer, Heidelberg, Germany

    Book  Google Scholar 

  16. Dhavle SV, Kulkarni AJ, Shastri A, Kale IR (2016) Design and economic optimization of shell-and-tube heat exchanger using cohort intelligence algorithm. Neural Comput Appl 1–15

    Google Scholar 

  17. Sreelaja NK, Vijayalakshmi Pai GA (2011) Swarm intelligence based key generation for stream cipher. Security Commun Networks 4(2):181–194

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Dipti Kapoor Sarmah or Ishaan R. Kale .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sarmah, D.K., Kale, I.R. (2019). Cryptography Algorithm Based on Cohort Intelligence. In: Kulkarni, A., Satapathy, S., Kang, T., Kashan, A. (eds) Proceedings of the 2nd International Conference on Data Engineering and Communication Technology. Advances in Intelligent Systems and Computing, vol 828. Springer, Singapore. https://doi.org/10.1007/978-981-13-1610-4_44

Download citation

  • DOI: https://doi.org/10.1007/978-981-13-1610-4_44

  • Published:

  • Publisher Name: Springer, Singapore

  • Print ISBN: 978-981-13-1609-8

  • Online ISBN: 978-981-13-1610-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics