International Journal of Engineering and Technology
Information security plays a major role in case of secured data transmission. In this paper some intelligent techniques have been pointed out regarding effective cipher generation based on SKEY, interlock protocol and SKID. The authors have also cited cryptosystems based on linear property of propositional operator, the concept of fuzzy logic, optimized function and concept of data mining based on comparison analysis. Various proposed techniques have also been pointed out for shared key evaluation in multi-party communication and the areas concerned are shared key generation based on support rule, cent percent confidence rule, minimal frequent set and sequence mining and feature-based method.