Secure Key Stream Generation Using Computational Intelligence Techniques

Provided by: Creative Commons
Topic: Security
Format: PDF
Cryptography provides strong protection for Information Technology (IT) systems and applications. Secure management of the cryptographic keys is critically important, since the security and reliability of cryptographic processes depends upon the strength of the keys, the effectiveness of the protocols associated with the keys, and the protection given to the keys. In this paper, a soft computing based approach is proposed for generating keys and to design a stream cipher for text encryption. Neural Synchronization has been used to construct a cryptographic key agreement protocol using Particle Swarm Optimization (PSO) to accelerate the mutual learning between the sender and receiver in the Tree Parity Machine (TPM) neural network.

Find By Topic