Hybrid Method for Encoding of Genetic and RC4 Algorithms

Authors

  • Marwah Kamil , Hussein Author

DOI:

https://doi.org/10.61841/xnqtyt77

Keywords:

Coding, RC4, Genetic Algorithms,, Voice, Hash Algorithm.

Abstract

In this paper, the proposed new method used is to generate the encryption key used in the RC4 algorithm by using the genetic algorithm by randomly generating it using the Rand function, and then subjecting it to the randomized conditions approved. If a match is used for coding, otherwise the genetic algorithm will be used to generate the random genetic key, which is along the length of the text to be encrypted.The proposed method used a new structure to hide the encrypted key within the transferred text, in addition to the integrity of the transferred key (integrity) was confirmed by using a simple flux function.

Downloads

Download data is not yet available.

References

1. R. V Ericson, Crime in an insecure world. Polity, 2007.

2. D. H. Flaherty, “Protecting privacy in police information systems: data protection in the Canadian Police Information Centre,” Univ. Tor. Law J., vol. 36, no. 2, pp. 116–148, 1986.

3. M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, “A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements,” Requir. Eng., vol. 16, no. 1, pp. 3–32, 2011.

4. E. McFadzean, J. Ezingeard, and D. Birchall, “Perception of risk and the strategic impact of existing IT on information security strategy at board level,” Online Inf. Rev., 2007.

5. S. Glass, T. Hiller, S. Jacobs, and C. Perkins, “Mobile IP authentication, authorization, and accounting requirements,” Work Prog., 2000.

6. R. M. Sharma and P. Choudhary, “Synthesis and Simulation of FPGA Based RC4 Encryption Method,” Synthesis (Stuttg)., vol. 5, no. 4, 2016.

7. A. A. Alhijaj and M. Kamil Hussein, “Stereo Images Encryption by OSA & RSA Algorithms,” J. Phys. Conf. Ser., vol. 1279, no. 1, 2019.

8. G. S. Basheer, “Application of Polyalphabetic Substitution Cipher using Genetic Algorithm,” AL- Rafidain J. Comput. Sci. Math., vol. 5, no. 1, pp. 57–68, 2008.

9. A. Gorodilov and V. Morozenko, “Genetic Algorithm for finding the Key’s length and Cryptanalysis of the Permutation Cipher,” 2008.

10. R. Toemeh and S. Arumugam, “Breaking transposition cipher with genetic algorithm,” Elektron. ir Elektrotechnika, vol. 79, no. 7, pp. 75–78, 2007.

11. A. Dimovski and D. Gligoroski, “Attacks on the transposition ciphers using optimization heuristics,” Proc. ICEST, pp. 1–4, 2003.

12. M. K. Hussein and A. A. Alhijaj, “TDL and ron rivest, adi shamir and leonard adleman in stereo images encrypt,” J. Adv. Res. Dyn. Control Syst., vol. 11, no. 1 Special Issue, pp. 1811–1817, 2019.

13. F. J. Kherad, H. R. Naji, M. V Malakooti, and P. Haghighat, “A new symmetric cryptography algorithm to secure e-commerce transactions,” in 2010 International Conference on Financial Theory and Engineering, 2010, pp. 234–237.

14. A. Maximov, Some words on cryptanalysis of stream ciphers. Citeseer, 2006.

15. D. Eastlake and T. Hansen, “US secure hash algorithms (SHA and HMAC-SHA).” RFC 4634, July, 2006.

16. R. Patel and N. Chaudhary, “Analyzing Digital Signature Robustness with Message Digest Algorithms,” Comput. Appl. Commun. Secur., 2012.

17. I. Mironov, “Hash functions: Theory, attacks, and applications,” Microsoft Res. Silicon Val. Campus.

Noviembre, 2005.

18. N. Ferguson et al., “The Skein hash function family,” Submiss. to NIST (round 3), vol. 7, no. 7.5, p. 3, 2010.

19. R. S. McIntyre et al., “Cognitive deficits and functional outcomes in major depressive disorder: determinants, substrates, and treatment interventions,” Depress. Anxiety, vol. 30, no. 6, pp. 515–527, 2013.

20. C. Neudecker, N. Mewes, A. K. Reimers, and A. Woll, “Exercise interventions in children and adolescents with ADHD: a systematic review,” J. Atten. Disord., vol. 23, no. 4, pp. 307–324, 2019.

Downloads

Published

30.06.2020

How to Cite

Hussein, M. K. ,. (2020). Hybrid Method for Encoding of Genetic and RC4 Algorithms. International Journal of Psychosocial Rehabilitation, 24(6), 7791-7803. https://doi.org/10.61841/xnqtyt77