Security in network is based on cryptography, the science and art of transforming the messages to... more Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity, non-repudiation, confidentiality, and authentication services plays a vital role. Ciphers are developed to create a secure channel for message communication. The field of cryptography and cryptanalysis is quite demanding and complex as it minimizes the need for time-consuming human interaction with the search process and the network security. However, recurring events such as hackers and intruders attack and the success of criminal attackers illustrate the weaknesses in current security system, information technologies and the need to provide heightened security for these systems. Thus, the application of an efficient and effective tool such as Computational Intelligence (CI) to the field of cryptology comes naturally. CI systems are usually hybrids of paradigms such as Evolutionary Computation systems, Artificial Neural Networks and Fuzzy systems, supplemented with elements of reasoning. Genetic Algorithm is a class of evolutionary computation which is expected to provide optimized and deterministic solution to various common cipher attacks. This paper explores various techniques in cryptography to prove that the natural selection and adaptive mechanism based techniques are as good as the rigorous mathematical techniques used by traditional cryptographic methods.
Security in network is based on cryptography, the science and art of transforming the messages to... more Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity, non-repudiation, confidentiality, and authentication services plays a vital role .Ciphers are developed to create a secure channel for message communication. The field of cryptography and cryptanalysis is quite demanding and complex as it minimizes the need for time-consuming human interaction with the search process and the network security. However, recurring events such as hackers and intruders attack and the success of criminal attackers illustrate the weaknesses in current security system, information technologies and the need to provide heightened security for these systems. Thus, the application of an efficient and effective tool such as Computational Intelligence (CI) to the field of cryptology comes naturally. CI systems are usually hybrids of paradigms such as Evolutionary Computation systems, Artificial Neural Networks and Fuzzy systems, supplemented with elements of reasoning. Genetic Algorithm is a class of evolutionary computation which is expected to provide optimized and deterministic solution to various common cipher attacks. This paper explores various techniques in cryptography to prove that the natural selection and adaptive mechanism based techniques are as good as the rigorous mathematical techniques used by traditional cryptographic methods.
Security in network is based on cryptography, the science and art of transforming the messages to... more Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity, non-repudiation, confidentiality, and authentication services plays a vital role. Ciphers are developed to create a secure channel for message communication. The field of cryptography and cryptanalysis is quite demanding and complex as it minimizes the need for time-consuming human interaction with the search process and the network security. However, recurring events such as hackers and intruders attack and the success of criminal attackers illustrate the weaknesses in current security system, information technologies and the need to provide heightened security for these systems. Thus, the application of an efficient and effective tool such as Computational Intelligence (CI) to the field of cryptology comes naturally. CI systems are usually hybrids of paradigms such as Evolutionary Computation systems, Artificial Neural Networks and Fuzzy systems, supplemented with elements of reasoning. Genetic Algorithm is a class of evolutionary computation which is expected to provide optimized and deterministic solution to various common cipher attacks. This paper explores various techniques in cryptography to prove that the natural selection and adaptive mechanism based techniques are as good as the rigorous mathematical techniques used by traditional cryptographic methods.
Security in network is based on cryptography, the science and art of transforming the messages to... more Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity, non-repudiation, confidentiality, and authentication services plays a vital role .Ciphers are developed to create a secure channel for message communication. The field of cryptography and cryptanalysis is quite demanding and complex as it minimizes the need for time-consuming human interaction with the search process and the network security. However, recurring events such as hackers and intruders attack and the success of criminal attackers illustrate the weaknesses in current security system, information technologies and the need to provide heightened security for these systems. Thus, the application of an efficient and effective tool such as Computational Intelligence (CI) to the field of cryptology comes naturally. CI systems are usually hybrids of paradigms such as Evolutionary Computation systems, Artificial Neural Networks and Fuzzy systems, supplemented with elements of reasoning. Genetic Algorithm is a class of evolutionary computation which is expected to provide optimized and deterministic solution to various common cipher attacks. This paper explores various techniques in cryptography to prove that the natural selection and adaptive mechanism based techniques are as good as the rigorous mathematical techniques used by traditional cryptographic methods.
Uploads
Papers by kalai selvi