Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2010, Computer and Electrical …
…
6 pages
1 file
2016
Cryptarithmetic problem has many ways to solve using different algorithm. In this paper we proposed a solution to a problem using Parallel Genetic algorithm and Evolutionary algorithm for comparison and assessment of a cryptarithmetic problem. Comparison can be done in terms of execution times of both the algorithm in milliseconds with respect to the different numbers of variable. The result shows using chart shows that the Parallel genetic algorithm takes lesser time for execution than evolutionary algorithm. Keywords— cryptarithm, alphametics , Genetic Algorithms, Parallel Genetic Algorithms, Evolutionary INTRODUCTION Cryptarithmetic, also known as cryptarithm, alphametics, verbal arithmetic or word addition are puzzles in which a set of words is written down in the form of a long addition sum or some other mathematical problems that produces a sensible phrase and words formed by the operands[1].The object is to replace the letters of the alphabet with decimal digits to make a val...
Artificial Intelligence, 2000
Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve problems in a wide area of applications. The aim of this chapter is to present an overview of existing literature about the applications of CI in cryptology. It demonstrates and studies the applicability of CI in cryptology. The problems examined in this chapter are the automated design of cipher systems, and the automated cryptanalysis of cipher systems. It has been shown that CI methods, such as genetic algorithms, genetic programming, Tabu search, and memetic computing are effective tools to solve most of cryptology problems.
This paper will take a brief look at the usage of genetic algorithms in cryptography. Since there is no standard classification, this paper classified the usage into three categories according to its application and usage, they are: The usage of genetic algorithm in key generation, in creating new encryption process, in improving the standard encryption algorithm. And in each approach, its advantages and disadvantages were discussed.
Now days, the amount of transfer of data over large network is increasing day by day. As there is increase in data transfer, simultaneously there are security threats that are arising with it. In this paper we are proposing cryptographic systems that make use of genetic algorithm to securely transfer the data over large network. This approach helps us to provide high achievability to transfer data securely. The techniques that we are using for encryption & decryption are based on genetic algorithm which will help us to efficiently encrypt the data which is resistible for any kind of external attacks. Then we will parallelize it using Open Mp language which accelerates the transformation of data to achieve high security. Then analyze the performance for both code serial and parallel execution.
Mobile Networks and Applications
In 1976, Whitfield Diffie and Martin Hellman introduced the public key cryptography or asymmetric cryptography standards. Two years later, an asymmetric cryptosystem was published by Ralph Merkle and Martin Hellman called MH, based on a variant of knapsack problem known as the subset-sum problem which is proven to be NP-hard. Furthermore, over the last four decades, Metaheuristics have achieved a remarkable progress in solving NP-hard optimization problems. However, the conception of these methods raises several challenges, mainly the adaptation and the parameters setting. In this paper, we propose a Parallel Genetic Algorithm (PGA) adapted to explore effectively the search space of considerable size in order to break the MH cipher. Experimental study is included, showing the performance of the proposed attacking scheme and finally concluding with a comparison with the LLL algorithm attack.
Nonlinear Analysis: Theory, Methods & Applications, 2005
In this contribution problems encountered in the field of cryptology, are introduced as discrete optimization tasks. Two evolutionary computation algorithms, namely the particle swarm optimization method and the differential evolution method, are applied to handle these problems. The results indicate that the dynamic of this type of discrete optimization problems makes it difficult for the methods to retain information. ᭧
Security in network is based on cryptography, the science and art of transforming the messages to make them secure and immune to attack. Cryptography is the most important aspect of communications security, where integrity, non-repudiation, confidentiality, and authentication services plays a vital role. Ciphers are developed to create a secure channel for message communication. The field of cryptography and cryptanalysis is quite demanding and complex as it minimizes the need for time-consuming human interaction with the search process and the network security. However, recurring events such as hackers and intruders attack and the success of criminal attackers illustrate the weaknesses in current security system, information technologies and the need to provide heightened security for these systems. Thus, the application of an efficient and effective tool such as Computational Intelligence (CI) to the field of cryptology comes naturally. CI systems are usually hybrids of paradigms such as Evolutionary Computation systems, Artificial Neural Networks and Fuzzy systems, supplemented with elements of reasoning. Genetic Algorithm is a class of evolutionary computation which is expected to provide optimized and deterministic solution to various common cipher attacks. This paper explores various techniques in cryptography to prove that the natural selection and adaptive mechanism based techniques are as good as the rigorous mathematical techniques used by traditional cryptographic methods.
Presently a day, the measure of exchange of information over huge system is expanding step by step. As there is increment in information exchange, at the same time there are security dangers that are emerging with it. In this paper we are proposing cryptographic frameworks that make utilization of hereditary calculation to safely exchange the information over expansive system. This methodology helps us to give high achievability to exchange information safely. The methods that we are utilizing for encryption & decoding are focused around hereditary calculation which will help us to effectively scramble the information which is resistible for any sort of outer assaults. At that point we will parallelize it utilizing Open Mp dialect which quickens the change of information to attain high security. At that point break down the execution for both code serial and parallel execution. Now after first iteration of crossover and mutation number will be obtained (394, 271, 1018, 1371, 2885, 5652, 13318, 30886, 35215, 39069) Now took a smallest number i.e. 271 and subtract second right digit from ASCII values of each character of message.
5>?LL5 E6>5>4O. =7?V=E>4O D57<4w=FVO 6N 45G?g< >>=EG?L-EF64 6N 6w?4?4544g, 4=44E4Dg, 5D4Fg < 4?Eg >F-<g=5=O; '%&, I. 5>7D4D<G5E>V= >G5D>N. 4 74VV44N >FN 7?G5>>>= wEE>?>F4<E>>= ?44< < =4 6>EF>>N >FN ?44< =4V=E>>= ?56<F5, >F4g?OO MF< 65?<V7VO < 64D>VO =<7<5==>EF< 4DG7N >FN 4DG74, 6OE>>>5, ?D>E?44=>5 ??>E>>7>DV5, >5EF46?5==>5 E> 6EgEN EF>D>=N 6OE>><<<, G4EF> E=g6=O<< 7>-D4<< < 76gEF=>5 ?>4N >5M<<N 4D56=<<N =4764=V5<N D4=4.
Journal of Anthropological Archaeology , 2019
Recent studies of household inequality based on the distribution of floor area indicate that the distribution of wealth varied significantly across time and space in the prehispanic upland US Southwest. In this study, we first examine inequality among households from Orayvi ca. 1901 to contextualize the patterns of inequality we then report among ancestral Pueblo households in the Basketmaker II-Pueblo III periods from the central Mesa Verde region, middle San Juan region, Chaco Canyon, and the Chuska Valley. At Orayvi just prior to the 1906 split, inequality was relatively low, in line with values typical for horticultural societies. Most inequality at Orayvi was among households rather than among clans and phratries, though clans were more wealth-differentiated than were phratries, factions, or other groups we examined. Degree of ancestral Pueblo wealth inequality varied considerably through time, with levels exceeding those calculated for Orayvi primarily during the Pueblo II period. Wealth disparities exceeding those at Orayvi arose in the Chuska Valley and Middle San Juan regions prior to the marked increase we document at Chaco, suggesting that populations from these areas may have been involved in the development of early great house construction at Chaco Canyon.
Technology & Culture, 2024
Ciudad y Territorio, 2023
Climate Change Adaptation from Geotechnical Perspectives, Lecture Notes in Civil Engineering , 2024
Olodum, história e cultura afro-brasileiras em 30 músicas, 2010
H-Soz-Kult, 2021
Pakistan Perspective, 2009
isara solutions, 2024
Health Education Research, 2005
Romance Quarterly, 2019
Nephrology Dialysis Transplantation, 2017
Radiotherapy and Oncology, 2015
Research Square (Research Square), 2019
ANAIS do XLIX Congresso Brasileiro de Educação em Engenharia, 2021
Applied Catalysis A: General, 2012
British Journal of Dermatology, 2022