Back to Search Start Over

Survey Paper Key Generation Using Ant Colony Optimization Technique

Authors :
Inderpreet Kaur
Sukriti Srivastava
Prakhar Chandra
Paridhi Baliyan
Source :
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN).
Publication Year :
2020
Publisher :
IEEE, 2020.

Abstract

Cryptography is the methodology in which the information is cast into a form that forestalls the abuse of it. In this advanced time of the wireless, it is imperative to guarantee the safe conveyance of the pertinent information which are otherwise exposed to disgusting goals. The procedure of transformation of plaintext to encode text is known as encryption and its converse is known as decryption. The three kinds of cryptography methods, viz., Asymmetric key, Symmetric-key, and Hash Functions. A huge segment of this contemporary method is the key; which is a specific component of extreme significance, as this is what is utilized while scrambling or descrambling the desired information. In this paper, we have compared the two techniques. Incipiently, Particle Swarm Optimization, a strategy of delivering keys to design a stream figure for text encryption. The tale methodology named Particle Swarm Optimization Key Generation Algorithm (PKGA) uses a character code table for encoding the keys. The essential ideal situation of this procedure is that it diminishes the quantity of keys to be fused and coursed. On the other hand is Ant Colony Optimization Techniques to produce keys for the encryption of the information. This entire philosophy depends on the conduct of the ants in their characteristic inquiry of food. The drawback of using Ant Colony Optimization is to downscale the number of keys to be utilized during encipherment when contrasted with different strategies of cryptography in presence. ACO would warrant the generation of such keys with utmost proficiency.

Details

Database :
OpenAIRE
Journal :
2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)
Accession number :
edsair.doi...........df2b9f92c0019aac58e37ba4897595c7