Cryptography algorithm based on cohort intelligence

Dipti Kapoor Sarmah*, Ishaan R. Kale

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

3 Citations (Scopus)

Abstract

Information security is very important in the current era as we share most of the information through digital media/Internet. Cryptography is a technique which converts the secret information into some other form which is referred to as ciphertext. In order to have a strong ciphertext, one should have a strong cryptography algorithm as well as the secured key. The performance of any cryptography algorithm can be measured through the secret text input file size (number of bytes), performance time to encrypt input file and how fast it can be retrieved the secret text through cryptanalysis attack. In this paper, a socio-inspired optimization algorithm referred as cohort intelligence (CI) is applied to the secret text to retrieve the optimized ciphertext. The efficiency of the algorithm is also analyzed in this paper with respect to the secret text capacity and time.

Original languageEnglish
Title of host publicationProceedings of the 2nd International Conference on Data Engineering and Communication Technology - ICDECT 2017
EditorsAli Husseinzadeh Kashan, Tai Kang, Anand J. Kulkarni, Suresh Chandra Satapathy
Place of PublicationSingapore
PublisherSpringer
Pages431-439
Number of pages9
ISBN (Electronic)978-981-13-1610-4
ISBN (Print)978-981-13-1609-8
DOIs
Publication statusPublished - 4 Oct 2018
Externally publishedYes
Event2nd International Conference on Data Engineering and Communication Technology, ICDECT 2017 - Pune, India
Duration: 15 Dec 201716 Dec 2017
Conference number: 2

Publication series

NameAdvances in Intelligent Systems and Computing
PublisherSpringer
Volume828
ISSN (Print)2194-5357
ISSN (Electronic)2194-5365

Conference

Conference2nd International Conference on Data Engineering and Communication Technology, ICDECT 2017
Abbreviated titleICDECT 2017
Country/TerritoryIndia
CityPune
Period15/12/1716/12/17

Keywords

  • n/a OA procedure
  • Cryptography
  • Estimated time
  • Secret text capacity
  • Cohort intelligence

Fingerprint

Dive into the research topics of 'Cryptography algorithm based on cohort intelligence'. Together they form a unique fingerprint.

Cite this