2006
DOI: 10.1007/11751649_38
|View full text |Cite
|
Sign up to set email alerts
|

A New Ciphering Method Associated with Evolutionary Algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
9
0

Year Published

2006
2006
2020
2020

Publication Types

Select...
4
2

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 2 publications
0
9
0
Order By: Relevance
“…According to the results of the occurrence frequencies of the characters obtained, we have shown that this method blocks the way against all the attacks which are based on the study of the occurrence frequencies of characters in a cipher text. We can also increase the security of our system by combining it with another encryption method such as [18]- [22].…”
Section: Discussionmentioning
confidence: 99%
“…According to the results of the occurrence frequencies of the characters obtained, we have shown that this method blocks the way against all the attacks which are based on the study of the occurrence frequencies of characters in a cipher text. We can also increase the security of our system by combining it with another encryption method such as [18]- [22].…”
Section: Discussionmentioning
confidence: 99%
“…Later, genetic and evolutionist algorithms were used in the design of cryptographic algorithms to reach better security like in [7][8][9][10][11]. In [3], [12], [13], and [14], Omary proposed an evolutionist-based encryption scheme and extended versions that aim to substitute the plaintext's characters to change their occurrence frequency. Later, in [15], Trichni proposed an improved version that comprises a new mutation operator based on the partition problem to provide resistance to frequency analysis and brute force attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Later, in [15], Trichni proposed an improved version that comprises a new mutation operator based on the partition problem to provide resistance to frequency analysis and brute force attacks. Afterward, in [16], Bougrine proposed a new encryption scheme inspired by SEC [3] based on the same problem to achieve the same objectives, moreover, in [17] and [18] Kaddouri proposed a revised version of SEC [3]. These works produce a variation of the appearance frequency.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This system is based on techniques of the evolutionary algorithm [2], [3], [4]. This article was followed by another article, where we introduced a new system based on SEC [5], called "fusion" which is safer.…”
Section: Introductionmentioning
confidence: 99%