Application of the Tabu Search Algorithm to Cryptography
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2017, Vol 8, Issue 7
Abstract
Tabu search is a powerful algorithm that has been applied with great success to many difficult combinatorial problems. In this paper, we have designed and implemented a symmetrical encryption algorithm whose internal structure is mainly based on Tabu search algorithm. This heuristic performs multiple searches among different solutions and stores the best solutions in an adaptive memory. First of all, we coded the encryption problem by simulating a scheduling problem. Next, we have used an appropriate coding for our problem. Then we used the suitable evaluation function. Through the symmetric key generated by our algorithm, we have illustrated the principle of encryption and decryption. The experimentations of our approach are given at the end of this paper, from which we examined our new system strengths and the elements that could be improved.
Authors and Affiliations
Zakaria KADDOURI, Fouzia OMARY
Comparative Analysis between a Photovoltaic System with Two-Axis Solar Tracker and One with a Fixed Base
In this article, the comparative analysis of the stored energies between a photovoltaic system with a two-axis solar tracker, controlled by Arduino with respect to the energy stored by a fixed-base photovoltaic system is...
Initialization Method for Communication and Data Sharing in P2P Environment Between Wireless Sensor Nodes
Wireless Sensor Networks have increased notewor-thy thought nowadays, rather than wired sensor systems, by presenting multi-useful remote hubs, which are littler in size. However, WSNs correspondence is inclined to negat...
A Survey on Location Privacy-Preserving Mechanisms in Mobile Crowdsourcing
Mobile Crowdsourcing (MCS) surfaced as a new affluent method for data collection and processing as a result of the boom of sensor-rich mobile devices popularity. MCS still has room for improvement, particularly in protec...
Improved Echo cancellation in VOIP
VoIP (voice over internet protocol) is very popular communication technology of this century and has played tremendous role in communication system. It is preferred by all because it deploys many benefits it uses Interne...
Analytical and Comparative Study of Different Types of Two-Leg Chopping Up Regulator
The main focus of this article is to analyze and simulate the two-leg parallel connection of a chopping up regulator with flattering inductive smoothers or with an interphasing centre-tap transformer supplied by a three-...