Salp Swarm Algorithm to solve Cryptographic Key Generation problem for Cloud computing
Journal Title: International Journal of Experimental Research and Review - Year 2023, Vol 31, Issue 2
Abstract
Cryptographic keys are long strings of random bits generated using specialized algorithms and help secure data by making it unpredictable to any adversary. Cryptographic keys are used in various cryptographic algorithms in many domains, i.e., Cloud computing, Internet-of-Things (IoT), Fog computing, and others. The key generation algorithms are essential in cryptographic data encryption and decryption algorithms. This work proposed a cryptographic key generation algorithm based on Shannon entropy and the Salp Swarm algorithm (SSA) for generating randomized keys. The proposed Cryptographic Key Generation algorithm utilizes the dynamic movement of salps to create high-quality, robust, and randomized keys against attacks. The transfer function and quantization method convert a salp into a cryptographic key. The proposed Cryptographic Key Generation algorithm has been evaluated on four transfer functions against three state-of-the-art swarm intelligence metaheuristics, i.e., particle swarm optimization, BAT, and grey wolf optimization algorithms. The keys of eight different bit lengths, i.e., 512, 256, 192, 128, 96, 80, 64, were generated and evaluated due to their applications in the different encryption algorithms, i.e., AES, DES, PRESENT, SIMON, SPECK, and 3DES. The simulation study confirms that the proposed key generation algorithm effectively produces secure cryptographic keys.
Authors and Affiliations
Waseem Kaleem, Mohammad Sajid, Ranjit Rajak
Tourism caused jeopardize of biodiversity: a case study on Mandermoni –Dadanpatrabarh coastal tourist destination in Purba Medinipur district, West Bengal, India
The present study is conducted to correlate among tourism and biodiversity, environment , physical and socio-cultural landscape. Tourism is now a major contributor to foreign exchange, money earnings and provides employm...
Providing Highest Privacy Preservation Scenario for Achieving Privacy in Confidential Data
Machine learning algorithms have been extensively employed in multiple domains, presenting an opportunity to enable privacy. However, their effectiveness is dependent on enormous data volumes and high computational resou...
Process Parameter Effects on Powder Mixed EDM Machining Characteristics Using Biocompatible Ti-6Al-4V Alloy
This study examines how various process parameters affect the machining properties of a bio-compatible Ti-6Al-4V alloy using PMEDM with silicon carbide (SiC) powder. The parameters investigated include peak current, puls...
Effectiveness of an Information Booklet on the Awareness of Antimicrobial Resistance (AMR) among Health Care Professionals in a Selected Primary Care Hospital
The study aimed to assess the level of knowledge on Antibiotics and its resistance among healthcare professionals and the effectiveness of an information booklet, which includes the Centers for Disease Control and Preven...
A Novel Computer-Aided Approach for Predicting COVID-19 Severity Using Hyperparameters in ResNet50v2 from X-ray Images
This research has been globally impacted by COVID-19 virus, which was a very uncommon, highly contagious & dangerous respiratory illness demanding early detection for effective containment and further spread. In this res...