Bat-Genetic Encryption Technique

Full Text (PDF, 1518KB), PP.1-15

Views: 0 Downloads: 0

Author(s)

Hamdy M. Mousa 1,*

1. Faculty of Computers and Information, Menoufia University, Egypt

* Corresponding author.

DOI: https://doi.org/10.5815/ijisa.2019.11.01

Received: 26 Sep. 2018 / Revised: 22 Apr. 2019 / Accepted: 12 Aug. 2019 / Published: 8 Nov. 2019

Index Terms

Bat Algorithm, Cryptography, and Genetic Algorithm

Abstract

Nowadays, the security of confidential data is the vital issue in the digital world. Information security becomes even more essential in storing and transmitting data while online. For protecting digital data and achieving security and confidentiality over an insecure internet, the iterative Bat-Genetic Encryption Technique (B-GET) is proposed. The main stages of B-GET are pre-processing, encryption process, bat algorithm steps, and genetic processes. B-GET also comprises an arithmetic and logical operators that increase encryption quality. Empirical results show that the reconstructed data is a copy of the original. It also demonstrates that B-GET technique has a large space key and several defensive stages that resist many attacks and it has strong security based on multiple steps, multiple variables, and the main stages of the B-GET technique. Encrypted data is nearly random and does not contain any indication to secret data.

Cite This Paper

Hamdy M. Mousa, "Bat-Genetic Encryption Technique", International Journal of Intelligent Systems and Applications(IJISA), Vol.11, No.11, pp.1-15, 2019. DOI:10.5815/ijisa.2019.11.01

Reference

[1]William Stallings, "Cryptography and Network Security: Principles and Practice", Prentice Hall, 2011.
[2]Jonathan Katz and Yehuda Lindell, “Introduction to Modern Cryptography”, CRC Press, Taylor & Francis Group, 2nd Edition, LLC, 2015.
[3]Mark Rhodes-Ousley, “The Complete Reference Information Security”, The McGraw-Hill Companies, Second Edition, 2013.
[4]Zaidoon Kh. AL-Ani, A. A. Zaidan, B. B. Zaidan and Hamdan.O.Alanazi, "Overview: Main Fundamentals for Steganography", Journal of Computing, Vol. 2, Issue 3, pp. 158-165, March 2010.
[5]Mark Stamp and Richard M. Low, “Applied Cryptanalysis Breaking Ciphers in the Real World”, John Wiley & Sons, Inc., Hoboken, New Jersey, 2007.
[6]Dana S. Leaman, “Cryptographic and Security Testing”, National Voluntary Laboratory, Accreditation Program Standards Coordination Office, NIST HANDBOOK 150-17, 2012 Edition.
[7]B. Schneier, “Applied Cryptography”, John Wiley & Sons, New York, 1994.
[8]Ritu Goyal and Mehak Khurana, "New Design of Tiny-Block Hybridization in AES", International Journal of Computer Network and Information Security (IJCNIS), Vol. 9, No. 9, pp. 46-53, 2017. DOI: 10.5815/ijcnis.2017.09.06
[9]Omar A. Dawood, Abdul Monem S. Rahma and Abdul Mohsen J. Abdul Hossen,"The New Block Cipher Design (Tigris Cipher)", IJCNIS, vol.7, no.12, pp.10-18, 2015. DOI: 10.5815/ijcnis.2015.12.02.
[10]M. Mudia and Pallavi V. Chavan, “Fuzzy Logic Based Image Encryption for Confidential Data Transfer Using (2, 2) Secret Sharing Scheme”, Procedia Computer Science 78, pp. 632 – 639, 2016.
[11]K. Ganesh Kumarand D. Arivazhagan” New Cryptography Algorithm with Fuzzy Logic for Effective Data Communication”, Indian Journal of Science and Technology, Vol. 9(48), pp. 1-6, December 2016
[12]Gamil R.S. Qaid And Sanjay N. Talbar, “Encrypting Image By Using Fuzzy Logic Algorithm”, International Journal of Image Processing and Vision Sciences (IJIPVS), Vol. 2(1), pp. 25-29, 2013.
[13]Naveed Ahmed Azam, ”A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding”, Security and Communication Networks, pp. 1-9 Volume 2017.
[14]Hamdy M. Mousa, “DNA-Genetic Encryption Technique”, I. J. Computer Network and Information Security, No. 7, pp. 1-9, 2016.
[15]Fatma E. Ibrahim, M. I. Moussa and H. M. Abdalkader, “A Symmetric Encryption Algorithm based on DNA Computing”, International Journal of Computer Applications (0975 – 8887) Volume 97– No.16, pp. 41-45, July 2014.
[16]Zhang, Q., Guo, L. and Wei, X., “Image encryption using DNA addition combining with chaotic maps”, Mathematical and Computer Modelling 52, pp. 2028-2035, 2010.
[17]Varuna S, Ramya R, "An Integration of Binary Bat Algorithm and Naïve Bayes Classifier for Intrusion Detection in Distributed Environment", International Journal of Advanced Research in Computer and Communication Engineering, Vol. 6, Issue 2, pp. 164-168, February 2017. DOI 10.17148/IJARCCE.2017.6237
[18]Fridrich, J., “Symmetric ciphers based on two-dimensional chaotic maps”, International Journal of Bifurcation and Chaos 8, pp. 1259–1284, 1998.
[19]Mao Y, Chen G, Lian S., “A novel fast image encryption scheme based on 3D chaotic Baker maps”, International Journal of Bifurcation and Chaos 14, pp. 3613–3624, 2004
[20]Liu H, Zhu Z, Jiang H, Wang B., “A Novel Image Encryption Algorithm Based on Improved 3D Chaotic Cat Map”, The 9th IEEE International Conference for Young Computer Scientists, pp. 3016-3021, 2008
[21]Hamdy M. Mousa, "Chaotic Genetic-fuzzy Encryption Technique", International Journal of Computer Network and Information Security, Vol.10, No.4, pp.10-19, 2018.
[22]X.-S. Yang, “A new metaheuristic bat-inspired algorithm,” in Nature Inspired Cooperative Strategies for Optimization (NICSO2010), J. R. Gonzalez, D. A. Pelta, C. Cruz, G. Terrazas, and N. Krasnogor, Eds., vol. 284 of Studies in Computational Intelligence, pp. 65–74, Springer, Berlin, Germany, 2010.
[23]David A. Coley, “An Introduction To Genetic Algorithms For Scientists And Engineers”, World Scientific Publishing Co. Pte. Ltd, 1999.
[24]G. Wang, M. Lu, and X. Zhao, “An improved bat algorithm with variable neighborhood search for global optimization,” in Proceedings of the IEEE Congress on Evolutionary Computation (CEC ’16), pp.1773–1778, Vancouver, Canada, 2016.
[25]S. Yilmaz and E. U. K¨ uc¸¨ uksille, “A new modification approach on bat algorithm for solving optimization problems,” Applied Soft Computing, vol.28, pp. 259–275, 2015.
[26]Amir H. Gandomi and Xin-She Yang, “Chaotic bat algorithm”, Journal of Computational Science, Vol., 5, pp. 224–232, 2014.
[27]Komarasamy, G., and Wahi, A., “An optimized K-means clustering technique using bat algorithm”, European J. Scientific Research, Vol. 84, No. 2, pp.263-273, 2012.
[28]Kapil Sharma, Sanchi Girotra, "Parallel Bat Algorithm Using MapReduce Model", International Journal of Information Technology and Computer Science, Vol. 9, No. 11, pp. 72-78, 2017.
[29]Xingwang Huang, Xuewen Zeng and Rui Han, “Dynamic Inertia Weight Binary Bat Algorithm with Neighborhood Search”, Hindawi, Computational Intelligence and Neuroscience, Volume 2017, Article ID 3235720, 15 pages, 2017. https://doi.org/10.1155/2017/3235720.
[30]X. S. Yang, M. Karamanoglu, and S. Fong, "Bat algorithm for topology optimization in microelectronic applications", presented at the IEEE International Conference on Future Generation Communication Technology (FGCT2012) London, 2012.
[31]Yang, X.-S., and He, X., (2013) ‘Bat Algorithm: Literature review and applications’, Int. J. Bio-Inspired Computation, Vol. 5, No. 3, pp.141–149, 2013.
[32]V. Lakshmi Devi, P. Bharath Kumar and P. Sujatha, “A Hybrid BAT-GA Optimisation of Security Constrained Unit Commitment Problem for 10-unit System”, International Science Press, International Journal of Control Theory and Application, Vol. 10(5), pp. 823-830, 2017.
[33]David A. Coley, “An Introduction to Genetic Algorithms For Scientists and Engineers”, World Scientific Publishing Co. Pte. Ltd, 1999.
[34]Moore, D.S., “The basic practice of statistics”, W. H. Freeman and Company, New York, 2009.
[35]Robert M. Gray, Entropy and information theory, Springer-Verlag New York, Inc., New York, NY, 1990.
[36]Yue Wu, Joseph P. Noonan and Sos Agaian, “NPCR and UACI Randomness Tests for Image Encryption“, Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), April Edition, 2011.
[37]Himan Khanzadi, Mohammad Eshghi and Shahram Etemadi Borujeni, ”Image Encryption Using Random Bit Sequence Based on Chaotic Maps”, Arabian Journal for Science and Engineering, Vol. 39, Issue 2, pp, 1039–1047, Feb. 2014. DOI 10.1007/s13369-013-0713-z
[38]Shrija Somaraj and Mohammed Ali Hussain, “Performance and Security Analysis for Image Encryption using Key Image”,Indian Journal of Science and Technology, Vol. 8 (35), Dec., 2015. DOI: 10.17485/ijst/2015/v8i35/73141.
[39]Narendra K Pareek, “Design and Analysis of a Novel Digital Image Encryption Scheme”, International Journal of Network Security & Its Applications (IJNSA), Vol.4, No.2, pp.95-108, March 2012. DOI: 10.5121/ijnsa.2012.4207