A Cryptographic Scheme Based on Chaos Synchronization and Genetic Engineering Algorithm

Chapter
Part of the Understanding Complex Systems book series (UCS)

Abstract

The chapter introduces a robust method of digital cryptography based on Genetic Algorithm (GA) and synchronization of two identical systems driven by Gaussian white noise. GA explores the search space using the probabilistic operators that emulates the biological evolution process to solve complex combinatorial problems. But their randomness property self-imposes a problem in specific goal oriented applications where satisfactory solution is the yardstick of successful application. For the purpose of successful encoding and recovery of a message, we have proposed a genetic engineering scheme based on GA. The basic selection mechanism of GA is modified to control such random behavior with the help of a special learning mechanism. Otherwise, it may lead to a solution which is uncorrelated with the original message and may also lead to the loss of information.The parameters and the keys are secure because the synchronized dynamical system does not necessitate the transmission of keys over the communication channel.This property further makes the proposed method computationally cheap and resistant to the traditional man in the middle attack. The above stated aim is illustrated with simple examples using the two most popular recombination scheme-one point and two-point crossover. The precise recovery of the ciphertext, without complex modeling of the system, proves that the proposed genetic engineering algorithm for cryptography is effective,reliable and computationally cheaper than cryptography designed with (μ ∕ ρ, λ) -ES selection mechanism.

Keywords

Genetic Algorithm Chaotic System Cipher Text Evolution Strategy Hybrid Version 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Notes

Acknowledgements

The author is thankful to S.Mukhopadhyay, University of Calgary, for some useful discussions.

References

  1. 1.
    Holland, J.H.: Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence. University of Michigan Press, Ann Arbor (1975)Google Scholar
  2. 2.
    Goldberg, D.E.: Commun. ACM 37, 13 (1994)CrossRefGoogle Scholar
  3. 3.
    Srinivas, M., Patnaik, L.M.: IEEE Comput. 17–26 (1994)Google Scholar
  4. 4.
    Fogel, L.J., Owens, A.J., Walsh, M.J.: Artificial Intelligence Through Simulated Evolution. Wiley, New York (1966)MATHGoogle Scholar
  5. 5.
    Beyer, H.-G.: Evolution. Comput. 3, 81 (1995)CrossRefGoogle Scholar
  6. 6.
    Beyer, H.-G.: Natural Computing Series. Springer, Berlin (2001)Google Scholar
  7. 7.
    Beyer, H.-G., Schwefel, H.P.: Nat. Comput. 1, 3 (2002)MathSciNetMATHCrossRefGoogle Scholar
  8. 8.
    Hansen, N., Müller, S.D., Koumoutsakos, P.: Evol. Comput. 11, 1 (2003)Google Scholar
  9. 9.
    Hansen, N., Ostermeier, A.: Evol. Comput. 9, 159 (2001)CrossRefGoogle Scholar
  10. 10.
    Schwefel, H.P.: Evolution and Optimum Seeking. Wiley, New York (1995)Google Scholar
  11. 11.
    Mukhopadhyay, S., Mitra, M., Banerjee, S.: Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption, IGI Global, USA, pp. 476–509 (2010)Google Scholar
  12. 12.
    Al-Husainy, M.A.F.: Inform. Technol. J. 5, 516 (2006)CrossRefGoogle Scholar
  13. 13.
    Caponetto, R., Fortuna, L., Fazzino, S., Xibilia, M.G.: Evol. Comput. 7, 289 (2003)CrossRefGoogle Scholar
  14. 14.
    Banerjee, S., Rondoni, L., Mukhopadhyay, S., Misra, A.P.: Opt. Commun. 284(9), 2278 (2011)CrossRefGoogle Scholar
  15. 15.
    Banerjee, S., Rondoni, L., Mukhopadhyay, S.: Opt. Commun. 284, 4623 (2011)CrossRefGoogle Scholar
  16. 16.
    Mukhopadhyay, S., Banerjee, S.: Exp. Syst. Appl. 39, 917 (2012)CrossRefGoogle Scholar
  17. 17.
    Guo, S.M., Liu, K.T., Tsai, J.S.H., Shieh, L.S.: Comput. Math. Appl. 55, 1225 (2008)MathSciNetMATHCrossRefGoogle Scholar
  18. 18.
    Wu, M.S., Lin, Y.L.: Genetic algorithm with a hybrid select mechanism for fractal image compression. Digit. Signal Process. 20, 1150 (2010)CrossRefGoogle Scholar
  19. 19.
    Yiqiang, G., Yanbin, W., Zhengshana, J., Jun, W., Luyane, Z.: Remote sensing image classification by the Chaos Genetic Algorithm in monitoring land use changes. Math. Comput. Model. 51, 1408 (2010)MATHCrossRefGoogle Scholar
  20. 20.
    Klein, E., Mislovaty, R., Kanter, I., Kinzel, W.: Public-channel cryptography using chaos synchronization. Phys. Rev. E 016214(1–4) (2005)Google Scholar
  21. 21.
    Banerjee, S., Saha, P., RoyChowdhury, A.: Phys. Scripta 63, 177 (2001)MATHCrossRefGoogle Scholar
  22. 22.
    Mukherjee, P., Banerjee, S.: Phys. Scripta 82, 055010 (2010)CrossRefGoogle Scholar
  23. 23.
    Lin, W., He, Y.B.: Chaos 15, 023705 (2005)MathSciNetCrossRefGoogle Scholar
  24. 24.
    Lin, W.: Guanrong Chen Chaos 16, 013134 (2006)CrossRefGoogle Scholar
  25. 25.
    Banerjee, S.: Chaos Soliton Fractals 42, 745 (2009)CrossRefGoogle Scholar
  26. 26.
    Banerjee, S., Ghosh, D., Ray, A., Roy Chowdhury, A.: Europhys. Lett. 81, 20006 (2008)Google Scholar
  27. 27.
    Ghosh, D., Banerjee, S., Roy Chowdhury, A.: Europhys. Lett. 80, 30006 (2007)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2012

Authors and Affiliations

  1. 1.Cryptography Research Laboratory, Institute for Mathematical SciencesUniversity Putra MalaysiaSerdangMalaysia
  2. 2.Department of Complexity and Network DynamicsInternational Science AssociationAnkaraTurkey

Personalised recommendations