About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Bio-inspired Information and Communication Technologies. 12th EAI International Conference, BICT 2020, Shanghai, China, July 7-8, 2020, Proceedings

Research Article

A Novel Genetic Algorithm-Based DES Key Generation Scheme

Download(Requires a free EAI acccount)
3 downloads
Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-030-57115-3_17,
        author={Min-Yan Tsai and Hsin-Hung Cho and Chi-Yuan Chen and Wei-Min Chen},
        title={A Novel Genetic Algorithm-Based DES Key Generation Scheme},
        proceedings={Bio-inspired Information and Communication Technologies. 12th EAI International Conference, BICT 2020, Shanghai, China, July 7-8, 2020, Proceedings},
        proceedings_a={BICT},
        year={2020},
        month={8},
        keywords={Information security Encryption Symmetric keys Genetic algorithms},
        doi={10.1007/978-3-030-57115-3_17}
    }
    
  • Min-Yan Tsai
    Hsin-Hung Cho
    Chi-Yuan Chen
    Wei-Min Chen
    Year: 2020
    A Novel Genetic Algorithm-Based DES Key Generation Scheme
    BICT
    Springer
    DOI: 10.1007/978-3-030-57115-3_17
Min-Yan Tsai1, Hsin-Hung Cho1,*, Chi-Yuan Chen1, Wei-Min Chen2
  • 1: Department of Computer Science and Information Engineering
  • 2: Department of Information Management, School of Management
*Contact email: awp.boom@gmail.com

Abstract

The data encryption is closely related to our daily lives, especially after the concept of e-commerce has become popular. The main reason is that although various network service platforms facilitate our lives, they also bring many potential problems such that there are many ways that people with bad intentions can tamper or steal data via Internet and further decrypt it. In order to maintain user privacy, encryption methods are adopted to prevent stealers from easily reading data. Data encryption standard (DES) is currently the most widely used encryption method in commercial financial units. However, since DES has a short password length and the generated key is quite linear, weak keys may be generated so that the security is still insufficient. In this paper, a genetic algorithm (GA) method is used to generate high-variability keys to solve the problem of a high probability that DES generates weak keys.

Keywords
Information security Encryption Symmetric keys Genetic algorithms
Published
2020-08-11
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-030-57115-3_17
Copyright © 2020–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL