About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 8th EAI International Conference, FABULOUS 2024, Zagreb, Croatia, May 9–10, 2024, Proceedings

Research Article

New Approach to Crossover of Encryption Algorithms

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-72393-3_2,
        author={Peter Pekarčik and Eva Chovancov\^{a} and Martin Chovanec and Tatiana Kuchč\^{a}kov\^{a}},
        title={New Approach to Crossover of Encryption Algorithms},
        proceedings={Future Access Enablers for Ubiquitous and Intelligent Infrastructures. 8th EAI International Conference, FABULOUS 2024, Zagreb, Croatia, May 9--10, 2024, Proceedings},
        proceedings_a={FABULOUS},
        year={2024},
        month={10},
        keywords={crossover encryption evaluation fitness score genetics algorithms},
        doi={10.1007/978-3-031-72393-3_2}
    }
    
  • Peter Pekarčik
    Eva Chovancová
    Martin Chovanec
    Tatiana Kuchčáková
    Year: 2024
    New Approach to Crossover of Encryption Algorithms
    FABULOUS
    Springer
    DOI: 10.1007/978-3-031-72393-3_2
Peter Pekarčik1, Eva Chovancová1,*, Martin Chovanec1, Tatiana Kuchčáková1
  • 1: Technical University of Kosice
*Contact email: eva.chovancova@tuke.sk

Abstract

Our work presents a novel approach to creating new encryption algorithms. We were inspired by genetic algorithms based on the Darwin evolution theory. As the method of invention, we chose the crossover technique. We aim to create unique encryption algorithms that will be more secure, faster, and require less memory space or computational energy. New encryption algorithms are based on the most commonly used encryption techniques. During the crossover process, we consider the most critical metrics for encryption algorithms. We also briefly described the crossover and mutation process. The developed method is in the state of design. The design presented in this article is in the form of a flowchart diagram and detailed decryption. We plan to implement it and test it.

Keywords
crossover encryption evaluation fitness score genetics algorithms
Published
2024-10-16
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-72393-3_2
Copyright © 2024–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL