Please use this identifier to cite or link to this item:
https://repository.sustech.edu/handle/123456789/7405
Title: | DES SECURITY ENHANCEMENT USING GENETIC ALGORITHM |
Other Titles: | باستخدام القياسية التشفير خوارزمية أمن تحسين الجينية الخوارزمية |
Authors: | MOHAMMED, AYMEN ELSADIG Supervisor - FaisalMohammed Abdalla Ali |
Keywords: | Akhawarzma System Alchwiar system Khurzmat genetic |
Issue Date: | 1-May-2004 |
Publisher: | Sudan University of Science & Technology |
Citation: | MOHAMMED, AYMEN ELSADIG . DES SECURITY ENHANCEMENT USING GENETIC ALGORITHM /AYMEN ELSADIG MOHAMMED ; Faisal Mohammed Abdalla Ali .- khartoum : Sudan University of Science & Technology , College of Computer Science and Information Technology ,2004 .- 70 p . : ill . ; 28 cm .- M .Sc |
Abstract: | In symmetric cryptosystems a primary key is used to create a number of subkeys according to specified key scheduling algorithm; certain initial keys are weak keys. The initial value is split into two halves, and each half is shifted independently. If all the bits in each half are either 0 or 1, then the key used for any cycle of the algorithm is the same for all the cycles of the algorithm This can occur if the key is entirely 1s, entirely 0s, or if one half of the key is entirely 1s and the other half is entirely 0s.for this reason the design of a good key schedule is a crucial aspect of cipher design. In This research presents new algorithms that simplify the creation and expansion process of the encryption key of the DES algorithm, which is considered one of the most important elements in the process of encryption, by creating new key generator architectures that allows us to generate pseudorandom 16 different keys to be used in cryptographic, algorithm suitable for hardware or software implementations.These changes, based on genetic algorithm, Simulation study shows that the proposed technique gives a totally different group of pseudorandom subkeys each time we run the generator. Furthermore; comparison analyses between the proposed subkey generation process and the standard technique used in DES. The proposed method is then been evaluated and subjected to many randomness tests in order to measures it is strength. A file has been encrypted using proposed method and the standard technique used in DES, then the randomness of each one is been subjected to test using Statistical Test Suite (STS). The result show that the proposed method gives good result and can be used in future in many cipher for keys generation. |
Description: | Thesis |
URI: | http://repository.sustech.edu/handle/123456789/7405 |
Appears in Collections: | Masters Dissertations : Computer Science and Information Technology |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
ABSTRACT.pdf | ABSTRACT | 559.84 kB | Adobe PDF | View/Open |
CHAPTER ONE INTRODUCTION.pdf Restricted Access | CHAPTER | 1.72 MB | Adobe PDF | View/Open Request a copy |
DES SECURITY ENHANCEMENT....pdf | Title | 408.17 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.