Data cryptography in the Internet of Things using the artificial bee colony algorithm in a smart irrigation system

SK Mousavi, A Ghaffari - Journal of Information Security and Applications, 2021 - Elsevier
Abstract The Internet of Things (IoT) includes various technologies, including sensing
devices, Radio-Frequency Identification (RFID), and Microelectromechanical Systems …

Secured and compound 3-D chaos image encryption using hybrid mutation and crossover operator

R Premkumar, S Anand - Multimedia Tools and Applications, 2019 - Springer
History, for us, today is data. Events and emotions of the worn centuries have been recorded
as data-extremely vulnerable data, which can be easily tampered with. With this being said …

Breaking data encryption standard with a reduced number of rounds using metaheuristics differential cryptanalysis

K Dworak, U Boryczka - Entropy, 2021 - mdpi.com
This article presents the author's own metaheuristic cryptanalytic attack based on the use of
differential cryptanalysis (DC) methods and memetic algorithms (MA) that improve the local …

Tabu Search in revealing the internal state of RC4+ cipher

I Polak, M Boryczka - Applied Soft Computing, 2019 - Elsevier
Privacy and confidentiality can be secured by using cryptography. Thus, one needs to be
sure that the ciphers being employed are secure and resistant to cryptanalysis. In the paper …

Red deer algorithm to detect the secret key of the monoalphabetic cryptosystem

A Jain, S Bansal, NN Das, SS Gupta - Soft Computing, 2024 - Springer
Encryption of a plaintext involves a secret key. The secret key of classical cryptosystems can
be successfully determined by utilizing metaheuristic techniques. Monoalphabetic …

Genetic algorithm as optimization tool for differential cryptanalysis of DES6

K Dworak, U Boryczka - … 9th International Conference, ICCCI 2017, Nicosia …, 2017 - Springer
This article presents a new differential attack on the Data Encryption Standard (DES)
reduced to 6 rounds, with the usage of the genetic algorithm (GA). The objective of the …

[PDF][PDF] Ensuring Information Security in Smart Door Lock Systems Using the Cuckoo Search Algorithm.

AKS Sabonchi, ZH Obaid - Journal of Cybersecurity (2579-0072 …, 2022 - cdn.techscience.cn
The widespread use of Internet of Things (IoT) devices, such as smart appliances, phones,
and watches, has brought about concerns regarding security and privacy. With the …

[PDF][PDF] An Improved Analysis of Secured Permutation and Substitution based Image Encryption.

V Goel, AK Goyal - Journal of Cybersecurity & Information …, 2023 - researchgate.net
The transmission and storage of digital data raises serious security concerns as information
technology evolves at a breakneck pace. To ensure the safety of the transferred data …

[PDF][PDF] An Investigation into the Usage of Bounding Boxes in Discriminating Image Encryption Algorithms

G Khambra, V Panse, S Jackson - SPAST Reports, 2024 - scitepress.org
When it comes to protecting people's privacy and maintaining secrecy, encrypting
photographs is the safest and most effective method. However, the computational expense …

[HTML][HTML] ОГЛЯД ЗАСТОСУВАННЯ МЕТАЕВРИСТИЧНОГО ПІДХОДУ В КРИПТОАНАЛІЗІ

ОО Кубайчук - Вестник Херсонского национального …, 2023 - cyberleninka.ru
Криптографічний захист інформації є важливою складовою інформаційної безпеки.
Розробка нових методів криптоаналізу допомагає зрозуміти межі стійкості наявних …