Propose a new approach for key generation based on Chicken Swarm Optimization and HTML Parser

Authors

  • Suhad Malalla Department of Computer Science, University of Technology.
  • Ayat Hadi Ali Department of Computer Science, University of Technology.

DOI:

https://doi.org/10.23851/mjs.v31i3.728

Keywords:

cryptography, key generation, parser, chicken swarm optimization, HTML code, Symmetric Key

Abstract

The random key plays a basic role in the design of any cryptographic algorithms. In this paper, a proposed model for generating a random key is presented, which will be used for security purposes. Chicken swarm optimization (CSO) and HTML parser are used for scattering the bits of the key. The statistical tests of randomness have given good and acceptable security results. The proposed key generation method was programmed by JavaScript language.

Downloads

Download data is not yet available.

References

Hala B. , Suhad M. , and Ekhlas K., "Generate Cryptographic key using generated 3D- Digital Image", Eng. & Tech. Journal ,Vol.27, No.2, 2009.

Israa T. and Shatha H., "Proposal New Approach for Blowfish Algorithm by Using Random Key Generator", Journal Of Madent Alelem College, Vol 4 No 1 Year 2012.

Alia K., " Proposed Approach for Key Generation Based on the RNA ", Journal of the Faculty of Basic Education, 2015.

Jonathan B., "Java Cryptography", Book, First Edition May 1998.

Ayushi, "A Symmetric Key Cryptographic Algorithm", International Journal of Computer Applications (0975 - 8887) Volume 1 - No. 15, 2010.

CrossRef

"Tutorial point", 2014 by Tutorials Point (I) Pvt. Ltd.

Konstantinos E. and Michael N., "Particle Swarm Optimization and Intelligence Advances and Applications", 2010.

Xianbing M., Yu L., Xiaozhi G., and Hengzhen Z., " A New Bio-inspired Algorithm: Chicken Swarm Optimization " International Conference, ICSI 2014, Hefei, China, October 17-20, pp. 86-94.

CrossRef

Hala B. , Suhad M. , and Estabraq A., "Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic AlgorithmsEng. & Tech. Journal, Vol.32, Part (B), No.2, 2014.

Huda A. Zaki," Cryptographic key Generation Using Fingerprint Biometrics", J.Thi-Qar Sci. Vol.5 (2) May/2015.

Zhang, J., Duong, T. Q., Marshall, A., & Woods, R., " Key Generation from Wireless Channels: A Review", IEEE Access, 4, 614-626.,2016.

CrossRef

Wirawan and Suwadi , "A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization", Journal Entropy , Published: 18 February 2019.

Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, SanVo, " A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications", National Institute of Standards and Technology Special Publication 800-22 Revision 1a, Revised:April2010

Ioana R., "Statistical Assessment Of Binary Sequences Generated By Cryptographic Algorithms", Social Economic Debates Volume 5, Issue 2, ISSN 2360-1973; ISSN-L 2248-3837, PP.23-31, 2016.

Downloads

Key Dates

Published

20-08-2020

Issue

Section

Original Article

How to Cite

[1]
S. Malalla and A. H. Ali, “Propose a new approach for key generation based on Chicken Swarm Optimization and HTML Parser”, Al-Mustansiriyah J. Sci., vol. 31, no. 3, pp. 89–94, Aug. 2020, doi: 10.23851/mjs.v31i3.728.

Similar Articles

1-10 of 41

You may also start an advanced similarity search for this article.