Propose a new approach for key generation based on Chicken Swarm Optimization and HTML Parser
Keywords:cryptography, key generation, parser, chicken swarm optimization, HTML code, Symmetric Key
Hala B. , Suhad M. , and Ekhlas K., "Generate Cryptographic key using generated 3D- Digital Image", Eng. & Tech. Journal ,Vol.27, No.2, 2009.
Israa T. and Shatha H., "Proposal New Approach for Blowfish Algorithm by Using Random Key Generator", Journal Of Madent Alelem College, Vol 4 No 1 Year 2012.
Alia K., " Proposed Approach for Key Generation Based on the RNA ", Journal of the Faculty of Basic Education, 2015.
Jonathan B., "Java Cryptography", Book, First Edition May 1998.
Ayushi, "A Symmetric Key Cryptographic Algorithm", International Journal of Computer Applications (0975 - 8887) Volume 1 - No. 15, 2010.
"Tutorial point", 2014 by Tutorials Point (I) Pvt. Ltd.
Konstantinos E. and Michael N., "Particle Swarm Optimization and Intelligence Advances and Applications", 2010.
Xianbing M., Yu L., Xiaozhi G., and Hengzhen Z., " A New Bio-inspired Algorithm: Chicken Swarm Optimization " International Conference, ICSI 2014, Hefei, China, October 17-20, pp. 86-94.
Hala B. , Suhad M. , and Estabraq A., "Proposed Approach for Key Generation Based on Elliptic Curve (EC) Algebra and Metaheuristic AlgorithmsEng. & Tech. Journal, Vol.32, Part (B), No.2, 2014.
Huda A. Zaki," Cryptographic key Generation Using Fingerprint Biometrics", J.Thi-Qar Sci. Vol.5 (2) May/2015.
Zhang, J., Duong, T. Q., Marshall, A., & Woods, R., " Key Generation from Wireless Channels: A Review", IEEE Access, 4, 614-626.,2016.
Wirawan and Suwadi , "A Simple Secret Key Generation by Using a Combination of Pre-Processing Method with a Multilevel Quantization", Journal Entropy , Published: 18 February 2019.
Andrew Rukhin, Juan Soto, James Nechvatal, Miles Smid, Elaine Barker, Stefan Leigh, Mark Levenson, Mark Vangel, David Banks, Alan Heckert, James Dray, SanVo, " A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications", National Institute of Standards and Technology Special Publication 800-22 Revision 1a, Revised:April2010
Ioana R., "Statistical Assessment Of Binary Sequences Generated By Cryptographic Algorithms", Social Economic Debates Volume 5, Issue 2, ISSN 2360-1973; ISSN-L 2248-3837, PP.23-31, 2016.
How to Cite
Articles accepted for publication in Al-Mustansiriyah Journal of Science (MJS) are protected under the Creative Commons Attribution 4.0 International License (CC-BY-NC). Authors of accepted articles are requested to sign a copyright release form prior to their article being published. All authors must agree to the submission, sign copyright release forms, and agree to be included in any correspondence between MJS and the authors before submitting a work to MJS. For personal or educational use, permission is given without charge to print or create digital copies of all or portions of a MJS article. However, copies must not be produced or distributed for monetary gain. It is necessary to respect the copyright of any parts of this work that are not owned by MJS.