Popis: |
There are many different approaches that can be taken in order to generate automatically secret keys, however, for high security applications, end users may require control over the key generation process rather than leaving the process to third parties. In this paper, both the decryption and the encryption keys are obtained using the evolutionary computing tool Eureqa to model pseudo-random input data. The secret keys found using this technique when applied to encryption and decryption data files are validated using a range of tests, encryption and encryption time, throughput, entropy analyses and key sensitivity. The results obtained from the experiments show that the proposed encryption and decryption approaches are both reliable and secure when applied to text files and have the potential to be applied in high-security text communication applications. |