17,175 research outputs found

    Optimization of SM4 Encryption Algorithm for Power Metering Data Transmission

    Get PDF
    This study focuses on enhancing the security of the SM4 encryption algorithm for power metering data transmission by employing hybrid algorithms to optimize its substitution box (S-box). A multi-objective fitness function is constructed to evaluate the S-box structure, aiming to identify design solutions that satisfy differential probability, linear probability, and non-linearity balance. To achieve global optimization and local search for the S-box, a hybrid algorithm model that combines genetic algorithm and simulated annealing is introduced. This approach yields significant improvements in optimization effects and increased non-linearity. Experimental results demonstrate that the optimized S-box significantly reduces differential probability and linear probability while increasing non-linearity to 112. Furthermore, a comparison of the ciphertext entropy demonstrates enhanced encryption security with the optimized S-box. This research provides an effective method for improving the performance of the SM4 encryption algorithm

    A Review on Biological Inspired Computation in Cryptology

    Get PDF
    Cryptology is a field that concerned with cryptography and cryptanalysis. Cryptography, which is a key technology in providing a secure transmission of information, is a study of designing strong cryptographic algorithms, while cryptanalysis is a study of breaking the cipher. Recently biological approaches provide inspiration in solving problems from various fields. This paper reviews major works in the application of biological inspired computational (BIC) paradigm in cryptology. The paper focuses on three BIC approaches, namely, genetic algorithm (GA), artificial neural network (ANN) and artificial immune system (AIS). The findings show that the research on applications of biological approaches in cryptology is minimal as compared to other fields. To date only ANN and GA have been used in cryptanalysis and design of cryptographic primitives and protocols. Based on similarities that AIS has with ANN and GA, this paper provides insights for potential application of AIS in cryptology for further research

    Hybrid approach for metabolites production using differential evolution and minimization of metabolic adjustment

    Get PDF
    Microbial strains can be optimized using metabolic engineering which implements gene knockout techniques. These techniques manipulate potential genes to increase the yield of metabolites through restructuring metabolic networks. Nowadays, several hybrid optimization algorithms have been proposed to optimize the microbial strains. However, the existing algorithms were unable to obtain optimal strains because the nonessential genes are hardly to be diagnosed and need to be removed due to high complexity of metabolic network. Therefore, the main goal of this study is to overcome the limitation of the existing algorithms by proposing a hybrid of Differential Evolution and Minimization of Metabolic Adjustments (DEMOMA). Differential Evolution (DE) is known as population-based stochastic search algorithm with few tuneable parameter control. Minimization of Metabolic Adjustment (MOMA) is one of the constraint based algorithms which act to simulate the cellular metabolism after perturbation (gene knockout) occurred to the metabolic model. The strength of MOMA is the ability to simulate the strains that have undergone mutation precisely compared to Flux Balance Analysis. The data set used for the production of fumaric acid is S. cerevisiae whereas data set for lycopene production is Y. lipolytica metabolic networks model. Experimental results show that the DEMOMA was able to improve the growth rate for the fumaric acid production rate while for the lycopene production, Biomass Product Coupled Yield (BPCY) and production rate were both able to be optimized
    corecore