Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm
Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. In this context, this research introduces a novel approach to ECC-key-pair generation by utilizing genetic algorithms (GAs). GAs have proven effecti...
Saved in:
| Main Authors: | , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
MDPI AG
2023-12-01
|
| Series: | Engineering Proceedings |
| Subjects: | |
| Online Access: | https://www.mdpi.com/2673-4591/59/1/59 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1849342455013441536 |
|---|---|
| author | Sanjay Kumar Deepmala Sharma |
| author_facet | Sanjay Kumar Deepmala Sharma |
| author_sort | Sanjay Kumar |
| collection | DOAJ |
| description | Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. In this context, this research introduces a novel approach to ECC-key-pair generation by utilizing genetic algorithms (GAs). GAs have proven effective in solving optimization problems by mimicking the principles of natural selection and genetics. The proposed genetic algorithm-based ECC-key generation process involves several stages: chromosome initialization, fitness evaluation, selection, uniform crossover, and mutation. Chromosomes representing points on an elliptic curve are initialized randomly, evaluated for their proximity to a predefined target point using a fitness function, and subjected to tournament selection to determine parents for the next generation. Uniform crossover and mutation operators then create offspring, inheriting traits from their parents while introducing diversity. The generated ECC-key pair comprises private and public keys derived from the GA-driven process. The private key is chosen randomly within the constraints of the elliptic curve’s parameters, while the public key is generated through the GA procedure. The study evaluates the efficiency and effectiveness of the proposed ECC-GA approach through an empirical analysis of execution time, key size, and the size of the search space. The outcomes of this research highlight the potential of genetic algorithms in ECC-key generation, offering a promising alternative for enhancing the security and efficiency of cryptographic systems, especially in resource-limited environments. The exploration of key size and search space may assist in understanding the security implications and computational complexity associated with the proposed method. Overall, the ECC-GA approach opens avenues for further research in innovative key-generation techniques for modern cryptographic applications. |
| format | Article |
| id | doaj-art-70dc10f75f6b44468919251040b0a3c9 |
| institution | Kabale University |
| issn | 2673-4591 |
| language | English |
| publishDate | 2023-12-01 |
| publisher | MDPI AG |
| record_format | Article |
| series | Engineering Proceedings |
| spelling | doaj-art-70dc10f75f6b44468919251040b0a3c92025-08-20T03:43:22ZengMDPI AGEngineering Proceedings2673-45912023-12-015915910.3390/engproc2023059059Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic AlgorithmSanjay Kumar0Deepmala Sharma1Department of Mathematics, National Institute of Technology Raipur, G.E. Road, Raipur 492010, Chhattisgarh, IndiaDepartment of Mathematics, National Institute of Technology Raipur, G.E. Road, Raipur 492010, Chhattisgarh, IndiaElliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. In this context, this research introduces a novel approach to ECC-key-pair generation by utilizing genetic algorithms (GAs). GAs have proven effective in solving optimization problems by mimicking the principles of natural selection and genetics. The proposed genetic algorithm-based ECC-key generation process involves several stages: chromosome initialization, fitness evaluation, selection, uniform crossover, and mutation. Chromosomes representing points on an elliptic curve are initialized randomly, evaluated for their proximity to a predefined target point using a fitness function, and subjected to tournament selection to determine parents for the next generation. Uniform crossover and mutation operators then create offspring, inheriting traits from their parents while introducing diversity. The generated ECC-key pair comprises private and public keys derived from the GA-driven process. The private key is chosen randomly within the constraints of the elliptic curve’s parameters, while the public key is generated through the GA procedure. The study evaluates the efficiency and effectiveness of the proposed ECC-GA approach through an empirical analysis of execution time, key size, and the size of the search space. The outcomes of this research highlight the potential of genetic algorithms in ECC-key generation, offering a promising alternative for enhancing the security and efficiency of cryptographic systems, especially in resource-limited environments. The exploration of key size and search space may assist in understanding the security implications and computational complexity associated with the proposed method. Overall, the ECC-GA approach opens avenues for further research in innovative key-generation techniques for modern cryptographic applications.https://www.mdpi.com/2673-4591/59/1/59key generationelliptic-curve cryptographygenetic algorithmkey sizesecurity analysis |
| spellingShingle | Sanjay Kumar Deepmala Sharma Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm Engineering Proceedings key generation elliptic-curve cryptography genetic algorithm key size security analysis |
| title | Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm |
| title_full | Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm |
| title_fullStr | Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm |
| title_full_unstemmed | Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm |
| title_short | Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm |
| title_sort | key generation in cryptography using elliptic curve cryptography and genetic algorithm |
| topic | key generation elliptic-curve cryptography genetic algorithm key size security analysis |
| url | https://www.mdpi.com/2673-4591/59/1/59 |
| work_keys_str_mv | AT sanjaykumar keygenerationincryptographyusingellipticcurvecryptographyandgeneticalgorithm AT deepmalasharma keygenerationincryptographyusingellipticcurvecryptographyandgeneticalgorithm |