Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm †

6Citations
Citations of this article
14Readers
Mendeley users who have this article in their library.

Abstract

Elliptic-curve cryptography (ECC) has become a robust cryptographic technique that ensures secure data transmission with comparatively small key sizes. In this context, this research introduces a novel approach to ECC-key-pair generation by utilizing genetic algorithms (GAs). GAs have proven effective in solving optimization problems by mimicking the principles of natural selection and genetics. The proposed genetic algorithm-based ECC-key generation process involves several stages: chromosome initialization, fitness evaluation, selection, uniform crossover, and mutation. Chromosomes representing points on an elliptic curve are initialized randomly, evaluated for their proximity to a predefined target point using a fitness function, and subjected to tournament selection to determine parents for the next generation. Uniform crossover and mutation operators then create offspring, inheriting traits from their parents while introducing diversity. The generated ECC-key pair comprises private and public keys derived from the GA-driven process. The private key is chosen randomly within the constraints of the elliptic curve’s parameters, while the public key is generated through the GA procedure. The study evaluates the efficiency and effectiveness of the proposed ECC-GA approach through an empirical analysis of execution time, key size, and the size of the search space. The outcomes of this research highlight the potential of genetic algorithms in ECC-key generation, offering a promising alternative for enhancing the security and efficiency of cryptographic systems, especially in resource-limited environments. The exploration of key size and search space may assist in understanding the security implications and computational complexity associated with the proposed method. Overall, the ECC-GA approach opens avenues for further research in innovative key-generation techniques for modern cryptographic applications.

References Powered by Scopus

A review on genetic algorithm: past, present, and future

3029Citations
N/AReaders
Get full text

Genetic algorithm

1406Citations
N/AReaders
Get full text

RSA-OAEP is secure under the RSA Assumption

171Citations
N/AReaders
Get full text

Cited by Powered by Scopus

AI-optimized elliptic curve with Certificate-Less Digital Signature for zero trust maritime security

2Citations
N/AReaders
Get full text

Genetic algorithms and deep learning for unique facial landmark-based key generation

1Citations
N/AReaders
Get full text

Elliptic Curve Cryptography on Constrained Devices: A Comparative Study of Point Multiplication Methods

1Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Kumar, S., & Sharma, D. (2023). Key Generation in Cryptography Using Elliptic-Curve Cryptography and Genetic Algorithm †. Engineering Proceedings, 59(1). https://doi.org/10.3390/engproc2023059059

Readers over time

‘24‘25036912

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 4

80%

Lecturer / Post doc 1

20%

Readers' Discipline

Tooltip

Computer Science 5

100%

Save time finding and organizing research with Mendeley

Sign up for free
0