Vtome.ru - электронная библиотека

A Nature-Inspired Approach to Cryptology

  • Добавил: literator
  • Дата: 17-12-2023, 16:54
  • Комментариев: 0
Название: A Nature-Inspired Approach to Cryptology
Автор: Shishir Kumar Shandilya, Agni Datta, Atulya K. Nagar
Издательство: Springer
Серия: Studies in Computational Intelligence
Год: 2023
Страниц: 328
Язык: английский
Формат: pdf (true), epub
Размер: 10.1 MB

This book introduces nature-inspired algorithms and their applications to modern cryptography. It helps the readers to get into the field of nature-based approaches to solve complex cryptographic issues. This book provides a comprehensive view of nature-inspired research which could be applied in cryptography to strengthen security. It will also explore the novel research directives such as Clever algorithms and immune-based cyber resilience. New experimented nature-inspired approaches are having enough potential to make a huge impact in the field of cryptanalysis. This book gives a lucid introduction to this exciting new field and will promote further research in this domain. The book discusses the current landscape of cryptography and nature-inspired research and will be helpful to prospective students and professionals to explore further.

To improve cryptographic algorithms, we apply an extensive range of techniques. Using genetic algorithms, it is possible to mimic natural selection. In addition, we apply methods of swarm intelligence to simulate the group activities of social insects. We intend to establish secure and practical systems. With the development of modern society, the importance of cryptography has only grown, and it now plays a crucial role in safeguarding the digital infrastructure of today. As a consequence, we examine how unconventional computing and cryptography may be implemented in the real world.

This book seeks to educate its readers about cryptography from a theoretical rather than practical standpoint. Due to the novelty of the subject matter and its limited industrial application, the book concentrates on fundamental and theoretical techniques. Consequently, the emphasis of the research is on these theoretical and foundational components. While numerous language libraries and implementations support well-known algorithms such as RSA and DSA, the methods presented below are frequently not as well supported or adapted.

In consequence, the book adopts a theoretical and fundamental stance, describing avenues for future research. Each chapter utilises mathematical rigour to enhance readers’ comprehension. These models clarify concepts and investigate the cryptographic implications of the current topics. Since comprehending cryptography and its algorithms requires a strong mathematical background, the we employ a formal, mathematical approach to explain and define the issue.

We examined a wide range of currently researched cryptographic techniques that draw inspiration from natural phenomena. This textbook provides a comprehensive understanding of the advantages and disadvantages of various methods by investigating their mathematical and computational foundations. This textbook offers a valuable opportunity for individuals interested in the fields of cryptology, academic research, and cybersecurity to enhance their knowledge of cryptography and derive inspiration from natural phenomena.

Particle swarm optimisation (PSO) is an intelligent algorithm that replicates the movement of biological organisms in a group. The PSO algorithm replicates the movement of particles, each of which represents a response to a search in the search space. These particles move throughout the solution, relocating based on their own and nearby experiences. This group behaviour facilitates the search through numerous solutions to identify the best options. PSO functions similarly to how biological organisms collaborate and exchange information, such as colonies of fish or birds. The objective of the algorithm is to generate effective solutions using group knowledge. PSO is a naturalistic algorithm that drives computer operations using natural processes.

Contents:


Скачать A Nature-Inspired Approach to Cryptology



ОТСУТСТВУЕТ ССЫЛКА/ НЕ РАБОЧАЯ ССЫЛКА ЕСТЬ РЕШЕНИЕ, ПИШИМ СЮДА!










ПРАВООБЛАДАТЕЛЯМ


СООБЩИТЬ ОБ ОШИБКЕ ИЛИ НЕ РАБОЧЕЙ ССЫЛКЕ



Внимание
Уважаемый посетитель, Вы зашли на сайт как незарегистрированный пользователь.
Мы рекомендуем Вам зарегистрироваться либо войти на сайт под своим именем.
Информация
Посетители, находящиеся в группе Гости, не могут оставлять комментарии к данной публикации.