wasan awad - Academia.edu (original) (raw)

Papers by wasan awad

Research paper thumbnail of Welcome message from the conference chair

2011 4th International Conference on Logistics, 2011

ABSTRACT On behalf of the Organizing Committees of the 4th International Conference on Logistics ... more ABSTRACT On behalf of the Organizing Committees of the 4th International Conference on Logistics (LOGISTIQUA 2011), we would like to welcome you.

Research paper thumbnail of Attacking of stream Cipher Systems Using a Genetic Algorithm

repository.thiqaruni.org

Ali A. Abd * , Hameed A. Younis ** , and ... Abbas NM [4] showed the applicability of multilayer ... more Ali A. Abd * , Hameed A. Younis ** , and ... Abbas NM [4] showed the applicability of multilayer neural networks with back propagation to crack a linear stream cipher with LFSR as a key generator, assuming that the cryptanalyst has obtained a finite sequence of known plaintext. ...

Research paper thumbnail of A framework for Labor Market Analysis using Machine Learning

2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)

Research paper thumbnail of The Era of Internet of Things: Towards better security using machine learning

2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)

Research paper thumbnail of Denial of Service Detection for IoT Networks Using Machine Learning

Proceedings of the 15th International Conference on Agents and Artificial Intelligence

Research paper thumbnail of A Framework of Outcome-based Assessment and Evaluation for Computing Programs

International Journal of Advanced Computer Science and Applications

This paper is to present a framework for student outcome-based assessment and evaluation, includi... more This paper is to present a framework for student outcome-based assessment and evaluation, including the process and detailed activities leading to continue assessment of the successes of an academic program which is essential to its sustainability. Moreover, this paper provides a survey of the literature that reviews the different means of assessing and evaluating an academic program together with the critical performance metrics which aid in quantifying such evaluation. The presented framework is implemented on the Information Technology program over a course of five years. The paper provides empirical insights about how careful implementation of the presented framework enabled the College of Information Technology in Ahlia University to achieve outstanding results in quality assurance and to be ABET accredited. The results of the implementation prove the effectiveness of the framework in improving the student performance and the program. This paper fulfils an identified need to study how student outcome-based assessment and evaluation model enables an academic institute to foster quality assurance instead of relying on ad hoc practices which might lead them to trial-and-error approach. The presented framework could be followed by other institution aiming for international accreditations.

Research paper thumbnail of Text Classification of English News Articles using Graph Mining Techniques

Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022

Several techniques can be used in the natural language processing systems to understand text docu... more Several techniques can be used in the natural language processing systems to understand text documents, such as, text classification. Text Classification is considered a classical problem with several purposes, varying from automated text classification to sentiment analysis. A graph mining technique for the text classification of English news articles is considered in this research. The proposed model was examined where every text is characterized by a graph that codes relations among the various words. A word's significance to a text is presented by the graph-theoretical degree of a graph's vertices. The proposed weighting scheme can significantly obtain the links between the words that co-appear in a text, producing feature vectors that can enhance the English news articles classification. Experiments have been conducted by implementing the proposed classification algorithms in well-known text datasets. The findings suggest that the proposed text classification using graph mining technique as accurate as other techniques using appropriate parameters.

Research paper thumbnail of Acquisition Budget Allocation Using Decision Support System

2017 9th IEEE-GCC Conference and Exhibition (GCCCE), 2017

This research is conducted to study the problem of budget allocation for acquisitions in academic... more This research is conducted to study the problem of budget allocation for acquisitions in academic libraries, especially for book collections and how to solve this problem using decision support systems. Several attributes that affect the decision making process have been investigated through the literature review and an interview conducted with the director of the Applied Science University's library which is the subject of this study. After identifying the problem and the attributes affecting the decision making process, a decision support system is proposed. A classification model was used to classify library departments under different management budget allocation classes, using a decision tree classifier.

Research paper thumbnail of A Framework for Improving Information Security Using Cloud Computing

InfoSciRN: Cloud Computing (Sub-Topic), 2020

The main objective of this paper is to propose a cloud based framework handling security issues i... more The main objective of this paper is to propose a cloud based framework handling security issues in the existing data storage systems. There are various cyber security threats to existing storage systems because of their traditional architecture and operations applied on them for managing the data within Bahrain. Migration of local storage services to cloud environment is found to solve numerous related cyber security issues within Bahrain. On the other hand, a number of cyber security vulnerabilities are found to be emerged as a result of this migration such as public networks exposure and multitenant shared infrastructure. The vulnerabilities due to this transition introduce the security breaches and hence cause a threat to the underlying confidential information. The significance of migrating storage services to the cloud environment and the emerging cyber security issues in such a transition are analyzed thoroughly. The proposed framework is intended to support the existing infor...

Research paper thumbnail of Study the Fuzzy Logic Awareness and Applications in Bahrain

With the availability of different techniques and solutions, how does one decide whether to stick... more With the availability of different techniques and solutions, how does one decide whether to stick with their current solution or to see if some other solution is even feasible? It is necessary to first look at the current solution, and then to compare it with at least one of other possible solutions. This will either reinforce the belief in the current solution, or it will suggest that another solution would be more beneficial. This paper is to study the awareness of fuzzy systems in Bahrain, along with the acceptance of moving towards another technique, which is fuzzy logic. Also this paper is to propose prototypes to implement the concepts of fuzzy logic for three applications which are: image retrieving, and customer satisfaction

Research paper thumbnail of A Framework for Improving Knowledge Management Using Cloud-Based Business Intelligence

Handbook of Research on Implementing Knowledge Management Strategy in the Public Sector, 2019

Business environment is becoming more complex which creates a big pressure on organizations to in... more Business environment is becoming more complex which creates a big pressure on organizations to increase the performance and decrease the budget and time. Typical management information system failed to reach decision makers' expectations. In order to adapt to the global changes and support decision makers, organizations may implement different solutions and strategies. One of the solutions is to implement business intelligence (BI) in large organizations. The aim of this chapter is to assess the effectiveness of BI solutions and propose a solution for improving knowledge management using BI and cloud computing. A quantitative research method is used which includes survey and interviews. The results will be analyzed to evaluate the current BI solutions in order to identify the problems of knowledge management and decision-making process. Accordingly, a solution will be proposed to overcome the identified problem using cloud BI.

Research paper thumbnail of Improving Spam Email Filtering Systems Using Data Mining Techniques

Implementing Computational Intelligence Techniques for Security Systems Design, 2020

Email is the most popular choice of communication due to its low-cost and easy accessibility, whi... more Email is the most popular choice of communication due to its low-cost and easy accessibility, which makes email spam a major issue. Emails can be incorrectly marked by a spam filter and legitimate emails can get lost in the spam folder or the spam emails can deluge the users' inboxes. Therefore, various methods based on statistics and machine learning have been developed to classify emails accurately. In this chapter, the existing spam filtering methods were studied comprehensively, and a spam email classifier based on the genetic algorithm was proposed. The proposed algorithm was successful in achieving high accuracy by reducing the rate of false positives, but at the same time, it also maintained an acceptable rate of false negatives. The proposed algorithm was tested on 2000 emails from the two popular spam datasets, Enron and LingSpam, and the accuracy was found to be nearly 90%. The results showed that the genetic algorithm is an effective method for spam classification and...

Research paper thumbnail of ARP Spoofing Detection for IoT Networks Using Neural Networks

SSRN Electronic Journal, 2020

Networks equipped with Internet of Things (IoT) devices are increasingly under threat from an esc... more Networks equipped with Internet of Things (IoT) devices are increasingly under threat from an escalating number of cyber-attacks and breaches (Su et al., 2016). ARP-Spoofing attack is one of the Internet security problems that affects IoT devices. Attackers use legitimate ARP packets which traditional detection systems may find it difficult to detect in attacking IoT devices. Therefore, there is a need to have detection systems which use non-traditional approaches in detecting such attacks. This paper presents an artificial intelligence method based on neural networks in detecting ARP-Spoofing in IoT networks. This method showed more than 90% accuracy rate in detecting ARP-Spoofing in IoT networks while it was difficult to detecting ARP-Spoofing with ARIMA statistical method.

Research paper thumbnail of Ant colony inspired method for reducing load imbalance in multiprocessor systems

Journal of Intelligent & Fuzzy Systems, 2018

Parallel processing is crucial for accelerating computation in many high-performance applications... more Parallel processing is crucial for accelerating computation in many high-performance applications and modern technologies including computational modeling, optimization and simulation, Web and DNS servers, peer-to-peer systems, grid computing and cloud computing. Due to the heterogeneity nature of various processing nodes and the differences of workloads of various tasks, some processors can be idle while others are overloaded. In this paper, we present a simple, yet efficient, solution inspired by the intelligence of ant colonies to adequately mitigate the load imbalance and communication overhead problems in multiprocessor environments. The proposed approach is based on defining and maintaining data structures to dynamically track the load of each processor. We implemented the proposed algorithm and evaluated its performance under different scenarios against the baseline round-robin algorithm. The results showed that the proposed algorithm has more effective properties than the round-robin algorithm.

Research paper thumbnail of A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem

Journal of Intelligent & Fuzzy Systems, 2019

This paper presents a deterministic algorithm for approximating the solution of the Symmetric Tra... more This paper presents a deterministic algorithm for approximating the solution of the Symmetric Traveling Salesman Problem (STSP) using a multi perfect matching and partitioning technique. Initially, we find the minimum cost collection of sub-tours that cover all cities, such that each sub-tour consists of at least four edges. The obtained solution is then partitioned into k branches, where k is the length of the smallest sub-tour in the resulting solution. The algorithm solves the sub-problems in parallel and selects the sub-problem with the minimum resulting cost to be partitioned further. The algorithm converges when a complete cycle without sub-tours is found. The performance of the proposed algorithm is evaluated and compared with the optimal values obtained by some well-known algorithms for solving STSP using 24 instances from the TSPLIB online library. The results of the experiments carried out in this study show that our approach yields optimum or near-optimum solutions in polynomial execution time.

Research paper thumbnail of Computational Intelligence in Cryptology

Artificial Intelligence

Computational intelligence (CI) has attracted the attention of many researchers for its effective... more Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve problems in a wide area of applications. The aim of this chapter is to present an overview of existing literature about the applications of CI in cryptology. It demonstrates and studies the applicability of CI in cryptology. The problems examined in this chapter are the automated design of cipher systems, and the automated cryptanalysis of cipher systems. It has been shown that CI methods, such as genetic algorithms, genetic programming, Tabu search, and memetic computing are effective tools to solve most of cryptology problems.

Research paper thumbnail of Deploying E-Mail as an Official Communication Tool: Technical Prospect

Research paper thumbnail of On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems

International Journal of Computational Intelligence Systems, 2011

Encryption is an important mechanism used to protect private information from unauthorized access... more Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process. Therefore, this paper considers this problem, and presents an attempt to find a general approach for designing good cipher systems automatically. In this paper we focus on an important class of cipher systems which is stream ciphers. The proposed approach is based on the evolutionary computation techniques, and the method chosen here is the simulated annealing programming which is an integration of genetic programming and simulated annealing algorithm. The proposed algorithm has been implemented in order to test its effectiveness in solving the underlying problem.

Research paper thumbnail of Designing Stream Cipher Systems Using Genetic Programming

Lecture Notes in Computer Science, 2011

Genetic programming is a good technique for finding near-global optimal solutions for complex pro... more Genetic programming is a good technique for finding near-global optimal solutions for complex problems, by finding the program used to solve the problems. One of these complex problems is designing stream cipher systems automatically. Steam cipher is an important encryption technique used to protect private information from an unauthorized access, and it plays an important role in the communication and storage systems. In this work, we propose a new approach for designing stream cipher systems of good properties, such as high degree of security and efficiency. The proposed approach is based on the genetic programming. Three algorithms are presented here, which are simple genetic programming, simulated annealing programming, and adaptive genetic programming. Experiments were performed to study the effectiveness of these algorithms in solving the underlying problem.

Research paper thumbnail of Computational Intelligence in Cryptology

Improving Information Security Practices through Computational Intelligence

Computational intelligence (CI) has attracted the attention of many researchers for its effective... more Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve problems in a wide area of applications. The aim of this chapter is to present an overview of existing literature about the applications of CI in cryptology. It demonstrates and studies the applicability of CI in cryptology. The problems examined in this chapter are the automated design of cipher systems, and the automated cryptanalysis of cipher systems. It has been shown that CI methods, such as genetic algorithms, genetic programming, Tabu search, and memetic computing are effective tools to solve most of cryptology problems.

Research paper thumbnail of Welcome message from the conference chair

2011 4th International Conference on Logistics, 2011

ABSTRACT On behalf of the Organizing Committees of the 4th International Conference on Logistics ... more ABSTRACT On behalf of the Organizing Committees of the 4th International Conference on Logistics (LOGISTIQUA 2011), we would like to welcome you.

Research paper thumbnail of Attacking of stream Cipher Systems Using a Genetic Algorithm

repository.thiqaruni.org

Ali A. Abd * , Hameed A. Younis ** , and ... Abbas NM [4] showed the applicability of multilayer ... more Ali A. Abd * , Hameed A. Younis ** , and ... Abbas NM [4] showed the applicability of multilayer neural networks with back propagation to crack a linear stream cipher with LFSR as a key generator, assuming that the cryptanalyst has obtained a finite sequence of known plaintext. ...

Research paper thumbnail of A framework for Labor Market Analysis using Machine Learning

2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)

Research paper thumbnail of The Era of Internet of Things: Towards better security using machine learning

2023 International Conference on IT Innovation and Knowledge Discovery (ITIKD)

Research paper thumbnail of Denial of Service Detection for IoT Networks Using Machine Learning

Proceedings of the 15th International Conference on Agents and Artificial Intelligence

Research paper thumbnail of A Framework of Outcome-based Assessment and Evaluation for Computing Programs

International Journal of Advanced Computer Science and Applications

This paper is to present a framework for student outcome-based assessment and evaluation, includi... more This paper is to present a framework for student outcome-based assessment and evaluation, including the process and detailed activities leading to continue assessment of the successes of an academic program which is essential to its sustainability. Moreover, this paper provides a survey of the literature that reviews the different means of assessing and evaluating an academic program together with the critical performance metrics which aid in quantifying such evaluation. The presented framework is implemented on the Information Technology program over a course of five years. The paper provides empirical insights about how careful implementation of the presented framework enabled the College of Information Technology in Ahlia University to achieve outstanding results in quality assurance and to be ABET accredited. The results of the implementation prove the effectiveness of the framework in improving the student performance and the program. This paper fulfils an identified need to study how student outcome-based assessment and evaluation model enables an academic institute to foster quality assurance instead of relying on ad hoc practices which might lead them to trial-and-error approach. The presented framework could be followed by other institution aiming for international accreditations.

Research paper thumbnail of Text Classification of English News Articles using Graph Mining Techniques

Proceedings of the 14th International Conference on Agents and Artificial Intelligence, 2022

Several techniques can be used in the natural language processing systems to understand text docu... more Several techniques can be used in the natural language processing systems to understand text documents, such as, text classification. Text Classification is considered a classical problem with several purposes, varying from automated text classification to sentiment analysis. A graph mining technique for the text classification of English news articles is considered in this research. The proposed model was examined where every text is characterized by a graph that codes relations among the various words. A word's significance to a text is presented by the graph-theoretical degree of a graph's vertices. The proposed weighting scheme can significantly obtain the links between the words that co-appear in a text, producing feature vectors that can enhance the English news articles classification. Experiments have been conducted by implementing the proposed classification algorithms in well-known text datasets. The findings suggest that the proposed text classification using graph mining technique as accurate as other techniques using appropriate parameters.

Research paper thumbnail of Acquisition Budget Allocation Using Decision Support System

2017 9th IEEE-GCC Conference and Exhibition (GCCCE), 2017

This research is conducted to study the problem of budget allocation for acquisitions in academic... more This research is conducted to study the problem of budget allocation for acquisitions in academic libraries, especially for book collections and how to solve this problem using decision support systems. Several attributes that affect the decision making process have been investigated through the literature review and an interview conducted with the director of the Applied Science University's library which is the subject of this study. After identifying the problem and the attributes affecting the decision making process, a decision support system is proposed. A classification model was used to classify library departments under different management budget allocation classes, using a decision tree classifier.

Research paper thumbnail of A Framework for Improving Information Security Using Cloud Computing

InfoSciRN: Cloud Computing (Sub-Topic), 2020

The main objective of this paper is to propose a cloud based framework handling security issues i... more The main objective of this paper is to propose a cloud based framework handling security issues in the existing data storage systems. There are various cyber security threats to existing storage systems because of their traditional architecture and operations applied on them for managing the data within Bahrain. Migration of local storage services to cloud environment is found to solve numerous related cyber security issues within Bahrain. On the other hand, a number of cyber security vulnerabilities are found to be emerged as a result of this migration such as public networks exposure and multitenant shared infrastructure. The vulnerabilities due to this transition introduce the security breaches and hence cause a threat to the underlying confidential information. The significance of migrating storage services to the cloud environment and the emerging cyber security issues in such a transition are analyzed thoroughly. The proposed framework is intended to support the existing infor...

Research paper thumbnail of Study the Fuzzy Logic Awareness and Applications in Bahrain

With the availability of different techniques and solutions, how does one decide whether to stick... more With the availability of different techniques and solutions, how does one decide whether to stick with their current solution or to see if some other solution is even feasible? It is necessary to first look at the current solution, and then to compare it with at least one of other possible solutions. This will either reinforce the belief in the current solution, or it will suggest that another solution would be more beneficial. This paper is to study the awareness of fuzzy systems in Bahrain, along with the acceptance of moving towards another technique, which is fuzzy logic. Also this paper is to propose prototypes to implement the concepts of fuzzy logic for three applications which are: image retrieving, and customer satisfaction

Research paper thumbnail of A Framework for Improving Knowledge Management Using Cloud-Based Business Intelligence

Handbook of Research on Implementing Knowledge Management Strategy in the Public Sector, 2019

Business environment is becoming more complex which creates a big pressure on organizations to in... more Business environment is becoming more complex which creates a big pressure on organizations to increase the performance and decrease the budget and time. Typical management information system failed to reach decision makers' expectations. In order to adapt to the global changes and support decision makers, organizations may implement different solutions and strategies. One of the solutions is to implement business intelligence (BI) in large organizations. The aim of this chapter is to assess the effectiveness of BI solutions and propose a solution for improving knowledge management using BI and cloud computing. A quantitative research method is used which includes survey and interviews. The results will be analyzed to evaluate the current BI solutions in order to identify the problems of knowledge management and decision-making process. Accordingly, a solution will be proposed to overcome the identified problem using cloud BI.

Research paper thumbnail of Improving Spam Email Filtering Systems Using Data Mining Techniques

Implementing Computational Intelligence Techniques for Security Systems Design, 2020

Email is the most popular choice of communication due to its low-cost and easy accessibility, whi... more Email is the most popular choice of communication due to its low-cost and easy accessibility, which makes email spam a major issue. Emails can be incorrectly marked by a spam filter and legitimate emails can get lost in the spam folder or the spam emails can deluge the users' inboxes. Therefore, various methods based on statistics and machine learning have been developed to classify emails accurately. In this chapter, the existing spam filtering methods were studied comprehensively, and a spam email classifier based on the genetic algorithm was proposed. The proposed algorithm was successful in achieving high accuracy by reducing the rate of false positives, but at the same time, it also maintained an acceptable rate of false negatives. The proposed algorithm was tested on 2000 emails from the two popular spam datasets, Enron and LingSpam, and the accuracy was found to be nearly 90%. The results showed that the genetic algorithm is an effective method for spam classification and...

Research paper thumbnail of ARP Spoofing Detection for IoT Networks Using Neural Networks

SSRN Electronic Journal, 2020

Networks equipped with Internet of Things (IoT) devices are increasingly under threat from an esc... more Networks equipped with Internet of Things (IoT) devices are increasingly under threat from an escalating number of cyber-attacks and breaches (Su et al., 2016). ARP-Spoofing attack is one of the Internet security problems that affects IoT devices. Attackers use legitimate ARP packets which traditional detection systems may find it difficult to detect in attacking IoT devices. Therefore, there is a need to have detection systems which use non-traditional approaches in detecting such attacks. This paper presents an artificial intelligence method based on neural networks in detecting ARP-Spoofing in IoT networks. This method showed more than 90% accuracy rate in detecting ARP-Spoofing in IoT networks while it was difficult to detecting ARP-Spoofing with ARIMA statistical method.

Research paper thumbnail of Ant colony inspired method for reducing load imbalance in multiprocessor systems

Journal of Intelligent & Fuzzy Systems, 2018

Parallel processing is crucial for accelerating computation in many high-performance applications... more Parallel processing is crucial for accelerating computation in many high-performance applications and modern technologies including computational modeling, optimization and simulation, Web and DNS servers, peer-to-peer systems, grid computing and cloud computing. Due to the heterogeneity nature of various processing nodes and the differences of workloads of various tasks, some processors can be idle while others are overloaded. In this paper, we present a simple, yet efficient, solution inspired by the intelligence of ant colonies to adequately mitigate the load imbalance and communication overhead problems in multiprocessor environments. The proposed approach is based on defining and maintaining data structures to dynamically track the load of each processor. We implemented the proposed algorithm and evaluated its performance under different scenarios against the baseline round-robin algorithm. The results showed that the proposed algorithm has more effective properties than the round-robin algorithm.

Research paper thumbnail of A multi-matching approximation algorithm for Symmetric Traveling Salesman Problem

Journal of Intelligent & Fuzzy Systems, 2019

This paper presents a deterministic algorithm for approximating the solution of the Symmetric Tra... more This paper presents a deterministic algorithm for approximating the solution of the Symmetric Traveling Salesman Problem (STSP) using a multi perfect matching and partitioning technique. Initially, we find the minimum cost collection of sub-tours that cover all cities, such that each sub-tour consists of at least four edges. The obtained solution is then partitioned into k branches, where k is the length of the smallest sub-tour in the resulting solution. The algorithm solves the sub-problems in parallel and selects the sub-problem with the minimum resulting cost to be partitioned further. The algorithm converges when a complete cycle without sub-tours is found. The performance of the proposed algorithm is evaluated and compared with the optimal values obtained by some well-known algorithms for solving STSP using 24 instances from the TSPLIB online library. The results of the experiments carried out in this study show that our approach yields optimum or near-optimum solutions in polynomial execution time.

Research paper thumbnail of Computational Intelligence in Cryptology

Artificial Intelligence

Computational intelligence (CI) has attracted the attention of many researchers for its effective... more Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve problems in a wide area of applications. The aim of this chapter is to present an overview of existing literature about the applications of CI in cryptology. It demonstrates and studies the applicability of CI in cryptology. The problems examined in this chapter are the automated design of cipher systems, and the automated cryptanalysis of cipher systems. It has been shown that CI methods, such as genetic algorithms, genetic programming, Tabu search, and memetic computing are effective tools to solve most of cryptology problems.

Research paper thumbnail of Deploying E-Mail as an Official Communication Tool: Technical Prospect

Research paper thumbnail of On the Application of Evolutionary Computation Techniques in Designing Stream Cipher Systems

International Journal of Computational Intelligence Systems, 2011

Encryption is an important mechanism used to protect private information from unauthorized access... more Encryption is an important mechanism used to protect private information from unauthorized access. Thus, cipher systems play an important role in the communication and storage systems. But, designing a cipher system of good properties, such as high degree of security and efficiency, is a complex process. Therefore, this paper considers this problem, and presents an attempt to find a general approach for designing good cipher systems automatically. In this paper we focus on an important class of cipher systems which is stream ciphers. The proposed approach is based on the evolutionary computation techniques, and the method chosen here is the simulated annealing programming which is an integration of genetic programming and simulated annealing algorithm. The proposed algorithm has been implemented in order to test its effectiveness in solving the underlying problem.

Research paper thumbnail of Designing Stream Cipher Systems Using Genetic Programming

Lecture Notes in Computer Science, 2011

Genetic programming is a good technique for finding near-global optimal solutions for complex pro... more Genetic programming is a good technique for finding near-global optimal solutions for complex problems, by finding the program used to solve the problems. One of these complex problems is designing stream cipher systems automatically. Steam cipher is an important encryption technique used to protect private information from an unauthorized access, and it plays an important role in the communication and storage systems. In this work, we propose a new approach for designing stream cipher systems of good properties, such as high degree of security and efficiency. The proposed approach is based on the genetic programming. Three algorithms are presented here, which are simple genetic programming, simulated annealing programming, and adaptive genetic programming. Experiments were performed to study the effectiveness of these algorithms in solving the underlying problem.

Research paper thumbnail of Computational Intelligence in Cryptology

Improving Information Security Practices through Computational Intelligence

Computational intelligence (CI) has attracted the attention of many researchers for its effective... more Computational intelligence (CI) has attracted the attention of many researchers for its effectiveness in solving different kinds of problems. It has been applied to solve problems in a wide area of applications. The aim of this chapter is to present an overview of existing literature about the applications of CI in cryptology. It demonstrates and studies the applicability of CI in cryptology. The problems examined in this chapter are the automated design of cipher systems, and the automated cryptanalysis of cipher systems. It has been shown that CI methods, such as genetic algorithms, genetic programming, Tabu search, and memetic computing are effective tools to solve most of cryptology problems.