Title: User Controlled Encryption Using Automated Key Generation

Year of Publication: Sep - 2015
Page Numbers: 53-57
Authors: Halima Abdel Halim Shnishah, David Mulvaney
Conference Name: The International Conference on Electrical and Electronic Engineering Telecommunication Engineering, and Mechatronics (EEETEM2015)
- Malaysia


As the practical implementation of many encryption algorithms is controlled by third parties, end users cannot be certain that the generated keys have not been compromised at source. By allowing users to generate their own keys, this concern can be overcome. In the work described in this paper, the encryption key is a generated function produced by an evolutionary search operation executed by Eureqa in modelling pseudo-random input data obtained from a suitable source. This paper describes the results of initial experiments to generate suitable keys representing random number sequences of a range of lengths.