Intelligent TRIPLE DES with N Round Based on Genetic Algorithm

This work presents an approach for the applying Triple DES (TRIPLE DES) based on using genetic algorithm by adding intelligent feature for TRIPLE DES with N round for genetic algorithm. Encapsulated cipher file with special program which send an acknowledgment to a sender to know who decipher or broken to crash it , Thus it is considered as the initial step to improve privacy. The outcome for proposed system gives a good indication that it is a promising system compared with other type of cipher system.


Introduction
The essential part of information technology is to achieve data security and privacy. Information security in data storage and transmission is becoming important as the fast grew of exchanging digital data in an electronic way. Cipher system considers to be the basic element for improving data security, in other hand decipher system is an important step for attack to broken secure data in all time, thus it must create a stamp for sender (cipher data) and one for who received(decipher) to guarantee the data received by a specific user [1]. Development of human intelligence with the art of cryptography has become more sophisticated in order to make information more secure. Cryptography using genetic algorithm has attracted more interest in recent years. There are primary types of cryptography a secret and a public key. Secret key cryptography is known as symmetric key cryptography where the encrypted (sender) and the decrypted (received) files has the same key. Public key cryptography is called asymmetric key cryptography which uses a pair of keys called private and public for encryption and decryption [2].

ISSN: 0067-2904
Haithem and Lateef Iraqi Journal of Science, 2019, Vol. 60, No. 9, pp: 2058-20662059 There are two ways of key production, the first one is mathematical like AES, DES and the other one is based on the theory of natural selection [1,2].
Cryptography generally uses DES algorithm for the Encryption and Decryption. DES using round and round strategy. The DES uses private key and its works by using the same key to encrypt and decrypt a data [3].
Many genetic algorithms based encryption algorithms have been successfully used in many papers. The basic idea of research on GAs has been introduced in many researches which gives it a robustness in security confidence. Jun Song,et. al., 2007[4], Their paper stated a way for using genetic algorithm in cryptanalysis of tworound DES .Depending on fitness function they adopted a known plaintext attack to produce a variety of optimum keys and count every bit of them one by one to find some valuable bits, which generate a significant deviation from the other bits, thus, the 56-bit key is successfully gained without searching the whole search space. An experimental result specified that this is a promising method and can works with the other complex block ciphers. Gove Nitinkumar Rajendra, et. al., 2011[5], they proposed a new method to data security based on brain mutually waves and genetic algorithm and with pseudorandom binary sequence for encrypt and decrypt the data. The properties of such a method comprise a high data security and high feasibility for practical application. Poornima Naik, et. al., 2014[6], in their paper they try to exploit the randomness in crossover and mutation processes for generating a pair of asymmetric key used for encrypt and decrypt a messages. In their work they have used four crossover points, three mutation points and a single random byte and a permutation factor. The use of randomness with permutation makes the algorithm more robust and hard to break. Suvajit Dutta, et. al., 2014[7], their paper deals with the confidentiality of electronic data which is transmitted over the internet by using the concept of genetic algorithms with pseudorandom function to encrypt and decrypt data stream. The encryption process is applied over a binary file. They proposed genetic algorithm depends on a method of encrypt a secret key which obviously it satisfied the goals that are required in any encryption method for encrypt binary files. Purvi Garg, et.al. 2015[8], in their paper they stated that ring crossover operator using genetic algorithms has been used in performing cryptanalysis of SDES. The scope of this paper is restricted to a cipher text attack. Keys are generated by different combinations using Genetic Algorithm and hence it is deduced that Genetic Algorithm is a better method than the Brute Force for analyzing SDES. Ms. B. D. Nagpure, et. al., ,2016[9],their paper stated at a cryptography based on Genetic Algorithm to implement security of information and data transmission so as to provide confidentiality, integrity , authentication and non-repudiation of the messages. A private key is used to encrypt a plain text of receiver to outcome an intermediate cipher which encrypted again using genetic algorithm to outcome a final cipher.

Genetic algorithm
The Genetic Algorithm (GAs) is a planning to move from one populace of "chromosomes" (or "bits") to another populace by utilizing a kind of "normal choice". Every chromosome comprises of "qualities" (e.g., bits), every quality being an example of a specific "allele" (e.g., 0 or 1). Hereditary calculations can be isolate into the accompanying three sorts of fundamental operation: selection, hybrid, and change. Selection depends on the wellness incentive to choose chromosomes in the populace for multiplication. The fitter the chromosome, the more circumstances it is probably going to be imitated. In Crossover a hybrid administrator has an essentialness as that of hybrid in a characteristic hereditary process. For instance, a strings 10000100 and 11111111 could be traversed after the third locus in each to deliver the two posterity 10011111 and 11100100. The hybrid administrator generally imitates natural recombination between two single chromosome creatures [10]. In Mutation: it is a hereditary administrator arbitrarily flips a portion of the bits in a chromosome. For instance, the string 00000100 may be transformed in its second position to yield 01000100. Transformation can happen at each piece position in a string with some likelihood, typically little. [11,12]

TRIPLE DES
TRIPLE DES or the Triple Data Encryption Algorithm (TDEA) was produced to address the conspicuous blemishes in DES without outlining a radical new cryptosystem. It additionally has the benefit of demonstrated unwavering quality and a more extended key length that takes out a large number of the assaults that can be utilized to lessen the measure of time it takes to break DES [13]. Information Encryption Standard (DES) utilizes is a 56-bit key and isn't considered appropriate to

Haithem and Lateef
Iraqi Journal of Science, 2019, Vol. 60, No. 9, pp: 2058-2066 2060 encode oversensitive information. TRIPLEDES essentially broadens the key size of DES by execute the calculation three times in progression utilizing three different keys. The consolidated key size is in this manner 168 bits (3 times 56). TDEA includes with three 64-bit DEA keys (K1, K2, K3) in the mode Encrypt-Decrypt-Encrypt (EDE), that is, the plain content is scrambled with K1, at that point unscrambled with K2, and afterward encoded with K3 [14]. The guidelines represents three of keying choices: 1-The more favored alternative, actualizes three commonly free keys (K1 ≠ K2 ≠ K3 ≠ K1). It gives key space of 3 × 56 = 168 bits. 2-Implement two commonly autonomous keys and a third key that is the same as the main key (K1 ≠ K2 and K3 = K1). This gives key space of 2 × 56= 112 bits. 3-a key heap of three comparable keys (K1 = K2 = K3). This choice is comparable to DES Algorithm. In TRIPLEDES the three times emphasis is connected to build the encryption level and normal time [15,16]. Triple DES runs three times slower than DES, however is considerably more secure and confident if utilized appropriately [17].

Proposed system:
The information transferring through e-environment thus must improve the data privacy and security between sender and receiver to avoid any intrusion or damage on transfer data. In this section a new feature to TRIPLE DES add by merge it with genetic Algorithm and then covered with any executable file with track ability. The first step to re-code TRIPLE DES file is start with genetic algorithm thus dealing with data that based on ASCII. Note ASCII code start from 0 to 255 in binary system =2 8 refer to 8bit for all character of input file as shown in Table- Using a simple file of TRIPLE DES as a segment test to implement it is shown in Figure-1 and Figure-2. The complexity test depends on irregular value that come and give final cipher file as shown in a curve in Figure- Table-2.

Conclusion
1-cipher /decipher time is high speed when comparing current algorithm with another cipher algorithm using genetic as main engine. 2-new feature for algorithm add with detect whom receive. 3-while increasing cipher file size then increase complexity because of need more time to analysis file. 4-security while any problem appear with file automatic acknowledgement will be send to sender(as new function).