Wednesday 29
Security and risks
R. Ellaia
› 17:20 - 17:40 (20min)
Optimization of security systems facing vulnerability stakes
Aissam El Alimi  1@  , Hanaa Hachimi  1, *@  
1 : Ibn Tofail University, National School of Applied Sciences  -  Website
University Campus, PO Box 241, Kenitra, Morocco -  Morocco
* : Corresponding author

With their adoption of measures meant at minimizing costs and increasing gains, corporations have opted for “cloud computing” and “BYOND1
Such a pressing situation has prompted several corporations to adopt different security policies with the aim of preventing themselves from the targeting of their confidential data. Consequently, the encryption of such data through the use of robust algorithms has become an obligation. ” services as key systems that would enable them to address such challenges. However, this kind of choices has blurred the once clear-cut -thou hostile- digital boundaries between these corporations and the outside world. In this context, their ITs remain more than ever vulnerable and exposed to different types of attacks and threats. In fact, these attacks can range from the simple gathering of economic information to causing a total paralysis of the targeted computing system with the potential loss of all its data.
With this goal in mind, this humble research tries to bring a worked solution meant at minimizing the potential risks inherent to the use of computing systems through the optimization of a number of cryptographic algorithms.
In this perspective, our adopted approach is founded on the use of a number of mathematical optimisation methods that will be applied on ciphering algorithms. Such algorithms are currently used by several operators during the encryption process of their respective sensitive data. Thus, these steps would enable us to solve, efficiently and correctly, not only the required time reduction for ciphering/deciphering operations problematic but also the necessity of guarantying maximum security to concerned data.
In relation to our chosen optimisation methods used for the purpose of this research, we have opted for the following:
 Genetic algorithm (A.G) ;
 Particle Swarm Optimization(P.S.O) ;
 Hybridization of A.G and P.S.O.
Our choice is mainly meant at concluding which of the above-proposed methods would be the most suitable way for the achievement of the first target of our research i.e. reducing the required time for the completion of ciphering/deciphering operations through the use of the most widely spread symmetric algorithms; DES (Data Encryption Standard) and AES (Advanced Encryption Standard).

Online user: 1 RSS Feed