ISSN: 2245-4578 (Online Version) ISSN:2245-1439 (Print Version)
Innovative Applications of Nature-Inspired Algorithms in Cryptographic Communication
PDF
HTML

Keywords

Cryptographic Communication
Genetic Algorithm
Lightweight Security
remora optimization
adaptive encryption

How to Cite

[1]
T. . Qi and W. . Chen, “Innovative Applications of Nature-Inspired Algorithms in Cryptographic Communication”, JCSANDM, vol. 14, no. 05, pp. 1117–1150, Dec. 2025.

Abstract

The increasing complexity of modern communication systems poses significant challenges to traditional cryptographic methods, especially in dynamic, resource-constrained, and adversarial environments. Traditional encryption methods frequently face challenges in achieving an optimal balance between key unpredictability, computational efficiency, and resistance to adaptive attacks. To address these challenges, we propose HSIO-Crypto, a novel cryptographic framework that integrates Genetic Algorithms (GA) and the Remora Optimization Algorithm (ROA) for adaptive key generation and encryption scheduling. The method dynamically evolves encryption keys with high entropy and injects stochastic variation into the encryption process to resist structural and entropy-based attacks. Extensive experiments were conducted across four benchmark datasets (Wireless, Elliptic Curve exchanges (ECC), KDD99, and IoT), with comprehensive comparisons against six state-of-the-art baselines. Results demonstrate that HSIO-Crypto achieves a 17.3% improvement in key strength, a 22.8% reduction in encryption latency, and a 14.6% increase in throughput over GA-Cryptanalysis, while maintaining strong deployment performance on IoT-class devices. Additionally, the proposed method demonstrates enhanced resistance to adversarial inference attacks, achieving an average robustness score 12.5% higher than the strongest baseline. The results show that bio-inspired optimizers can make encryption both fast and secure, even on low-power devices in unstable networks. HSIO-Crypto proves this by letting the cipher adjust itself in real time.

https://doi.org/10.13052/jcsm2245-1439.1454
PDF
HTML

References

Mougkogiannis P, Ghadafi E, Adamatzky A. Bio-inspired cryptography based on proteinoid assemblies. PLoS One. 2025;20(5):e0324761.

Al Attar TNA. A Hybrid Genetic Algorithm-Particle Swarm Optimization Approach for Enhanced Text Compression. UHD Journal of Science and Technology. 2024;8(2):63–74.

Al-Muhammed MJ, Abu Zitar R. Light and Secure Encryption Technique Based on Artificially Induced Chaos and Nature-Inspired Triggering Method. Symmetry. 2022;14(2):218.

Amiri Z, Heidari A, Zavvar M, Navimipour NJ, Esmaeilpour M. The applications of nature-inspired algorithms in Internet of Things-based healthcare service: A systematic literature review. Transactions on Emerging Telecommunications Technologies. 2024;35(6):e4969.

Kumar S, Sharma D. A chaotic based image encryption scheme using elliptic curve cryptography and genetic algorithm. Artificial Intelligence Review. 2024;57(4):87.

Sarker KU. A systematic review on lightweight security algorithms for a sustainable IoT infrastructure. Discover Internet of Things. 2025;5(1):1–20.

Hsiao F-H. Applying 3DES to chaotic synchronization cryptosystems. IEEE Access. 2021;10:1036–50.

Wang HL, Ma HF, Cui TJ. A polarization-modulated information metasurface for encryption wireless communications. Advanced Science. 2022;9(34):2204333.

Premakumari SBN, Sundaram G, Rivera M, Wheeler P, Guzmán REP. Reinforcement Q-Learning-Based Adaptive Encryption Model for Cyberthreat Mitigation in Wireless Sensor Networks. Sensors. 2025;25(7):2056.

Anand A, Singh AK. Hybrid nature-inspired optimization and encryption-based watermarking for e-healthcare. IEEE Transactions on computational social systems. 2022;10(4):2033–40.

Naveen N, Nirmaladevi J. Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs. Scientific Reports. 2025;15(1):25335.

Ren R, Li Z, Deng L, Shan X, Dai Q, Guan Z, et al. Non-orthogonal polarization multiplexed metasurfaces for tri-channel polychromatic image displays and information encryption. Nanophotonics. 2021;10(11):2903–14.

Kumar K, Ramkumar K, Kaur A. A lightweight AES algorithm implementation for encrypting voice messages using field programmable gate arrays. Journal of King Saud University-Computer and Information Sciences. 2022;34(6):3878–85.

Kamal R, Bag M, Kule M. On the cryptanalysis of S-DES using nature inspired optimization algorithms. Evolutionary Intelligence. 2021;14(1):163–73.

Dratnal M, Danys L, Martinek R. Bio-inspired optimization methods for visible light communication: a comprehensive review. Artificial Intelligence Review. 2025;58(8):246.

Luo Y, Ouyang X, Liu J, Cao L, Zou Y. An image encryption scheme based on particle swarm optimization algorithm and hyperchaotic system. Soft Computing. 2022;26(11):5409–35.

Kumar S, Sharma D. Key generation in cryptography using elliptic-curve cryptography and genetic algorithm. Engineering Proceedings. 2023;59(1):59.

Kumar S, Sharma D. Genetic Algorithm for Key Generation in Cryptosystems. Privacy Preservation and Secured Data Storage in Cloud Computing: IGI Global; 2023. p. 296–321.

Gong J. An application of meta-heuristic and nature-inspired algorithms for designing reliable networks based on the Internet of things: A systematic literature review. International Journal of Communication Systems. 2023;36(5):e5416.

Kocak O, Erkan U, Toktas A, Gao S. PSO-based image encryption scheme using modular integrated logistic exponential map. Expert Systems with Applications. 2024;237:121452.

Jawed MS, Sajid M. XECryptoGA: a metaheuristic algorithm-based block cipher to enhance the security goals. Evolving Systems. 2023;14(5):749–70.

Hameed MA, Abdel-Aleem OA, Hassaballah M. A secure data hiding approach based on least-significant-bit and nature-inspired optimization techniques. Journal of Ambient Intelligence and Humanized Computing. 2023;14(5):4639–57.

Rana M, Mamun Q, Islam R. Lightweight cryptography in IoT networks: A survey. Future Generation Computer Systems. 2022;129:77–89.

Alexan W, Aly L, Korayem Y, Gabr M, El-Damak D, Fathy A, et al. Secure communication of military reconnaissance images over UAV-assisted relay networks. IEEE Access. 2024;12:78589–610.

Clemente-Lopez D, de Jesus Rangel-Magdaleno J, Munoz-Pacheco JM. A lightweight chaos-based encryption scheme for IoT healthcare systems. Internet of Things. 2024;25:101032.

Yan D, Liu Y, Li L, Lin X, Guo L. Remora optimization algorithm with enhanced randomness for large-scale measurement field deployment technology. Entropy. 2023;25(3):450.

Urooj S, Lata S, Ahmad S, Mehfuz S, Kalathil S. Cryptographic data security for reliable wireless sensor network. Alexandria Engineering Journal. 2023;72:37–50.

Ullah S, Zheng J, Din N, Hussain MT, Ullah F, Yousaf M. Elliptic Curve Cryptography; Applications, challenges, recent advances, and future trends: A comprehensive survey. Computer Science Review. 2023;47:100530.

Cecchinato N, Toma A, Drioli C, Oliva G, Sechi G, Foresti GL. Secure real-time multimedia data transmission from low-cost UAVs with a lightweight AES encryption. IEEE communications Magazine. 2023;61(5):160–5.

Elsadek I, Aftabjahani S, Gardner D, MacLean E, Wallrabenstein JR, Tawfik EY, editors. Hardware and energy efficiency evaluation of nist lightweight cryptography standardization finalists. 2022 IEEE International Symposium on Circuits and Systems (ISCAS) IEEE, 133–137; 2022: IEEE.

Creative Commons License

This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.

Copyright (c) 2025 Journal of Cyber Security and Mobility

Downloads

Download data is not yet available.