The Effect of Mutation Operation on GP- based Stream Ciphers Design Algorithm

Wasan Shakr Awad

2013

Abstract

Mutation operation is used to introduce a small perturbation in the population from time to time so as to maintain its diversity. Several mutation operations have been developed for genetic programming. This paper is to study the impact of mutation operation on the performance of genetic programming. We present six types of mutation operations that have been applied in the simulated annealing programming (SAP) algorithm, which is an algorithm used to design stream ciphers using genetic programming and simulated annealing. Experiments performed to study the effectiveness of these operations in solving the underlying problem. It has been shown that mutation operation can affect the performance of genetic programming, especially when it is used to solve complex problems.

References

  1. Angeline, p. j.; 1996. An investigation into the sensitivity of genetic programming to the frequency of leaf selection during subtree crossover. In Proceedings of the First Annual Conference on Genetic Programming. Stanford University, CA, USA. PP 21-29.
  2. Awad, W. S.; 2011. Designing stream cipher systems using GP. LNCS, Vol. 6683, PP. 308-320.
  3. Banzhaf, W., Francone, F. D., and Nordin, N.; 1996. The effect of extensive use of the mutation operator on generalization in genetic programming using sparse data sets. LNCS, Vol. 1141, PP. 300-309.
  4. Forouzan, B. A.; 2008. Cryptography and network security. McGRAW-HILL, New York, USA.
  5. Golomb, S. W.; 1967. Shift Register Sequence. HoldenDay, San Francisco, USA.
  6. Kinnear, K. E.; 1994. Fitness landscapes and difficulty in genetic programming. In Proceedings of the IEEE World Conference on Computational Intelligence. Vol. 1, PP. 142-147.
  7. Kirkpatrik, S., et al.; 1983. Optimization by simulated annealing. Science, 220(4598), 671-680.
  8. Koza, J. R.; 1992. Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press.
  9. Koza, J. R.; 1994. Genetic Programming II: Automatic Discovery of Reusable Programs. MIT Press.
  10. Koza, J. R., F. H. B., Andre, D., and Keane, M. A.; 1999. Genetic Programming III: Darwinian Invention and Problem Solving. Morgan Kaufmann Press.
  11. Luke, S., and Spector, L.; 1997. A comparison of crossover and mutation in genetic programming. In Proceedings of the Second Annual Conference on Genetic Programming. Morgan Kaufmann, PP. 240- 248.
  12. Miki, M., Hashimoto, M., and Fujita, Y.; 2007. Program Search with Simulated Annealing. In Proceeding of the 9th Annual Conference on Genetic and Evolutionary Computation. PP. 1754 - 1754.
  13. Nguyen Quang Uy, Nguyen Xuan Hoai, and Michael O'Neill; 2009. Semantics based mutation in genetic programming: the case for real-valued symbolic regression. In Mendel09, 15th International Conference on Soft Computing. PP. 73-91.
  14. O'Reilly, U.; 1995. An Analysis of Genetic Programming. PhD thesis, Carleton University, Ottawa-Carleton Institute for Computer Science, Ottawa, Ontario, Canada.
  15. Poli, R., and Langdon, W. B.; 1997. Genetic programming with one-point crossover. In Soft omputing in Engineering Design and Manufacturing. SpringerVerlag, PP. 180-189.
  16. Rueppel, R. A.; 1986. Analysis and Design of Stream Cipher. Springer-Verlag.
  17. Schneier, B.; 1996. Applied cryptography. John Wiley and Sons.
  18. Yuichiro, U., Mitsunori, and M., Tomoyuki H.; 2009. Simulated Annealing Programming Using Effective Subtrees. Doshisha Daigaku Rikogaku Kenkyu Hokoku, 49(4), 205-209.
Download


Paper Citation


in Harvard Style

Shakr Awad W. (2013). The Effect of Mutation Operation on GP- based Stream Ciphers Design Algorithm . In Proceedings of the 5th International Conference on Agents and Artificial Intelligence - Volume 2: ICAART, ISBN 978-989-8565-39-6, pages 445-450. DOI: 10.5220/0004222804450450


in Bibtex Style

@conference{icaart13,
author={Wasan Shakr Awad},
title={The Effect of Mutation Operation on GP- based Stream Ciphers Design Algorithm},
booktitle={Proceedings of the 5th International Conference on Agents and Artificial Intelligence - Volume 2: ICAART,},
year={2013},
pages={445-450},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004222804450450},
isbn={978-989-8565-39-6},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 5th International Conference on Agents and Artificial Intelligence - Volume 2: ICAART,
TI - The Effect of Mutation Operation on GP- based Stream Ciphers Design Algorithm
SN - 978-989-8565-39-6
AU - Shakr Awad W.
PY - 2013
SP - 445
EP - 450
DO - 10.5220/0004222804450450