Abstract—Information security plays a major role in case of secured data transmission. In this paper some intelligent techniques have been pointed out regarding effective cipher generation based on SKEY, interlock protocol and SKID. We have also cited cryptosystems based on linear property of propositional operator, the concept of fuzzy logic, optimized function and concept of data mining based on comparison analysis. Various proposed techniques have also been pointed out for shared key evalution in multi-party communication and the areas concerned are shared key generation based on support rule, cent percent confidence rule, minimal frequent set and sequence mining and feature-based method.
Index Terms—SKEY, Interlock protocol, SKID, propositional operator, fuzzy logic, comparison analysis, optimized function, shared key generation
P. Chakrabarti is with Computer Science and Engineering department, Bengal Institute of Technology and Management , Bolpur-731236, West Bengal, India
Cite: P. Chakrabarti, "Information Security: An Artificial Intelligence and Data Mining Based Approach," International Journal of Engineering and Technology vol. 1, no. 5, pp. 448-453, 2009.