A Case Study of the Salsa20 Encryption Algorithm Using Random Noisy Injection Enhanced by Artificial Intelligence
Abstract
Summary
The loss of digital data can have severe financial consequences for organisations. This situation can handle with a dynamic encryption approach, which it can generate multiple ciphertexts from a single plaintext. This paper delves into the intersection of artificial intelligence, random noisy schemes, and cybersecurity, analyzing several critical aspects of this emerging field. The application of random noisy scheme to ciphertext, it has been suggested as a means of enhancing cybersecurity, with recent studies indicating that this approach can be effective against cybercriminals. The objective of this research was focused on applying random noisy strategy on ciphertext of the Salsa20 encryption algorithm, as this area remains unexplored. Given the promising results of random noisy strategies, organisations that they employ Salsa20 may benefit from this approach. This research is important because recent experiments have revealed the effectiveness of using artificial intelligence for noisy injection on ciphertext. Therefore, is here presented a new opportunity for organisations regarding the employment of the novel random noisy Salsa20 encryption alternative because the experimental results have shown an increasing of the dynamic performance on ciphertext. This work introduces the random noisy Salsa20 strategy as a novel dynamic encryption alternative, and comparison of the performance to four random noisy schemes based on DES, 3DES, AES-256, and Blowfish algorithms. In conclusion, the novel alternative that it is here recommended, it can be difficult for the cybercriminals to decrypt.
Keywords: Applications of AI, cryptography, dynamic encryption methods, noisy injection strategies.
Downloads
References
[1] B. Delman, "Genetic Algorithms in Cryptography". M.S. thesis [Thesis for the Degree of Master of Science in Computer Engineering], Department of Computer Engineering, Rochester Institute of Technology, RIT Scholar Works, Rochester, New York, 2004.(https://scholar.google.com.mx/scholar_url?url=https://repository.rit.edu/cgi/viewcontent.cgi%3Farticle%3D6460%26context%3Dtheses&hl=es&sa=X&ei=cbaZZoadNt246rQPnd604AU&scisig=AFWwaeaMfCM5ORUFQN6DU4LA3aEG&oi=scholarr, 23/03/2024).
[2] S. Kalsi, H. Kaur, and V. Chang, "DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation", Convergence of Deep Machine Learning and Nature Inspired Computing Paradigms for Medical Informatics, Image and Signal Processing, in Journal of Medical Systems, [e-ISSN: 1573-689X], vol. 42, no. 17, december, 2018. DOI: https://doi.org/10.1007/s10916-017-0851-z.
[3] J.C. Mendoza, "Demostración De Cifrado Simetrico Y Asimétrico", [Universidad Politécnica Salesian. Cuenca, Ecuador. ISSN: 1390-650X], Ingenius, Revista de Ciencia y Tecnología, núm. 3, 2008, pp. 46-53. (http://www.redalyc.org/articulo.oa?id=505554806007, 09/11/2024).
[4] E. Rangel, and K.U. Rangel, "Novel Random Encryption Methods Based On Mutation Strategies Of Artificial Intelligence", SPCSJ: Scientific and Practical Cyber Security Journal [Published by Scientific Cyber Security Association in Tbilisi, Georgia], ISSN: 2587-4667, vol. 8, no. 3, pp. 84-91, september issue 2024. (https://journal.scsa.ge/ issue/september-2024/, 05/11/2024).
[5] E. Rangel, K.U. Rangel, and L. González, "Dynamic Encryption Methods Based On Noisy Injection And Camouflaging Ciphertext Strategies With Artificial Intelligence". SPCSJ, Scientific and Practical Cyber Security Journal [Published by Scientific Cyber Security Association in Tbilisi, Georgia, ISSN: 2587–4667], vol. 9, no. 1, pp. 82-104, march issue 2025. (https://journal.scsa.ge/papers/dynamic-encryption-methods-based-on-noisy-injection-and-camoufla ging-ciphertext-strategies-with-artificial-intelligence/, 23/04/2025).
[6] E. Rangel, K.U. Rangel, and L. González, "Inyección De Ruido Para Encriptado De Datos Dinámico Con Inteligencia Artificial. Caso De Estudio: Algoritmo GOST R 34.12-2015", Revista Electrónica de Divulgación de la Investigación del SABES [Revista de la universidad del SABES, Editada por Sistema Avanzado de Bachillerato y Educación Superior en el Estado de Guanajuato. México, ISSN: 2007-3542], vol. 29, edición junio — 2025, in press. (https://sabes.edu.mx/revista-electronica/, 11/07/2025).
[7] E. Rangel, and K.U.Rangel, "Mejorando la seguridad del algoritmo Camellia, mediante la inyección de ruido sobre textos cifrados utilizando procesos basados en inteligencia artificial", INTELETICA, Revista de Inteligencia Artificial, Ética y Sociedad [Edited & Published by IBERAMIA, Iberoamerican Society of Artificial Intelligence – Sociedad Iberoamericana de Inteligencia Artificial in Valencia, España, ISSN: 3020-7444], vol. 2, no. 3, june issue, Manuscript in review, 2025, unpublished. (https://inteletica.iberamia.org/index.php/journal/workflow/access/45, 05/07/2025).
[8] E. Rangel, K.U. Rangel, L. González, A. Ortiz, and C.A. Rodríguez, "Four Dynamic Encryption Alternatives With Artificial Intelligence Based On Pseudo-Hexadecimal Noisy Injection Schema For Handling The Theft Of Digital Data Problem", SPCSJ, Scientific and Practical Cyber Security Journal [Edited by SCSA - SPCSJ - BOAI, Published by Scientific Cyber Security Association in Tbilisi, Georgia, e-ISSN: 2587-4667], vol. 9, no. 3, pp. 59-77, june 2025, https://journal.scsa.ge/issue/june-2025/, (https://journal.scsa.ge/papers/four-dynamic-encryption-alternatives-with-artificial-intelligence-based-on-pseudo-hexadecimal-noisy-injection-schema-for-handling-the-theft-of-digital-data-problem/, 27/07/2025).
[9] E. Rangel, K.U. Rangel, J. Medrano, C.A. Bernal, and L. González, "Algoritmo Genético Para Cifrado De Datos, Basado En Un Nuevo Concepto Pseudo-Hexadecimal Con Inteligencia Artificial", Tecnológico Nacional De México, Instituto Tecnológico de Ciudad Altamirano, Sexto (VI) Congreso Nacional De Investigación En Ciencia E Innovación De Tecnologías Productivas, Cd. Altamirano, Estado De Guerrero, México. Noviembre, 2023. (https://www.cdaltamirano.tecnm.mx/index.php/17-vi-congreso-nacional-de-investigacion-en-ciencia-e-innovacion-de-tecnologias-productivas/140-tecnm-40, 23/03/2024).
[10] E. Rangel, K.U. Rangel, and L. González, "Cifrado De Datos Dinámico Con Inteligencia Artificial, Utilizando El Nuevo Formato Pseudo-Hexadecimal", Revista Electrónica de Divulgación de la Investigación del SABES [Revista de la Universidad del SABES, Editada por Sistema Avanzado de Bachillerato y Educación Superior en el Estado de Guanajuato. México, ISSN: 2007-3542], vol. 28, edición diciembre, 2024. (https://sabes.edu.mx/revista-electronica/27/# , 17/12/2024).
[11] E. Rangel, and K.U. Rangel, "La Regla Del Vecino Más Cercano Como Alternativa Para Inyectar Ruido A Mensajes Encriptados Por El Algoritmo: Noised Random Hexadecimal", INTELETICA, Revista de Inteligencia Artificial, Ética y Sociedad [Editado por IBERAMIA, Iberoamerican Society of Artificial Intelligence – Sociedad Iberoamericana de Inteligencia Artificial, España, ISSN: 3020-7444], vol. 1, num. 2, Dec. 2024, pp. 1–15, (https://inteletica.iberamia.org/index.php/journal/article/view/16, 23/03/2025).
[12] D. Álvarez, "Algunos Aspectos Jurídicos Del Cifrado De Comunicaciones", Derecho PUCP [Pontificia Universidad Católica del Perú], núm. 83, 2019, pp. 241-264, 2019. DOI: https://doi.org/10.18800/derechopucp.201902.008, (http://www.redalyc.org/articulo.oa?id=533662765008, 09/11/2024).
[13] F. Barranco, and C. Galindo, "Criptografía básica y algunas aplicaciones". Universidad Jaume I, Departamento de Matemáticas, Castellón, España, octubre, 2022. URI: http://hdl.handle.net/10234/ 201359, (https://repositori.uji.es/items/35da2f29-ee4a-4dbc-a82f-c450a81cf9be,13/04/2025).
[14] S. Gómez, J.D. Arias, and D. Agudelo, "Cripto-Análisis Sobre Métodos Clásicos De Cifrado". Scientia Et Technica, [Universidad Tecnológica de Pereira Pereira, Colombia, ISSN: 0122-1701, Año: XVII], vol. 2, no. 50, pp. 97-102, abril 2012, DOI: https://doi.org/10.22517/23447214.6681, (https://revistas.utp.edu.co/index.php/revistaciencia/article/view/6681, 16/04/2025).
[15] B. Javidi, and J.L. Horner, "Optical Pattern Recognition for Validation and Security Verification", Optical Engineering [ISSN: 0091-3286], vol. 33, issue: 6, pp. 1752-1756, june, 1994, DOI: https://doi.org/10.1117/12.170736,(https://www.spiedigitallibrary.org/journals/optical-engineering/volume-33/issue-6/0000/ Optical-pattern-recognition-for-validation-and-security-verification /10.1117/12.170736.short, 14/ 04/2025).
[16] B. Reddaiah, "A Study on Genetic Algorithms for Cryptography", International Journal of Computer Applications, [Department of Computer Applications, Yogi Vemana University Kadapa, A.P, India, ISSN: 0975-8887], vol. 177, no. 28, pp. 1-4, december, 2019. DOI: http://dx.doi.org/10.5120/ijca2019919509, (https://www.researchgate.net/publication/338012809_A_Study_on_Genetic_Algorithms_for_Cryptography, 23/03/2024).
[17] C. Sebas, "¿Qué son los Algoritmos Genéticos en las Inteligencias Artificiales?", Manuales y Tutoriales de Informatica, 2023. (https://aprendeinformaticas.com/ia/, 23/03/2024).
[18] S. Paul, P. Dasgupta, P. K. Naskar, and A. Chaudhuri, "Secured image encryption scheme based on DNA encoding and chaotic map". Review Of Computer Engineering Studies, [IIETA: International Information and Engineering Technology Association, ISSN: 2369-0755, e-ISSN: 2369-0763], vol. 4, no. 2, pp. 70-75, june issue, 2017. DOI: 10.18280/rces.040206, (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://iieta.org/sites/default/files/Journals/RCES/04.02_06.pdf&ved=2ahUKEwjVlYfordOMAxVVLUQIHXknBWsQFnoECB4QAQ&usg=AOvVaw3yvem4PsuKbMM9009owuAJ, 12/04/2015).
[19] R. Oppliger, "Contemporary cryptography", 1ra. ed., Artech House Computer Security Library, [Boston/London, ISBN: 1-58053-642-5, 978-8189265038], 510p, 2005. (https://www.google.com/ url?sa=t&source=web&rct=j&opi=89978449&url=https://theswissbay.ch/pdf/Gentoomen%2520Library/Cryptography/Contemporary%2520Cryptography%2520-%2520Rolf%2520Oppliger.pdf&ved= 2ahUKEwiT1tm1xNWMAxUAmO4BHWYLNa0QFnoECBoQAQ&usg=AOvVaw3GvxLI6QzJhvEXqcl9efPz, 13/04/2025).
[20] D.R. Stinson, and M.B. Paterson, "Cryptography: Theory and Practice", (4ta ed.). Chapman and Hall Book/CRC Press [Taylor & Francis Group, ISBN: 978-1-1381-9701-5], 2019. (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://www.ic.unicamp.br/~rdahab/cursos/mo421-mc889/Welcome_files/Stinson-Paterson_CryptographyTheoryAnd Practice-CRC%2520Press%2520%25282019%2529.pdf&ved=2ah UKEwi8_euUtdWMAxWzh-4BHShGAaQQFnoECCUQAQ&usg=AOv Vaw1DCBGkDbaZMeHuyR45xZZC, 13/04/2025).
[21] H.C.A. Van-Tilborg, "Encyclopedia Of Cryptography And Security", TUE Research portal. Springer, pp. 114-115, 201-202, 2005. DOI: https://doi.org/10.1007/0-387-23483-7, (09/11/2024).
[22] L. Baklaga, "Leading The Way In Quantum-Resistant Cryptography For Everyday Safety". SPCSJ, Scientific and Practical Cyber Security Journal [Scientific Cyber Security Association (SCSA).Tbilisi, Georgia, ISSN: 2587-4667], vol. 8, no. 3, pp 65-73, issue 2024. (https://journal.scsa.ge/papers/leading-the-way-in-quantum-resistant-cryptography-for-everyday-safety/, 23/03/2025).
[23] R. Bavdekar, C. Eashan-Jayant, A. Ankit, and K. Tiwari, "Post Quantum Cryptography: A Review of Techniques, Challenges, and Standardizations", In 2023 International Conference on Information Networking (ICOIN), 2023.
[24] Q.H. Dang, and H.Q. Le, "Improved cryptanalysis of the RSA algorithm using side-channel attacks", Journal of Information Security and Applications, vol. 65, no. 103313, 2022.
[25] D. Luciano, and G. Prichett, "Cryptology: From Caesar Ciphers To Public-key Cryptosystems". The College Mathematics Journal, vol. 18, pp. 2-17, 1987. (http://www.jstor.org/stable/2686311, 06/06/2025).
[26] M.S. Rahman, and M.S. Hossain, "A Secure Private Key Cryptography Scheme Using RSA and AES". Journal of Cybersecurity, 1(1), 2021, pp. 1-9.
[27] J. Rodríguez, "Operadores Genéticos Aplicados A La Criptografía Simétrica", [Proyecto De Grado], Universidad Distrital Francisco José De Caldas. Facultad De Ingeniería. Ingeniería De Sistemas. Bogotá, Colombia, 2020. (https://repository.udistrital.edu.co/ handle/11349/28192, 06/05/2024).
[28] M. Baker, and J. Schiller, "ECIES: Elliptic Curve Integrated Encryption Scheme", In Cryptography and Network Security, Springer, pp. 245-263, 2015. (https://medium.com/asecuritysite-when-bob-met-alice/elliptic-curve-integrated-encryption-scheme-ecies-encrypting-using-elliptic-curves-dc8d0b87eaa, 23/03/2025).
[29] D. Hankerson, J.L. Hernandez, and A.J. Menezes, "Software implementation of elliptic curve cryptography over binary fields", Springer-Verlag Berlin Heidelberg 2000, [K. Ko¸c and C. Paar (Eds.) – CHES 2000, LNCS 1965], pp. 1–24, 2004. (https://idp.springer.com/authorize?response_type=cookie&client_id=springerlink&redirect_uri=https%3A%2F%2Flink.springer.com%2Fcontent%2Fpdf%2F10.1007%2F3-540-44499-8_1.pdf, 23/03/2025).
[30] P.L. Montgomery, "Speeding up the Pollard rho method", Mathematics of Computation, vol. 48, no. 177, 1987, pp. 453-456.
[31] NIST, "Special Publication 800-56A Revision 2: Recommended methods for key establishment using public key cryptography", NIST Special Publication 800-56A, 2013. (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-56ar2.pdf&ved=2ahUKEwio1eCz3KGMAxWgJ0QIHY c4BXQQFnoECBsQAQ&usg=AOvVaw367-qADImRilvhabe1UtQr), (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url =https://csrc.nist.gov/pubs/sp/800/56/a/r2/final&ved= 2ahUKEwio1eCz3KGMAxWgJ0QIHYc4BXQQFnoECBwQAQ&usg= AOvVaw183JO5CLTxYuENINrMwqgL, 23/03/2025).
[32] H.W. Dhany, F. Izhari, H. Fahmi, M. Tulus, and M. Sutarman, "Encryption and Decryption using Password Based Encryption, MD5, and DES", Published by Atlantis Press, [ISSN: 2352-5398. Open Access: CC BY-NC], 2018, license: http://creativecommons.org/licenses/by-nc/4.0/.
[33] A. Kumar, and S. Sharma, "A Study on Historical Cryptographic Techniques: Caesar Cipher to DES", International Journal of Advanced Science and Technology, 30(2), 2021, pp. 555-564.
[34] H.C. Van, and S. Jajodia, "Encyclopedia Of Cryptography And Security". Springer Science & Business Media, [ISBN: 978-14419-5907-2], 1416p, 2011.
[35] B. Schneier, "Description of a new variable-length key, 64-bit block cipher (Blowfish)", In Fast Software Encryption, 1994.
[36] B. Schneier, "Secrets and lies: Digital security in a networked world". Wiley, 2000.
[37] E.A. AL-Maqtari, and E.A. AL-Maqtari, "Performance Evaluation for AES, Blowfish, DES, and 3DES Cryptography Algorithms", PUIRP: Partners Universal Innovative Research Publication (ISSN: 3048-586X, Tamilnadu, India), vol. 2, no. 5, pp. 86-95, october, 2024, doi: https://doi.org/10.5281/zenodo.13974870. Available at: (https://www.puirp.com/index.php/research/article/view/81, 27/04/2025).
[38] R. K. Muhammed, R.R. Aziz, A.A. Hassan, A.M. Aladdin, S.J. Saydah, T. A. Rashid, and B.A. Hassan, "Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption", Kurdistan Journal of Applied Research (Published by Sulaimani Polytechnic University, ISSN: 2411-7684), vol. 9, no. 1, pp. 52–65, may issue, 2024, doi: https://doi.org/10.24017/science.2024.1.5, URL: https://doi.org/10.48550/arXiv.2407.16274. Available at: (https://arxiv.org/abs/2407.16274, 01/06/2025).
[39] H. K. Garai, and S. Dey, "A multi-step key recovery attack on reduced round Salsa and ChaCha", Cryptologia [Taylor & Francis Group Eds., ISSN: 1558-1586], vol. 49, no. 3, pp. 252–267, june issue 3, 2024, doi: https://doi.org/10.1080/01611194.2024.2342918. (https://jackgiffin.com/main/pdfs/A-multi-step-key-recovery-attack-on-reduced-round-Salsa-and-ChaCha-Hirendra-Garai-and-Sabyasachi-Dey.pdf, 10/06/2024).
[40] A. Saini, A. Tsokanos, and R. Kirner, "CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms", The Journal of Supercomputing (e-ISSN: 1573-0484), vol. 79, pp. 12219–12237, july, 2023, doi: https://doi.org/10.1007/s11227-023-05115-4. Available at: (https://link.springer.com/article/10.1007/s11227-023-05115-4, 14/04/2025).[41] J. Daemen, and V. Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard". Springer, 2002. DOI:10.1007/978-3-662-04722-4, (23/03/2025).
[42] M. Iavich, T. Kuchukhidze, and A. Gagnidze, "Post-quantum Digital Signature Using Verkle Trees And Lattices", SPCSJ, Scientific and Practical Cyber Security Journal [SCSA, Scientific Cyber Security Association, Tbilisi, Georgia, ISSN: 2587-4667], vol. 8, no. 3, pp. 35-52, issue 2024. (https://journal.scsa.ge/issues-archive/, 23/03/2025).
[43] P. Fuegner, "Are RSA and AES Both at Risk From the Quantum Threat?", QuSecure, Inc., 2024. (https://www.qusecure.com/are-rsa-and-aes-both-at-risk-from-the-quantum-threat/#:~:text=The%20emergence%20of%20quantum%20computers,efficiently%20factoring%20large%20prime%20numbers, 2025-02-08).[44] S. Sengupta, and S. Ghosh, "Quantum Computing Encryption Threats: Why RSA and AES Are at Risk", Journal of Cryptographic Research, 2023.
[45] J. Thakur, and N. Kumar, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis", International Journal of Emerging Technology and Advanced Engineering, 2011, pp. 6-12.
[46] E. Rangel, "Vecinos Envolventes para Variantes de la Regla del Vecino más Cercano", [MSc.Thesis], Instituto Tecnológico de Toluca, Metepec, México, 2002.
[47] E. Rangel, "La Regla De Los k Vecinos Más Cercanos (k-NN) Basada En Distancia De Manhattan (City-Block) Para Mejorar La Clasificación De Patrones", In Quinto (V) Congreso Nacional De Investigación En Ciencia E Innovación De Tecnologías Productivas. Tecnológico Nacional De México, campus: Instituto Tecnológico de Cd. Altamirano, Estado De Guerrero, México, noviembre, 2022. (http://erangel.coolpage.biz/pappers/ edgarrangel2022.pdf, 06/06/2025).
[48] S. S. Iyengar, R. Kannan, and S. Ganapathi, "Inteligencia artificial y criptografía: Tendencias y desafíos", IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 2, pp. 833-844, 2021.
[49] X. Liu, and X. Wang, "Quantum cryptanalysis of lattice-based cryptographic protocols", Physical Review X, vol. 12, no. 2 (021004), 2022.
[50] A.K. Singh, P. Kumar, and R. Singh, "Aplicación de la inteligencia artificial en la criptografía: Una revisión", Journal of Intelligent Information Systems, vol. 67, no. 2, 2021, pp. 257-275.
[51] T.M. Mitchell, "Machine learning", (2ª ed.), McGraw-Hill, 2020.
[52] J. Ross-Quinlan, "C4.5: Programs for Machine Learning", Morgan Kaufmann, San Mateo, CA., 1993.
[53] S.J. Russell, and P. Norvig, "Inteligencia artificial: Un enfoque moderno", (4ª ed.), Pearson, 2020.
[54] A.K. Hartmann, "Heuristic search in graphs", Journal of Artificial Intelligence Research, vol. 68, 2020, pp. 1-33.
[55] J.S. Sánchez, F. Pla, and F. J. Ferri, "Prototype selection for the nearest neighbor rule through proximity graphs", Pattern Recognition Letters 18, 1997, pp. 507-513.
[56] L.I. Kuncheva, and L.C. Jain, "Nearest Neighbor Classifier: Simultaneous editing and feature selection", Pattern Recognition Letters, vol. 20, pp. 1149-1156, 1999.
[57] K.P. Murphy, "Probabilistic machine learning: An introduction", MIT Press, 2022.
[58] B. Reddaiah, "A Study on Pairing Functions for Cryptography", IJCA (0975-8887), vol. 149, no. 10, pp. 4-7, september, 2016.
[59] D.B. Skalak, "Prototype and Feature Selection by Sampling and Random Mutation Hill Climbing Algorithms", In ML94, Proceedings of the Eleventh International Conference on Machine Learning, [Morgan Kaufmann], pp. 293-301, 1994.
[60] A. Clark, "Modern optimisation algorithms for cryptanalysis", In Proceedings of the 1994 Second Australian and New Zealand Conference on Intelligent Information Systems, November 29 - December 2, 1994, pp. 258-262.
[61] W. Griindlingh, and J.H. Van-Vuuren, "Using Genetic Algorithms to Break a Simple Cryptographic Cipher", (submitted 2002), Retrieved March 31, 2003, unpublished. (http://dip.sun.ac.za/~vuuren/abstracts/abstr_genetic.htm).
[62] R.A.J Matthews, "The use of genetic algorithms in cryptanalysis", Cryptologia, vol. 17, no. 4, pp. 187-201, 1993.
[63] L. Bruzzone, and S.B. Serpico, "Classification of Imbalanced remote-sensing data by neural networks", Elsevier Science B.V. , [0167-8655, 97, PH S0167-8655 (97) 00109-8], 1997. DOI: https://doi.org/10.1016/S0167-8655(97)00109-8. (https://www. sciencedirect.com/science/article/abs/pii/S0167865597001098, 01/06/2025).
[64] I. Goodfellow,.Y. Bengio, and A. Courville, "Deep learning", MIT Press, 2021.
[65] R. Barandela, J.S. Sánchez, V. García, and E. Rangel, "Strategies for Learning in Class Imbalance Problems", Pattern Recognition [Rapid and Brief Comunication, Pergamon, ISBN: PII: S0031-3203(02)00257-1.0031-3203/02/], vol. 36, no. 3, pp. 849-851, 2003. DOI: https://doi.org/10.1016/S0031-3203(02)00257-1, (01/06/2025).
[66] D. Lewis, and J. Catlett, "Heterogeneous Uncertainty Sampling for Supervised Learning", Proceedings of the 11th International Conference on Machine Learning, ICML'94, [New Brunswick, New Jersey, Morgan Kaufmann], pp. 148-156, 1994.
[67] T.M. Cover, and P.E. Hart, "Nearest Neighbor Pattern Classification", IEEE Transactions on Information Theory, [e-ISSN: 1557-9654], vol. IT-13, january 1967, pp. 21-27. DOI: 10.1109/TIT.1967.1053964. (https://ieeexplore.ieee.org/abstract/document/ 1053964/, 23/03/2024).
[68] E. Rangel, and K.U. Rangel, "Novel Pseudo-Hexadecimal Encryption Strategies For Camouflaging Ciphertext Based On Nearest Neighbor With Artificial Intelligence", IJCOPI, International Journal of Combinatorial Optimization Problems and Informatics, ISSN: 2007-1558, manuscript in review since 2024. https://ijcopi.org/ojs/authorDashboard/submission/529, unpublished.
[69] Microsoft, "Descarga de software", Microsoft, 2025. (https://www.microsoft.com/es-mx/software-download, 01/06/2015).
[70] Python.org, "The Python Network", Python.org, 2024. (https://www.python.org/downloads/, 18/11/2024).
[71] Google, Android 12, "Sistema operativo para dispositivos móviles", Google, 2024. (https://www.android.com/intl/es_es/android-12/, 01/06/2025).
[72] Pydroid3 versión 7.4_arm64, "IDE for Python 3. Lenguaje de programación y compilador", Google Play Store, 2025. (https://play.google.com/store/apps/ details?id=ru.iiec.pydroid3&hl=en&pli=1, 01/06/2025).
[73] Python, Cryptography, "Cryptography 45.0.4", Python Software Foundation, 2025. (https://pypi.org/project/cryptography/, 01/06/2025).
[74] PyCryptodome, "Crypto.Cipher package. Introduction", Readthedocs.io, 2025. (https://pycryptodome.readthedocs.io/en/ latest/src/cipher/cipher.html, 30/03/2025).
[75] PyPI, "Pycryptodome 3.21.0", Python Software Foundation, 2024. (https://pypi.org/project/pycryptodome/, 13/12/2024).
References
[1] B. Delman, "Genetic Algorithms in Cryptography". M.S. thesis [Thesis for the Degree of Master of Science in Computer Engineering], Department of Computer Engineering, Rochester Institute of Technology, RIT Scholar Works, Rochester, New York, 2004.(https://scholar.google.com.mx/scholar_url?url=https://repository.rit.edu/cgi/viewcontent.cgi%3Farticle%3D6460%26context%3Dtheses&hl=es&sa=X&ei=cbaZZoadNt246rQPnd604AU&scisig=AFWwaeaMfCM5ORUFQN6DU4LA3aEG&oi=scholarr, 23/03/2024).
[2] S. Kalsi, H. Kaur, and V. Chang, "DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation", Convergence of Deep Machine Learning and Nature Inspired Computing Paradigms for Medical Informatics, Image and Signal Processing, in Journal of Medical Systems, [e-ISSN: 1573-689X], vol. 42, no. 17, december, 2018. DOI: https://doi.org/10.1007/s10916-017-0851-z.
[3] J.C. Mendoza, "Demostración De Cifrado Simetrico Y Asimétrico", [Universidad Politécnica Salesian. Cuenca, Ecuador. ISSN: 1390-650X], Ingenius, Revista de Ciencia y Tecnología, núm. 3, 2008, pp. 46-53. (http://www.redalyc.org/articulo.oa?id=505554806007, 09/11/2024).
[4] E. Rangel, and K.U. Rangel, "Novel Random Encryption Methods Based On Mutation Strategies Of Artificial Intelligence", SPCSJ: Scientific and Practical Cyber Security Journal [Published by Scientific Cyber Security Association in Tbilisi, Georgia], ISSN: 2587-4667, vol. 8, no. 3, pp. 84-91, september issue 2024. (https://journal.scsa.ge/ issue/september-2024/, 05/11/2024).
[5] E. Rangel, K.U. Rangel, and L. González, "Dynamic Encryption Methods Based On Noisy Injection And Camouflaging Ciphertext Strategies With Artificial Intelligence". SPCSJ, Scientific and Practical Cyber Security Journal [Published by Scientific Cyber Security Association in Tbilisi, Georgia, ISSN: 2587–4667], vol. 9, no. 1, pp. 82-104, march issue 2025. (https://journal.scsa.ge/papers/dynamic-encryption-methods-based-on-noisy-injection-and-camoufla ging-ciphertext-strategies-with-artificial-intelligence/, 23/04/2025).
[6] E. Rangel, K.U. Rangel, and L. González, "Inyección De Ruido Para Encriptado De Datos Dinámico Con Inteligencia Artificial. Caso De Estudio: Algoritmo GOST R 34.12-2015", Revista Electrónica de Divulgación de la Investigación del SABES [Revista de la universidad del SABES, Editada por Sistema Avanzado de Bachillerato y Educación Superior en el Estado de Guanajuato. México, ISSN: 2007-3542], vol. 29, edición junio — 2025, in press. (https://sabes.edu.mx/revista-electronica/, 11/07/2025).
[7] E. Rangel, and K.U.Rangel, "Mejorando la seguridad del algoritmo Camellia, mediante la inyección de ruido sobre textos cifrados utilizando procesos basados en inteligencia artificial", INTELETICA, Revista de Inteligencia Artificial, Ética y Sociedad [Edited & Published by IBERAMIA, Iberoamerican Society of Artificial Intelligence – Sociedad Iberoamericana de Inteligencia Artificial in Valencia, España, ISSN: 3020-7444], vol. 2, no. 3, june issue, Manuscript in review, 2025, unpublished. (https://inteletica.iberamia.org/index.php/journal/workflow/access/45, 05/07/2025).
[8] E. Rangel, K.U. Rangel, L. González, A. Ortiz, and C.A. Rodríguez, "Four Dynamic Encryption Alternatives With Artificial Intelligence Based On Pseudo-Hexadecimal Noisy Injection Schema For Handling The Theft Of Digital Data Problem", SPCSJ, Scientific and Practical Cyber Security Journal [Edited by SCSA - SPCSJ - BOAI, Published by Scientific Cyber Security Association in Tbilisi, Georgia, e-ISSN: 2587-4667], vol. 9, no. 3, pp. 59-77, june 2025, https://journal.scsa.ge/issue/june-2025/, (https://journal.scsa.ge/papers/four-dynamic-encryption-alternatives-with-artificial-intelligence-based-on-pseudo-hexadecimal-noisy-injection-schema-for-handling-the-theft-of-digital-data-problem/, 27/07/2025).
[9] E. Rangel, K.U. Rangel, J. Medrano, C.A. Bernal, and L. González, "Algoritmo Genético Para Cifrado De Datos, Basado En Un Nuevo Concepto Pseudo-Hexadecimal Con Inteligencia Artificial", Tecnológico Nacional De México, Instituto Tecnológico de Ciudad Altamirano, Sexto (VI) Congreso Nacional De Investigación En Ciencia E Innovación De Tecnologías Productivas, Cd. Altamirano, Estado De Guerrero, México. Noviembre, 2023. (https://www.cdaltamirano.tecnm.mx/index.php/17-vi-congreso-nacional-de-investigacion-en-ciencia-e-innovacion-de-tecnologias-productivas/140-tecnm-40, 23/03/2024).
[10] E. Rangel, K.U. Rangel, and L. González, "Cifrado De Datos Dinámico Con Inteligencia Artificial, Utilizando El Nuevo Formato Pseudo-Hexadecimal", Revista Electrónica de Divulgación de la Investigación del SABES [Revista de la Universidad del SABES, Editada por Sistema Avanzado de Bachillerato y Educación Superior en el Estado de Guanajuato. México, ISSN: 2007-3542], vol. 28, edición diciembre, 2024. (https://sabes.edu.mx/revista-electronica/27/# , 17/12/2024).
[11] E. Rangel, and K.U. Rangel, "La Regla Del Vecino Más Cercano Como Alternativa Para Inyectar Ruido A Mensajes Encriptados Por El Algoritmo: Noised Random Hexadecimal", INTELETICA, Revista de Inteligencia Artificial, Ética y Sociedad [Editado por IBERAMIA, Iberoamerican Society of Artificial Intelligence – Sociedad Iberoamericana de Inteligencia Artificial, España, ISSN: 3020-7444], vol. 1, num. 2, Dec. 2024, pp. 1–15, (https://inteletica.iberamia.org/index.php/journal/article/view/16, 23/03/2025).
[12] D. Álvarez, "Algunos Aspectos Jurídicos Del Cifrado De Comunicaciones", Derecho PUCP [Pontificia Universidad Católica del Perú], núm. 83, 2019, pp. 241-264, 2019. DOI: https://doi.org/10.18800/derechopucp.201902.008, (http://www.redalyc.org/articulo.oa?id=533662765008, 09/11/2024).
[13] F. Barranco, and C. Galindo, "Criptografía básica y algunas aplicaciones". Universidad Jaume I, Departamento de Matemáticas, Castellón, España, octubre, 2022. URI: http://hdl.handle.net/10234/ 201359, (https://repositori.uji.es/items/35da2f29-ee4a-4dbc-a82f-c450a81cf9be,13/04/2025).
[14] S. Gómez, J.D. Arias, and D. Agudelo, "Cripto-Análisis Sobre Métodos Clásicos De Cifrado". Scientia Et Technica, [Universidad Tecnológica de Pereira Pereira, Colombia, ISSN: 0122-1701, Año: XVII], vol. 2, no. 50, pp. 97-102, abril 2012, DOI: https://doi.org/10.22517/23447214.6681, (https://revistas.utp.edu.co/index.php/revistaciencia/article/view/6681, 16/04/2025).
[15] B. Javidi, and J.L. Horner, "Optical Pattern Recognition for Validation and Security Verification", Optical Engineering [ISSN: 0091-3286], vol. 33, issue: 6, pp. 1752-1756, june, 1994, DOI: https://doi.org/10.1117/12.170736,(https://www.spiedigitallibrary.org/journals/optical-engineering/volume-33/issue-6/0000/ Optical-pattern-recognition-for-validation-and-security-verification /10.1117/12.170736.short, 14/ 04/2025).
[16] B. Reddaiah, "A Study on Genetic Algorithms for Cryptography", International Journal of Computer Applications, [Department of Computer Applications, Yogi Vemana University Kadapa, A.P, India, ISSN: 0975-8887], vol. 177, no. 28, pp. 1-4, december, 2019. DOI: http://dx.doi.org/10.5120/ijca2019919509, (https://www.researchgate.net/publication/338012809_A_Study_on_Genetic_Algorithms_for_Cryptography, 23/03/2024).
[17] C. Sebas, "¿Qué son los Algoritmos Genéticos en las Inteligencias Artificiales?", Manuales y Tutoriales de Informatica, 2023. (https://aprendeinformaticas.com/ia/, 23/03/2024).
[18] S. Paul, P. Dasgupta, P. K. Naskar, and A. Chaudhuri, "Secured image encryption scheme based on DNA encoding and chaotic map". Review Of Computer Engineering Studies, [IIETA: International Information and Engineering Technology Association, ISSN: 2369-0755, e-ISSN: 2369-0763], vol. 4, no. 2, pp. 70-75, june issue, 2017. DOI: 10.18280/rces.040206, (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://iieta.org/sites/default/files/Journals/RCES/04.02_06.pdf&ved=2ahUKEwjVlYfordOMAxVVLUQIHXknBWsQFnoECB4QAQ&usg=AOvVaw3yvem4PsuKbMM9009owuAJ, 12/04/2015).
[19] R. Oppliger, "Contemporary cryptography", 1ra. ed., Artech House Computer Security Library, [Boston/London, ISBN: 1-58053-642-5, 978-8189265038], 510p, 2005. (https://www.google.com/ url?sa=t&source=web&rct=j&opi=89978449&url=https://theswissbay.ch/pdf/Gentoomen%2520Library/Cryptography/Contemporary%2520Cryptography%2520-%2520Rolf%2520Oppliger.pdf&ved= 2ahUKEwiT1tm1xNWMAxUAmO4BHWYLNa0QFnoECBoQAQ&usg=AOvVaw3GvxLI6QzJhvEXqcl9efPz, 13/04/2025).
[20] D.R. Stinson, and M.B. Paterson, "Cryptography: Theory and Practice", (4ta ed.). Chapman and Hall Book/CRC Press [Taylor & Francis Group, ISBN: 978-1-1381-9701-5], 2019. (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://www.ic.unicamp.br/~rdahab/cursos/mo421-mc889/Welcome_files/Stinson-Paterson_CryptographyTheoryAnd Practice-CRC%2520Press%2520%25282019%2529.pdf&ved=2ah UKEwi8_euUtdWMAxWzh-4BHShGAaQQFnoECCUQAQ&usg=AOv Vaw1DCBGkDbaZMeHuyR45xZZC, 13/04/2025).
[21] H.C.A. Van-Tilborg, "Encyclopedia Of Cryptography And Security", TUE Research portal. Springer, pp. 114-115, 201-202, 2005. DOI: https://doi.org/10.1007/0-387-23483-7, (09/11/2024).
[22] L. Baklaga, "Leading The Way In Quantum-Resistant Cryptography For Everyday Safety". SPCSJ, Scientific and Practical Cyber Security Journal [Scientific Cyber Security Association (SCSA).Tbilisi, Georgia, ISSN: 2587-4667], vol. 8, no. 3, pp 65-73, issue 2024. (https://journal.scsa.ge/papers/leading-the-way-in-quantum-resistant-cryptography-for-everyday-safety/, 23/03/2025).
[23] R. Bavdekar, C. Eashan-Jayant, A. Ankit, and K. Tiwari, "Post Quantum Cryptography: A Review of Techniques, Challenges, and Standardizations", In 2023 International Conference on Information Networking (ICOIN), 2023.
[24] Q.H. Dang, and H.Q. Le, "Improved cryptanalysis of the RSA algorithm using side-channel attacks", Journal of Information Security and Applications, vol. 65, no. 103313, 2022.
[25] D. Luciano, and G. Prichett, "Cryptology: From Caesar Ciphers To Public-key Cryptosystems". The College Mathematics Journal, vol. 18, pp. 2-17, 1987. (http://www.jstor.org/stable/2686311, 06/06/2025).
[26] M.S. Rahman, and M.S. Hossain, "A Secure Private Key Cryptography Scheme Using RSA and AES". Journal of Cybersecurity, 1(1), 2021, pp. 1-9.
[27] J. Rodríguez, "Operadores Genéticos Aplicados A La Criptografía Simétrica", [Proyecto De Grado], Universidad Distrital Francisco José De Caldas. Facultad De Ingeniería. Ingeniería De Sistemas. Bogotá, Colombia, 2020. (https://repository.udistrital.edu.co/ handle/11349/28192, 06/05/2024).
[28] M. Baker, and J. Schiller, "ECIES: Elliptic Curve Integrated Encryption Scheme", In Cryptography and Network Security, Springer, pp. 245-263, 2015. (https://medium.com/asecuritysite-when-bob-met-alice/elliptic-curve-integrated-encryption-scheme-ecies-encrypting-using-elliptic-curves-dc8d0b87eaa, 23/03/2025).
[29] D. Hankerson, J.L. Hernandez, and A.J. Menezes, "Software implementation of elliptic curve cryptography over binary fields", Springer-Verlag Berlin Heidelberg 2000, [K. Ko¸c and C. Paar (Eds.) – CHES 2000, LNCS 1965], pp. 1–24, 2004. (https://idp.springer.com/authorize?response_type=cookie&client_id=springerlink&redirect_uri=https%3A%2F%2Flink.springer.com%2Fcontent%2Fpdf%2F10.1007%2F3-540-44499-8_1.pdf, 23/03/2025).
[30] P.L. Montgomery, "Speeding up the Pollard rho method", Mathematics of Computation, vol. 48, no. 177, 1987, pp. 453-456.
[31] NIST, "Special Publication 800-56A Revision 2: Recommended methods for key establishment using public key cryptography", NIST Special Publication 800-56A, 2013. (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-56ar2.pdf&ved=2ahUKEwio1eCz3KGMAxWgJ0QIHY c4BXQQFnoECBsQAQ&usg=AOvVaw367-qADImRilvhabe1UtQr), (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url =https://csrc.nist.gov/pubs/sp/800/56/a/r2/final&ved= 2ahUKEwio1eCz3KGMAxWgJ0QIHYc4BXQQFnoECBwQAQ&usg= AOvVaw183JO5CLTxYuENINrMwqgL, 23/03/2025).
[32] H.W. Dhany, F. Izhari, H. Fahmi, M. Tulus, and M. Sutarman, "Encryption and Decryption using Password Based Encryption, MD5, and DES", Published by Atlantis Press, [ISSN: 2352-5398. Open Access: CC BY-NC], 2018, license: http://creativecommons.org/licenses/by-nc/4.0/.
[33] A. Kumar, and S. Sharma, "A Study on Historical Cryptographic Techniques: Caesar Cipher to DES", International Journal of Advanced Science and Technology, 30(2), 2021, pp. 555-564.
[34] H.C. Van, and S. Jajodia, "Encyclopedia Of Cryptography And Security". Springer Science & Business Media, [ISBN: 978-14419-5907-2], 1416p, 2011.
[35] B. Schneier, "Description of a new variable-length key, 64-bit block cipher (Blowfish)", In Fast Software Encryption, 1994.
[36] B. Schneier, "Secrets and lies: Digital security in a networked world". Wiley, 2000.
[37] E.A. AL-Maqtari, and E.A. AL-Maqtari, "Performance Evaluation for AES, Blowfish, DES, and 3DES Cryptography Algorithms", PUIRP: Partners Universal Innovative Research Publication (ISSN: 3048-586X, Tamilnadu, India), vol. 2, no. 5, pp. 86-95, october, 2024, doi: https://doi.org/10.5281/zenodo.13974870. Available at: (https://www.puirp.com/index.php/research/article/view/81, 27/04/2025).
[38] R. K. Muhammed, R.R. Aziz, A.A. Hassan, A.M. Aladdin, S.J. Saydah, T. A. Rashid, and B.A. Hassan, "Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption", Kurdistan Journal of Applied Research (Published by Sulaimani Polytechnic University, ISSN: 2411-7684), vol. 9, no. 1, pp. 52–65, may issue, 2024, doi: https://doi.org/10.24017/science.2024.1.5, URL: https://doi.org/10.48550/arXiv.2407.16274. Available at: (https://arxiv.org/abs/2407.16274, 01/06/2025).
[39] H. K. Garai, and S. Dey, "A multi-step key recovery attack on reduced round Salsa and ChaCha", Cryptologia [Taylor & Francis Group Eds., ISSN: 1558-1586], vol. 49, no. 3, pp. 252–267, june issue 3, 2024, doi: https://doi.org/10.1080/01611194.2024.2342918. (https://jackgiffin.com/main/pdfs/A-multi-step-key-recovery-attack-on-reduced-round-Salsa-and-ChaCha-Hirendra-Garai-and-Sabyasachi-Dey.pdf, 10/06/2024).
[40] A. Saini, A. Tsokanos, and R. Kirner, "CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms", The Journal of Supercomputing (e-ISSN: 1573-0484), vol. 79, pp. 12219–12237, july, 2023, doi: https://doi.org/10.1007/s11227-023-05115-4. Available at: (https://link.springer.com/article/10.1007/s11227-023-05115-4, 14/04/2025).[41] J. Daemen, and V. Rijmen, "The Design of Rijndael: AES - The Advanced Encryption Standard". Springer, 2002. DOI:10.1007/978-3-662-04722-4, (23/03/2025).
[42] M. Iavich, T. Kuchukhidze, and A. Gagnidze, "Post-quantum Digital Signature Using Verkle Trees And Lattices", SPCSJ, Scientific and Practical Cyber Security Journal [SCSA, Scientific Cyber Security Association, Tbilisi, Georgia, ISSN: 2587-4667], vol. 8, no. 3, pp. 35-52, issue 2024. (https://journal.scsa.ge/issues-archive/, 23/03/2025).
[43] P. Fuegner, "Are RSA and AES Both at Risk From the Quantum Threat?", QuSecure, Inc., 2024. (https://www.qusecure.com/are-rsa-and-aes-both-at-risk-from-the-quantum-threat/#:~:text=The%20emergence%20of%20quantum%20computers,efficiently%20factoring%20large%20prime%20numbers, 2025-02-08).[44] S. Sengupta, and S. Ghosh, "Quantum Computing Encryption Threats: Why RSA and AES Are at Risk", Journal of Cryptographic Research, 2023.
[45] J. Thakur, and N. Kumar, "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis", International Journal of Emerging Technology and Advanced Engineering, 2011, pp. 6-12.
[46] E. Rangel, "Vecinos Envolventes para Variantes de la Regla del Vecino más Cercano", [MSc.Thesis], Instituto Tecnológico de Toluca, Metepec, México, 2002.
[47] E. Rangel, "La Regla De Los k Vecinos Más Cercanos (k-NN) Basada En Distancia De Manhattan (City-Block) Para Mejorar La Clasificación De Patrones", In Quinto (V) Congreso Nacional De Investigación En Ciencia E Innovación De Tecnologías Productivas. Tecnológico Nacional De México, campus: Instituto Tecnológico de Cd. Altamirano, Estado De Guerrero, México, noviembre, 2022. (http://erangel.coolpage.biz/pappers/ edgarrangel2022.pdf, 06/06/2025).
[48] S. S. Iyengar, R. Kannan, and S. Ganapathi, "Inteligencia artificial y criptografía: Tendencias y desafíos", IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 2, pp. 833-844, 2021.
[49] X. Liu, and X. Wang, "Quantum cryptanalysis of lattice-based cryptographic protocols", Physical Review X, vol. 12, no. 2 (021004), 2022.
[50] A.K. Singh, P. Kumar, and R. Singh, "Aplicación de la inteligencia artificial en la criptografía: Una revisión", Journal of Intelligent Information Systems, vol. 67, no. 2, 2021, pp. 257-275.
[51] T.M. Mitchell, "Machine learning", (2ª ed.), McGraw-Hill, 2020.
[52] J. Ross-Quinlan, "C4.5: Programs for Machine Learning", Morgan Kaufmann, San Mateo, CA., 1993.
[53] S.J. Russell, and P. Norvig, "Inteligencia artificial: Un enfoque moderno", (4ª ed.), Pearson, 2020.
[54] A.K. Hartmann, "Heuristic search in graphs", Journal of Artificial Intelligence Research, vol. 68, 2020, pp. 1-33.
[55] J.S. Sánchez, F. Pla, and F. J. Ferri, "Prototype selection for the nearest neighbor rule through proximity graphs", Pattern Recognition Letters 18, 1997, pp. 507-513.
[56] L.I. Kuncheva, and L.C. Jain, "Nearest Neighbor Classifier: Simultaneous editing and feature selection", Pattern Recognition Letters, vol. 20, pp. 1149-1156, 1999.
[57] K.P. Murphy, "Probabilistic machine learning: An introduction", MIT Press, 2022.
[58] B. Reddaiah, "A Study on Pairing Functions for Cryptography", IJCA (0975-8887), vol. 149, no. 10, pp. 4-7, september, 2016.
[59] D.B. Skalak, "Prototype and Feature Selection by Sampling and Random Mutation Hill Climbing Algorithms", In ML94, Proceedings of the Eleventh International Conference on Machine Learning, [Morgan Kaufmann], pp. 293-301, 1994.
[60] A. Clark, "Modern optimisation algorithms for cryptanalysis", In Proceedings of the 1994 Second Australian and New Zealand Conference on Intelligent Information Systems, November 29 - December 2, 1994, pp. 258-262.
[61] W. Griindlingh, and J.H. Van-Vuuren, "Using Genetic Algorithms to Break a Simple Cryptographic Cipher", (submitted 2002), Retrieved March 31, 2003, unpublished. (http://dip.sun.ac.za/~vuuren/abstracts/abstr_genetic.htm).
[62] R.A.J Matthews, "The use of genetic algorithms in cryptanalysis", Cryptologia, vol. 17, no. 4, pp. 187-201, 1993.
[63] L. Bruzzone, and S.B. Serpico, "Classification of Imbalanced remote-sensing data by neural networks", Elsevier Science B.V. , [0167-8655, 97, PH S0167-8655 (97) 00109-8], 1997. DOI: https://doi.org/10.1016/S0167-8655(97)00109-8. (https://www. sciencedirect.com/science/article/abs/pii/S0167865597001098, 01/06/2025).
[64] I. Goodfellow,.Y. Bengio, and A. Courville, "Deep learning", MIT Press, 2021.
[65] R. Barandela, J.S. Sánchez, V. García, and E. Rangel, "Strategies for Learning in Class Imbalance Problems", Pattern Recognition [Rapid and Brief Comunication, Pergamon, ISBN: PII: S0031-3203(02)00257-1.0031-3203/02/], vol. 36, no. 3, pp. 849-851, 2003. DOI: https://doi.org/10.1016/S0031-3203(02)00257-1, (01/06/2025).
[66] D. Lewis, and J. Catlett, "Heterogeneous Uncertainty Sampling for Supervised Learning", Proceedings of the 11th International Conference on Machine Learning, ICML'94, [New Brunswick, New Jersey, Morgan Kaufmann], pp. 148-156, 1994.
[67] T.M. Cover, and P.E. Hart, "Nearest Neighbor Pattern Classification", IEEE Transactions on Information Theory, [e-ISSN: 1557-9654], vol. IT-13, january 1967, pp. 21-27. DOI: 10.1109/TIT.1967.1053964. (https://ieeexplore.ieee.org/abstract/document/ 1053964/, 23/03/2024).
[68] E. Rangel, and K.U. Rangel, "Novel Pseudo-Hexadecimal Encryption Strategies For Camouflaging Ciphertext Based On Nearest Neighbor With Artificial Intelligence", IJCOPI, International Journal of Combinatorial Optimization Problems and Informatics, ISSN: 2007-1558, manuscript in review since 2024. https://ijcopi.org/ojs/authorDashboard/submission/529, unpublished.
[69] Microsoft, "Descarga de software", Microsoft, 2025. (https://www.microsoft.com/es-mx/software-download, 01/06/2015).
[70] Python.org, "The Python Network", Python.org, 2024. (https://www.python.org/downloads/, 18/11/2024).
[71] Google, Android 12, "Sistema operativo para dispositivos móviles", Google, 2024. (https://www.android.com/intl/es_es/android-12/, 01/06/2025).
[72] Pydroid3 versión 7.4_arm64, "IDE for Python 3. Lenguaje de programación y compilador", Google Play Store, 2025. (https://play.google.com/store/apps/ details?id=ru.iiec.pydroid3&hl=en&pli=1, 01/06/2025).
[73] Python, Cryptography, "Cryptography 45.0.4", Python Software Foundation, 2025. (https://pypi.org/project/cryptography/, 01/06/2025).
[74] PyCryptodome, "Crypto.Cipher package. Introduction", Readthedocs.io, 2025. (https://pycryptodome.readthedocs.io/en/ latest/src/cipher/cipher.html, 30/03/2025).
[75] PyPI, "Pycryptodome 3.21.0", Python Software Foundation, 2024. (https://pypi.org/project/pycryptodome/, 13/12/2024).
Copyright (c) 2026 Innovation and Software

This work is licensed under a Creative Commons Attribution 4.0 International License.
The authors exclusively grant the right to publish their article to the Innovation and Software Journal, which may formally edit or modify the approved text to comply with their own editorial standards and with universal grammatical standards, prior to publication; Likewise, our journal may translate the approved manuscripts into as many languages as it deems necessary and disseminates them in several countries, always giving public recognition to the author or authors of the research.











