NOVEL DYNAMIC CAST-128 ENCRYPTION SCHEME AND COMPARISON WITH FIVE RANDOM NOISY INJECTION STRATEGIES WITH ARTIFICIAL INTELLIGENCE

Authors: Rangel-Lugo, Edgar, Rangel-Ríos, Kevin Uriel, González-Vidales, Leonel, Bernal-Beltrán, Carlos Alberto, Ascencio-Antúnez, Lucero De Jesús, Reynoso-Andrés, Rosa Isabel and Rodríguez-Torres, César Del Ángel
Affiliation: Tecnológico Nacional de México

Category:

Keywords: Random noisy strategies, dynamic encryption methods, applications of AI, cybersecurity strategies
ABSTRACT. The cyberattack's issue is receiving growing attention. The loss and theft of digital data, they are derived consequences of this type of problem. Digital data theft poses a significant risk to an organisation's financial well-being. Dynamic encryption methods can handle this situation effectively, due to that they produce distinct ciphertexts for the same unique plaintext inputs. In this paper, several aspects related to this subject, they are studied. Our aim is focused on cybersecurity strategies, which they use the random noisy schemes with artificial intelligence (AI). This new approach involves injecting noise into ciphertext. These alternatives are well known as random noisy strategies. This study is a future work on random noisy strategies because it was observed that they have not been experimented with the CAST-128 encryption algorithm on ciphertext. This limitation is not ideal for organisations, particularly those that they have opted for the employment of CAST-128 algorithm. Besides, in this work, experimental results have shown that standard CAST-128 encryption algorithm, it can obtain dynamic ciphertext outputs. Hence, is presented here a new opportunity for organisations regarding the employment of the CAST-128 based on noisy injection methodology. This novel definition, named here as the random noisy CAST-128 strategy. It is introduced as a dynamic data encryption alternative. Finally, a comparison of results with five random noisy strategies based on DES, 3DES, AES-256, CAST-128, and Blowfish algorithms, they are also presented because these strategies here recommended, they can be resistant to decryption by cybercriminals and even by quantum computing algorithms.

References:

Delman, B. 2004. "Genetic Algorithms in Cryptography". M.S. thesis [Thesis for the Degree of Master of Science in Computer Engineering], Department of Computer Engineering, Rochester Institute of Technology, RIT Scholar Works, Rochester, New York. (https://scholar.google.com.mx/scholar_url?url=https://repository.rit.edu/cgi/viewcontent.cgi%3Farticle%3D6460%26context%3Dtheses&hl=es&sa=X&ei=cbaZZoadNt246rQPnd604AU&scisig=AFWwaeaMfCM5ORUFQN6DU4LA3aEG&oi=scholarr, 23/03/2024).
Kalsi, S., Kaur, H., and Chang, V. 2018. "DNA Cryptography and Deep Learning using Genetic Algorithm with NW algorithm for Key Generation", Convergence of Deep Machine Learning and Nature Inspired Computing Paradigms for Medical Informatics, Image and Signal Processing, in Journal of Medical Systems, [e-ISSN: 1573-689X], vol. 42, no. 17, december. DOI: https://doi.org/10.1007/s10916-017-0851-z.
Mendoza, J.C. 2008. "Demostración De Cifrado Simetrico Y Asimétrico", [Universidad Politécnica Salesian. Cuenca, Ecuador. ISSN: 1390-650X], Ingenius, Revista de Ciencia y Tecnología, núm. 3, pp. 46-53. (http://www.redalyc.org/articulo.oa?id=505554806007, 09/11/2024).
Rangel, E., and Rangel, K.U. 2024. "Novel Random Encryption Methods Based On Mutation Strategies Of Artificial Intelligence", SPCSJ: Scientific and Practical Cyber Security Journal [Published by Scientific Cyber Security Association in Tbilisi, Georgia], ISSN: 2587-4667, vol. 8, no. 3, pp. 84-91, september issue. (https://journal.scsa.ge/ issue/september-2024/, 05/11/2024).
Rangel, E., Rangel, K.U., and González, L. 2025. "Dynamic Encryption Methods Based On Noisy Injection And Camouflaging Ciphertext Strategies With Artificial Intelligence". SPCSJ, Scientific and Practical Cyber Security Journal [Published by Scientific Cyber Security Association in Tbilisi, Georgia, ISSN: 2587–4667], vol. 9, no. 1, pp. 82-104, march issue. (https://journal.scsa.ge/papers/dynamic-encryption-methods-based-on-noisy-injection-and-camoufla ging-ciphertext-strategies-with-artificial-intelligence/, 23/04/2025).
Rangel, E., Rangel, K.U., and González, L. 2025. "Inyección De Ruido Para Encriptado De Datos Dinámico Con Inteligencia Artificial. Caso De Estudio: Algoritmo GOST R 34.12-2015", Revista Electrónica de Divulgación de la Investigación del SABES [Revista de la universidad del SABES, Editada por Sistema Avanzado de Bachillerato y Educación Superior en el Estado de Guanajuato. México, ISSN: 2007-3542], vol. 29, edición junio, in press. (https://sabes.edu.mx/revista-electronica/, 11/07/2025).
Rangel, E., and Rangel, K.U. 2025. "Mejorando la seguridad del algoritmo Camellia, mediante la inyección de ruido sobre textos cifrados utilizando procesos basados en inteligencia artificial", INTELETICA, Revista de Inteligencia Artificial, Ética y Sociedad [Edited & Published by IBERAMIA, Iberoamerican Society of Artificial Intelligence – Sociedad Iberoamericana de Inteligencia Artificial in Valencia, España, ISSN: 3020-7444], vol. 2, no. 3, june issue, Manuscript in review, unpublished. (https://inteletica.iberamia.org/index.php/journal/workflow/access/45, 05/07/2025).
Rangel, E., Rangel, K.U., González, L., Ortiz, A., and Rodríguez, C.A. 2025. "Four Dynamic Encryption Alternatives With Artificial Intelligence Based On Pseudo-Hexadecimal Noisy Injection Schema For Handling The Theft Of Digital Data Problem", SPCSJ, Scientific and Practical Cyber Security Journal [Edited by SCSA - SPCSJ - BOAI, Published by Scientific Cyber Security Association in Tbilisi, Georgia, e-ISSN: 2587-4667], vol. 9, no. 3, pp. 59-77, june. https://journal.scsa.ge/issue/june-2025/, (https://journal.scsa.ge/papers/four-dynamic-encryption-alternatives-with-artificial-intelligence-based-on-pseudo-hexadecimal-noisy-injection-schema-for-handling-the-theft-of-digital-data-problem/, 27/07/2025).
Rangel, E., Rangel, K.U., Medrano, J., Bernal, C.A., and González, L. 2023. "Algoritmo Genético Para Cifrado De Datos, Basado En Un Nuevo Concepto Pseudo-Hexadecimal Con Inteligencia Artificial", Tecnológico Nacional De México, Instituto Tecnológico de Ciudad Altamirano, Sexto (VI) Congreso Nacional De Investigación En Ciencia E Innovación De Tecnologías Productivas, Cd. Altamirano, Estado De Guerrero, México. Noviembre. (https://www.cdaltamirano.tecnm.mx/index.php/17-vi-congreso-nacional-de-investigacion-en-ciencia-e-innovacion-de-tecnologias-productivas/140-tecnm-40, 23/03/2024).
Rangel, E., Rangel, K.U., and González, L. 2024. "Cifrado De Datos Dinámico Con Inteligencia Artificial, Utilizando El Nuevo Formato Pseudo-Hexadecimal", Revista Electrónica de Divulgación de la Investigación del SABES [Revista de la Universidad del SABES, Editada por Sistema Avanzado de Bachillerato y Educación Superior en el Estado de Guanajuato. México, ISSN: 2007-3542], vol. 28, edición diciembre. (https://sabes.edu.mx/revista-electronica/27/# , 17/12/2024).
Rangel, E., and Rangel, K.U. 2024. "La Regla Del Vecino Más Cercano Como Alternativa Para Inyectar Ruido A Mensajes Encriptados Por El Algoritmo: Noised Random Hexadecimal", INTELETICA, Revista de Inteligencia Artificial, Ética y Sociedad [Editado por IBERAMIA, Iberoamerican Society of Artificial Intelligence – Sociedad Iberoamericana de Inteligencia Artificial, España, ISSN: 3020-7444], vol. 1, num. 2, Dec., pp. 1–15, (https://inteletica.iberamia.org/index.php/journal/article/view/16, 23/03/2025).
Álvarez, D. 2019. "Algunos Aspectos Jurídicos Del Cifrado De Comunicaciones", Derecho PUCP [Pontificia Universidad Católica del Perú], núm. 83, 2019, pp. 241-264. DOI: https://doi.org/10.18800/derechopucp.201902.008, (http://www.redalyc.org/articulo.oa?id=533662765008, 09/11/2024).
Barranco, F., and Galindo, C. 2022. "Criptografía básica y algunas aplicaciones". Universidad Jaume I, Departamento de Matemáticas, Castellón, España, octubre. URI: http://hdl.handle.net/10234/ 201359, (https://repositori.uji.es/items/35da2f29-ee4a-4dbc-a82f-c450a81cf9be,13/04/2025).
Gómez, S., Arias, J.D., and Agudelo, D. 2012. "Cripto-Análisis Sobre Métodos Clásicos De Cifrado". Scientia Et Technica, [Universidad Tecnológica de Pereira Pereira, Colombia, ISSN: 0122-1701, Año: XVII], vol. 2, no. 50, pp. 97-102, abril, DOI: https://doi.org/10.22517/23447214.6681, (https://revistas.utp.edu.co/index.php/revistaciencia/article/view/6681, 16/04/2025).
Javidi, B., and Horner, J.L. 1994. "Optical Pattern Recognition for Validation and Security Verification", Optical Engineering [ISSN: 0091-3286], vol. 33, issue: 6, pp. 1752-1756, june, DOI: https://doi.org/10.1117/12.170736,(https://www.spiedigitallibrary.org/journals/optical-engineering/volume-33/issue-6/0000/ Optical-pattern-recognition-for-validation-and-security-verification /10.1117/12.170736.short, 14/ 04/2025).
Reddaiah, B. 2019. "A Study on Genetic Algorithms for Cryptography", International Journal of Computer Applications, [Department of Computer Applications, Yogi Vemana University Kadapa, A.P, India, ISSN: 0975-8887], vol. 177, no. 28, pp. 1-4, december. DOI: http://dx.doi.org/10.5120/ijca2019919509, (https://www. researchgate.net/publication/338012809_A_Study_on_Genetic_Algorithms_for_Cryptography, 23/03/2024).
Sebas, C. 2023. "¿Qué son los Algoritmos Genéticos en las Inteligencias Artificiales?", Manuales y Tutoriales de Informatica,. (https://aprendeinformaticas.com/ia/, 23/03/2024).
Paul, S., Dasgupta, P., Naskar, P.K., and Chaudhuri, A. 2017. "Secured image encryption scheme based on DNA encoding and chaotic map". Review Of Computer Engineering Studies, [IIETA: International Information and Engineering Technology Association, ISSN: 2369-0755, e-ISSN: 2369-0763], vol. 4, no. 2, pp. 70-75, june issue. DOI: 10.18280/rces.040206, (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://iieta.org/sites/default/files/Journals/RCES/04.02_06.pdf&ved=2ahUKEwjVlYfordOMAxVVLUQIHXknBWsQFnoECB4QAQ&usg=AOvVaw3yvem4PsuKbMM9009owuAJ, 12/04/2015).
Oppliger, R. 2005. "Contemporary cryptography", 1ra. ed., Artech House Computer Security Library, [Boston/London, ISBN: 1-58053-642-5, 978-8189265038], 510p. (https://www.google.com/ url?sa=t&source=web&rct=j&opi=89978449&url=https://theswissbay.ch/pdf/Gentoomen%2520Library/Cryptography/Contemporary%2520Cryptography%2520-%2520Rolf%2520Oppliger.pdf&ved= 2ahUKEwiT1tm1xNWMAxUAmO4BHWYLNa0QFnoECBoQAQ&usg=AOvVaw3GvxLI6QzJhvEXqcl9efPz, 13/04/2025)
Stinson, D.R. and Paterson, M.B. 2019. "Cryptography: Theory and Practice", (4ta ed.). Chapman and Hall Book/CRC Press [Taylor & Francis Group, ISBN: 978-1-1381-9701-5]. (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://www.ic.unicamp.br/~rdahab/cursos/mo421-mc889/Welcome_files/Stinson-Paterson_CryptographyTheoryAnd Practice-CRC%2520Press%2520%25282019%2529.pdf&ved=2ah UKEwi8_euUtdWMAxWzh-4BHShGAaQQFnoECCUQAQ&usg=AOv Vaw1DCBGkDbaZMeHuyR45xZZC, 13/04/2025)
Van-Tilborg, H.C.A. 2005. "Encyclopedia Of Cryptography And Security", TUE Research portal. Springer, pp. 114-115, 201-202. DOI: https://doi.org/10.1007/0-387-23483-7, (09/11/2024).
Baklaga, L. 2024. "Leading The Way In Quantum-Resistant Cryptography For Everyday Safety". SPCSJ, Scientific and Practical Cyber Security Journal [Scientific Cyber Security Association (SCSA).Tbilisi, Georgia, ISSN: 2587-4667], vol. 8, no. 3, pp 65-73, issue. (https://journal.scsa.ge/papers/leading-the-way-in-quantum-resistant-cryptography-for-everyday-safety/, 23/03/2025)
Bavdekar, R., Eashan-Jayant, C., Ankit, A., and Tiwari, K. 2023. "Post Quantum Cryptography: A Review of Techniques, Challenges, and Standardizations", In 2023 International Conference on Information Networking (ICOIN). 24. Dang, Q.H., and Le, H.Q. 2022. "Improved cryptanalysis of the RSA algorithm using side-channel attacks", Journal of Information Security and Applications, vol. 65, no. 103313
Luciano, D., and Prichett, G. 1987. "Cryptology: From Caesar Ciphers To Public-key Cryptosystems". The College Mathematics Journal, vol. 18, pp. 2-17. (http://www.jstor.org/stable/2686311, 06/06/2025)
Rahman, M.S., and Hossain, M.S. 2021. "A Secure Private Key Cryptography Scheme Using RSA and AES". Journal of Cybersecurity, 1(1), pp. 1-9
Rodríguez, J. 2020. "Operadores Genéticos Aplicados A La Criptografía Simétrica", [Proyecto De Grado], Universidad Distrital Francisco José De Caldas. Facultad De Ingeniería. Ingeniería De Sistemas. Bogotá, Colombia. (https://repository.udistrital.edu.co/ handle/11349/28192, 06/05/2024)
Baker, M., and Schiller, J. 2015. "ECIES: Elliptic Curve Integrated Encryption Scheme", In Cryptography and Network Security, Springer, pp. 245-263. (https://medium.com/asecuritysite-when-bob-met-alice/elliptic-curve-integrated-encryption-scheme-ecies-encrypting-using-elliptic-curves-dc8d0b87eaa, 23/03/2025)
Hankerson, D., Hernandez, J.L., and Menezes, A.J. 2004. "Software implementation of elliptic curve cryptography over binary fields", Springer-Verlag Berlin Heidelberg 2000, [K. Ko¸c and C. Paar (Eds.) – CHES 2000, LNCS 1965], pp. 1–24
Montgomery, P.L. 1987. "Speeding up the Pollard rho method", Mathematics of Computation, vol. 48, no. 177, pp. 453-456
NIST. 2013. "Special Publication 800-56A Revision 2: Recommended methods for key establishment using public key cryptography", NIST Special Publication 800-56A. (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://nvlpubs.nist.gov/nistpubs/specialpublications/nist.sp.800-56ar2.pdf&ved=2ahUKEwio1eCz3KGMAxWgJ0QIHY c4BXQQFnoECBsQAQ&usg=AOvVaw367-qADImRilvhabe1UtQr), (https://www.google.com/url?sa=t&source=web&rct=j&opi=89978449&url=https://csrc.nist.gov/pubs/sp/800/56/a/r2/final&ved=2ahUKEwio1eCz3KGMAxWgJ0QIHYc4BXQQFnoECBwQAQ&usg=AOvVaw183JO5CLTxYuENINrMwqgL, 23/03/2025).
Dhany, H.W., Izhari, F., Fahmi, H., Tulus, M., and Sutarman, M. 2018. "Encryption and Decryption using Password Based Encryption, MD5, and DES", Published by Atlantis Press, [ISSN: 2352-5398. Open Access: CC BY-NC], license: http://creativecommons.org/licenses/by-nc/4.0
Kumar, A., and Sharma, S. 2021. "A Study on Historical Cryptographic Techniques: Caesar Cipher to DES", International Journal of Advanced Science and Technology, 30(2), pp. 555-564
Van, H.C., and Jajodia, S. 2011. "Encyclopedia Of Cryptography And Security". Springer Science & Business Media, [ISBN: 978-14419-5907-2], 1416p
Schneier, B. 1994. "Description of a new variable-length key, 64-bit block cipher (Blowfish)", In Fast Software Encryption
Schneier, B. 2000. "Secrets and lies: Digital security in a networked world". Wiley
AL-Maqtari, E.A., and AL-Maqtari, E.A. 2024. "Performance Evaluation for AES, Blowfish, DES, and 3DES Cryptography Algorithms", PUIRP: Partners Universal Innovative Research Publication (ISSN: 3048-586X, Tamilnadu, India), vol. 2, no. 5, pp. 86-95, october, doi: https://doi.org/10.5281/zenodo.13974870. Available at: (https://www.puirp.com/index.php/research/article/view/81, 27/04/2025)
Muhammed, R.K., Aziz, R.R., Hassan, A.A., Aladdin, A.M., Saydah, S.J., Rashid, T.A., and Hassan, B.A. 2024. "Comparative Analysis of AES, Blowfish, Twofish, Salsa20, and ChaCha20 for Image Encryption", Kurdistan Journal of Applied Research (Published by Sulaimani Polytechnic University, ISSN: 2411-7684), vol. 9, no. 1, pp. 52–65, may issue, doi: https://doi.org/10.24017/science.2024.1.5, URL: https://doi.org/10.48550/arXiv.2407.16274. Available at: (https://arxiv.org/abs/2407.16274, 01/06/2025)
Wang, S., Cui, T., Wang, M. 2016. "Improved Differential Cryptanalysis of CAST-128 and CAST-256", In Information Security and Cryptology. Inscrypt. Lecture Notes in Computer Science [Chen, K., Lin, D., Yung, M. (eds), Springer, Cham, ISBN: 978-3-319-54705-3], vol 10143, march, 2017, doi: https://doi.org/10.1007/978-3-319-54705-3_2. (https://link.springer.com/chapter/10.1007/978-3-319-54705-3_2, 01/07/2025)
Saini, A., Tsokanos, A., and Kirner, R. 2023. "CryptoQNRG: a new framework for evaluation of cryptographic strength in quantum and pseudorandom number generation for key-scheduling algorithms", The Journal of Supercomputing (e-ISSN: 1573-0484), vol. 79, pp. 12219–12237, july, doi: https://doi.org/10.1007/s11227-023-05115-4. Available at: (https://link.springer.com/article/10.1007/s11227-023-05115-4, 14/04/2025)
Daemen, J., and Rijmen, V. 2002. "The Design of Rijndael: AES - The Advanced Encryption Standard". Springer. DOI:10.1007/978-3-662-04722-4, (23/03/2025)
Iavich, M., Kuchukhidze, T., and Gagnidze, A. 2024. "Post-quantum Digital Signature Using Verkle Trees And Lattices", SPCSJ, Scientific and Practical Cyber Security Journal [SCSA, Scientific Cyber Security Association, Tbilisi, Georgia, ISSN: 2587-4667], vol. 8, no. 3, pp. 35-52. (https://journal.scsa.ge/issues-archive/, 23/03/2025)
Fuegner, P. 2024. "Are RSA and AES Both at Risk From the Quantum Threat?", QuSecure, Inc. (https://www.qusecure.com/are-rsa-and-aes-both-at-risk-from-the-quantum-threat/#:~:text=The%20emergence%20of%20quantum%20computers,efficiently%20factoring%20large%20prime%20numbers, 2025-02-08)
Sengupta, S., and Ghosh, S. 2023. "Quantum Computing Encryption Threats: Why RSA and AES Are at Risk", Journal of Cryptographic Research
Thakur, J., and Kumar, N. 2011. "DES, AES and Blowfish: Symmetric Key Cryptography Algorithms Simulation Based Performance Analysis", International Journal of Emerging Technology and Advanced Engineering, pp. 6-12
Rangel, E. 2002. "Vecinos Envolventes para Variantes de la Regla del Vecino más Cercano", [MSc.Thesis], Instituto Tecnológico de Toluca, Metepec, México
Rangel, E. 2022. "La Regla De Los k Vecinos Más Cercanos (k-NN) Basada En Distancia De Manhattan (City-Block) Para Mejorar La Clasificación De Patrones", In Quinto (V) Congreso Nacional De Investigación En Ciencia E Innovación De Tecnologías Productivas. Tecnológico Nacional De México, campus: Instituto Tecnológico de Cd. Altamirano, Estado De Guerrero, México, noviembre. (http://erangel.coolpage.biz/pappers/ edgarrangel2022.pdf, 06/06/2025)
Iyengar, S.S., Kannan, R., and Ganapathi, S. 2021. "Inteligencia artificial y criptografía: Tendencias y desafíos", IEEE Transactions on Emerging Topics in Computing, vol. 9, no. 2, pp. 833-844
Liu, X., and Wang, X. 2022. "Quantum cryptanalysis of lattice-based cryptographic protocols", Physical Review X, vol. 12, no. 2 (021004)
Singh, A.K., Kumar, P., and Singh, R. 2021. "Aplicación de la inteligencia artificial en la criptografía: Una revisión", Journal of Intelligent Information Systems, vol. 67, no. 2, pp. 257-275
Mitchell, T.M. 2020. "Machine learning", (2ª ed.), McGraw-Hill
Ross-Quinlan, J. 1993. "C4.5: Programs for Machine Learning", Morgan Kaufmann, San Mateo, CA
Russell, S.J., and Norvig, P. 2020. "Inteligencia artificial: Un enfoque moderno", (4ª ed.), Pearson
Hartmann, A.K. 2020. "Heuristic search in graphs", Journal of Artificial Intelligence Research, vol. 68, pp. 1-33
Sánchez, J.S., Pla, F., and Ferri, F.J. 1997. "Prototype selection for the nearest neighbor rule through proximity graphs", Pattern Recognition Letters 18, pp. 507-513
Kuncheva, L.I., and Jain, L.C. 1999. "Nearest Neighbor Classifier: Simultaneous editing and feature selection", Pattern Recognition Letters, vol. 20, pp. 1149-1156
Murphy, K.P. 2022. "Probabilistic machine learning: An introduction", MIT Press
Reddaiah, B. 2016. "A Study on Pairing Functions for Cryptography", IJCA (0975-8887), vol. 149, no. 10, pp. 4-7, september
Skalak, D.B. 1994. "Prototype and Feature Selection by Sampling and Random Mutation Hill Climbing Algorithms", In ML94, Proceedings of the Eleventh International Conference on Machine Learning, [Morgan Kaufmann], pp. 293-301
Clark, A. 1994. "Modern optimisation algorithms for cryptanalysis", In Proceedings of the 1994 Second Australian and New Zealand Conference on Intelligent Information Systems, November 29 - December 2, pp. 258-262
Griindlingh, W., and Van-Vuuren, J.H. 2003. "Using Genetic Algorithms to Break a Simple Cryptographic Cipher", (submitted 2002), Retrieved March 31, unpublished. (http://dip.sun.ac.za/~vuuren/abstracts/abstr_genetic.htm)
Matthews, R.A.J. 1993. "The use of genetic algorithms in cryptanalysis", Cryptologia, vol. 17, no. 4, pp. 187-201
Bruzzone, L., and Serpico, S.B. 1997. "Classification of Imbalanced remote-sensing data by neural networks", Elsevier Science B.V. , [0167-8655, 97, PH S0167-8655 (97) 00109-8]. DOI: https://doi.org/10.1016/S0167-8655(97)00109-8. (https://www. sciencedirect.com/science/article/abs/pii/S0167865597001098, 01/06/2025)
Goodfellow,.I., Bengio, Y., and Courville, A. 2021. "Deep learning", MIT Press
Barandela, R., Sánchez, J.S., García, V., and Rangel, E. 2003. "Strategies for Learning in Class Imbalance Problems", Pattern Recognition [Rapid and Brief Comunication, Pergamon, ISBN: PII: S0031-3203(02)00257-1.0031-3203/02/], vol. 36, no. 3, pp. 849-851. DOI: https://doi.org/10.1016/S0031-3203(02)00257-1, (01/06/2025)
Lewis, D., and Catlett, J. 1994. "Heterogeneous Uncertainty Sampling for Supervised Learning", Proceedings of the 11th International Conference on Machine Learning, ICML'94, [New Brunswick, New Jersey, Morgan Kaufmann], pp. 148-156
Cover, T.M., and Hart, P.E. 1967. "Nearest Neighbor Pattern Classification", IEEE Transactions on Information Theory, [e-ISSN: 1557-9654], vol. IT-13, january, pp. 21-27. DOI: 10.1109/TIT.1967.1053964. (https://ieeexplore.ieee.org/abstract/document/ 1053964/, 23/03/2024)
Rangel, E., and Rangel, K.U. (in review, 2024). "Novel Pseudo-Hexadecimal Encryption Strategies For Camouflaging Ciphertext Based On Nearest Neighbor With Artificial Intelligence". Send to IJCOPI, International Journal of Combinatorial Optimization Problems and Informatics, ISSN: 2007-1558, manuscript in review since 2024. https://ijcopi.org/ojs/authorDashboard/submission/529, unpublished
Microsoft. 2025. "Descarga de software", Microsoft, 2025. (https://www.microsoft.com/es-mx/software-download, 01/06/2015)
Python.org. 2024. "The Python Network", Python.org, 2024. (https://www.python.org/downloads/, 18/11/2024).
Google, Android 12. 2024. "Sistema operativo para dispositivos móviles", Google. (https://www.android.com/intl/es_es/android-12/, 01/06/2025)
Pydroid3 versión 7.4_arm64. 2025. "IDE for Python 3. Lenguaje de programación y compilador", Google Play Store. (https://play.google.com/store/apps/ details?id=ru.iiec.pydroid3&hl=en&pli=1, 01/06/2025)
Python, Cryptography, "Cryptography 45.0.4", Python Software Foundation, 2025. (https://pypi.org/project/cryptography/, 01/06/2025).
PyCryptodome. 2025. "Crypto.Cipher package. Introduction", Readthedocs.io. (https://pycryptodome.readthedocs.io/en/ latest/src/cipher/cipher.html, 30/03/2025)
PyPI. 2024. "Pycryptodome 3.21.0", Python Software Foundation. (https://pypi.org/project/pycryptodome/, 13/12/2024)