ABC algorithm, also called Artificial Bee Colony Algorithm was proposed by Karaboga in 2005. Artificial Bee Colony Algorithm is an optimization algorithm based on intelligent foraging behavior of honey bee swarm. ABC is used in computer science and operational research. ABC is used in neural networking. Artificial Bee Colony Algorithm works against numerical optimization problems.

## Advantages of ABC Encryption Algorothm

- ABC algorithm allows artificial bees to fly around multidimensional search space.
- ABC system combines local search methods with global search methods attempting to balance exploration and exploitation process.
- Artificial Bee Colony Algorithm has good exploration and exploitation capabilities.
- ABC algorithm is highly efficient and has convergent speed in its performance.

## Applications of ABC Encryption Algorothm

- Artificial Bee Colony Algorithm paces an important role in reducing peak-to-average power ratio in orthogonal frequency division multiplexing.
- ABC Algorithm is used in feed-forward neural networks.
- Artificial Bee Colony Algorithm is used for optimizing multivariable functions.
- ABC algorithm is also used in optimizing multimodal functions.
- ABC algorithm is used in computer science and operational research fields.

## Structure of ABC Encryption Algorothm

Artificial Bee Colony Algorithm consists of three groups of bees: Employed bees, Onlookers, and Scouts. In Artificial Bee Colony Algorithm, numbers of employed bees are equal to number of food resources around the hive. The employed bee whose food resource has been abandoned becomes a scout and it starts searching for a new food resource. Onlookers watch the dances of employed bees and choose food sources based on the dances.

### Steps Involved in ABC Encryption Algorithm (Initialize, Repeat, and Until)

- The first step involved in ABC algorithm is to produce initial food sources for all the employed bees.
- Each employed bee goes to a food source in her memory and determines a neighbor source, then evaluates its nectar amount and dances in the hive.
- Each Onlooker watches the dance of employed bees and chooses one of their sources depending on dances.
- Employed bee evaluates its nectar amount after choosing the neighbor.
- Abandoned food sources are thus determined and are replaced with new food sources discovered by scouts.
- The best food found by the employed bees is thus registered.

### Selection Process in ABC Encryption Algorithm

- A global selection process used by artificial onlooker bees for discovering promising regions.
- A local selection process carried out in a region by artificial employed bees and onlookers depending on local information.
- A greedy selection process carried out by all the bees if the nectar amount of individual bee source is better than the present one.
- A random selection process carried out by scouts.

### Relevant Technical Articles:

**ARIA Algorithm for Encryption & Decryption – Cryptography & Data Security :-**ARIA is a general-purpose block cipher algorithm developed by Korean cryptographers in 2003.ARIA is an...**3-Way Algorithm for Encryption & Decryption – Cryptography & Data Security :-**Cryptography consists of Block Ciphers. One of such block cipher algorithm is the 3-Way Algorithm....**Cryptography Algorithms for Data Encryption/Decryption and Information Scrambling/Descrambling :-**Cryptography is the practice and study of hiding secret information by encryption. Encryption is the...**Cryptography Projects for Data Encryption Security :-**Cryptography is the security practice of Data Encryption for hiding secret information. Encryption is the...**Data Encryption Standard – DES Encryption Algorithm :-**Data Encryption Standard (DES) or DES Encryption Algorithm is a technique by which a message...**Cryptography: Encryption & Decryption Algorithms Applications & Advantages :-**Cryptography (or cryptology) is the practice and study of hiding secret information by encryption. Encryption...**Encryption Algorithms for Cryptographic Network Security in Data Communications & Storage :-**Encryption is for information security in digital data communication and storage networks. Encryption programs use...**Advanced Encryption Standard – AES Encryption Algorithm :-**The Advanced Encryption Standard (AES) is an encryption algorithm for securing information in commercial transactions...**RFID Cryptography Encryption Algorithm CryptoCompanion :-**CryptoCompanion provides plug-and-play host-side cryptographic security for embedded systems. This plug-and-play convenience means that designers...**Message Authentication Codes (MAC) – Cryptography & Data Security :-**Message Authentication Code (MAC) is one of the Cryptographic Hash Function and is a short...