An Encryption Technique Using Genetic Operators
[Full Text]
AUTHOR(S)
Amritha Thekkumbadan Veetil
KEYWORDS
Keywords: Genetic Algorithm, Crossover, Mutation, Encryption, Decryption, Secret key, Cryptography.
ABSTRACT
Abstract: Encryption is a tool for protecting and securing data. Security provides safety and reliability. As the need for communication is increasing day by day, there comes necessity of encrypting data in-order to ensure a secure communication. This paper presents application of genetic operators in the field of cryptography. As mostly tampering of data occurs in the network, the messages should be protected when it is transmitted through any network. This paper introduces a new encryption technique where the genetic operators ‘crossover’ and ‘mutation’ are used to encrypt messages, so as to protect the data during transmission. The goal is to provide a better encryption technique which is difficult for cryptanalysis.
REFERENCES
[1] Behrouz A. Forouzan , “Cryptography & Network security“, Tata McGraw – Hill, 2007.
[2] William Stallings,“Cryptography and Network Security”, 3rd Edition.
[3] S., N. Sivanandan, S. N. Deepa, “Introduction to Genetic Algorithm”,Springer Verlag Berlin Heidelberg, 2008.
[4] Ankita Agarwal, “Secret Key Encryption Algorithm Using Genetic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012.
[5] Sindhuja K , Pramela Devi S, “A Symmetric Key Encryption Technique Using Genetic Algorithm”, International Journal of Computer Science and Information Technologies, Vol. 5 (1 2014).
|