CFP last date
20 May 2024
Reseach Article

A Study on Cryptography using Genetic Algorithm

by Rajat Jhingran, Vikas Thada, Shivali Dhaka
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 118 - Number 20
Year of Publication: 2015
Authors: Rajat Jhingran, Vikas Thada, Shivali Dhaka
10.5120/20860-3559

Rajat Jhingran, Vikas Thada, Shivali Dhaka . A Study on Cryptography using Genetic Algorithm. International Journal of Computer Applications. 118, 20 ( May 2015), 10-14. DOI=10.5120/20860-3559

@article{ 10.5120/20860-3559,
author = { Rajat Jhingran, Vikas Thada, Shivali Dhaka },
title = { A Study on Cryptography using Genetic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { May 2015 },
volume = { 118 },
number = { 20 },
month = { May },
year = { 2015 },
issn = { 0975-8887 },
pages = { 10-14 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume118/number20/20860-3559/ },
doi = { 10.5120/20860-3559 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:02:14.421825+05:30
%A Rajat Jhingran
%A Vikas Thada
%A Shivali Dhaka
%T A Study on Cryptography using Genetic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 118
%N 20
%P 10-14
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptography is a basic tool for protection and securing data. Security provides safety, reliability and accuracy. Genetic Algorithm (GA) is typically used to obtain solution for optimization and search problems. This paper presents application of GA in the field of cryptography. The selection of key in the field ofpublic key cryptography is a selection process in which keys can be categorized on the basis of their fitness function, making GA a better candidate for the key generation. We propose a new approach for e-security applications using the concept of genetic algorithms with pseudorandom sequence to encrypt and decrypt data stream. Many different image encryption methods have been proposed to keep the security of these images. Image encryption algorithms try to convert an image to another image that is hard to understand.

References
  1. R. Afarin. , S. Mozaffari2013. "Image encryption using genetic algorithm and binary patterns" at MVIP and IEEE.
  2. R. Afarin. , S. Mozaffari2013. ,"Image encryption using genetic algorithm" at MVIP and IEEE .
  3. S. Geetha, Siva S. Sindhu 2006, A. Kennan. , "An active rule based approach to audio steganalysis with a genetic algorithm" at IEEE.
  4. M Prashant, R Siddhartha and Rajeev Kumar2011. "Formulation of an encryption algorithm on the basis of molecular genetics and image patterns" at IEEE.
  5. Sheetal U. Bhandari , S. Subbaraman , Shashank S. Pujari2009 , RashmiMahajan. ,"Real time video processing on FPGA using on the fly partial configuration" at IEEE.
  6. A. Tragha, F. Omary, A. Mouloudi2006. "ICIGA: improved cryptography inspired by genetic algorithms" at IEEE.
  7. Abdel-karim S. O. Hassan, Ahmed F. Shalash and Naglaa F. Saudy MAY 2014. ,"Modifications on RSA cryptosystem using genetic optimization" at IJRRAS 19 (2).
  8. P. Singh, G. Gosawi, S. Dubey 4 (2014). "GA: A technique for cryptography real time data transmission" at binary journal of data miming and networking 37-40.
  9. Sindhuja K, P. Devi2014,414-416. ,"A symmetric key encryption technique using GA" at IJCSIT, volume 5(1).
  10. Mohammad A. F. Al-Husainy2006, 516-519. . ,"Image encryption using GA" at ITJ 5 (3).
  11. Dr. D. Singh,P. Rani, Dr. R. Kumar2013. ," To design a GA for cryptography to enhance the security" at issue 2April 2013.
  12. A. Soni, S. Aggarawal2012. ,"Using GA for symmetric key generation in image encryption" at IJARCET 2012.
  13. N. Rajendra, B. Rajneesh Kaur2011. ,"A new approach for data encryption using GA and brain mu waves" at IJSER 2011.
  14. S. Jawaid, Adeeba Jamal2014. ,"Generating the best fit key in cryptography using GA" at IJCA (0975-8887) volume 98-no. 20, July 2014.
  15. S. Mishra, S. Bali2013. ," Public key cryptography using GA" at IJRTE. 2277-3878, VOLUME 2, ISSUE 2 MAY 2013.
  16. A. Almarimi, A. Kumar, I. Almerhag, N. Elzoghbi 2013. ,"A new approach for data encryption using GA" atLIBYA. 2013.
  17. S. Goyat2012. ,"Cryptography using GA" at IOSRJCE, 2278-0661, volume 1, issue 5(may-June 2012).
  18. Dr. Poornima G. Naik , Girish R. Naik 2014. ,"Asymmetric key encryption using GA" at IJLTET, volume 3,issue 3 Jan 2014.
  19. Tragha A. , Omary F. , Kriouile A2007. ," The (GA) Inspired by Cryptography", Association for the Advancement of Modeling & Simulation Techniques in Enterprises (A. M. S. E), Series D: Computer Science and Statistics, 15- November 2007.
  20. A Kumar, N Raj pal 2004, ?Application of Genetic Algorithm in the Field of Steganography, in Journal of Information Technology (IJIT), Vol. 2nd, No. 1, Jul-Dec. 2004, pp-12-15.
  21. A Kumar, N Raj pal, A. Tayal 2005, ?Security System for Multimedia Data Transmission Using Genetic Algorithms" NCC, 05 Presented in the Kharagpur (IIT), page-579-583, 28-20 Jan 2005.
  22. S. Goyat 2012, "Genetic Key Generation for Public Key Encryption Cryptography", (IJSCE) ISSN: 2231-2307, Volume-2nd, Issue-3rd, July 2012 231.
  23. F. Ahamad, Mohd. Shahid ,S. Khalid 2012, published a paper titled, "Encrypting The Information Using The Features of Mimetic Algorithm With Encryption and Decryption Technique" at (IJERA) International Journal of the Engineering Research and the Applications, Vol. 2nd, Issue 3rd, May-Jun 2012, page. 3049-3051.
  24. N. Kumar, R. Bedi, Rajneesh Kaur 2011, "A Special Technique for the Information Cryptography by Using Genetic Algorithms and Brain Mu Waves", International Journal of Scientific and Engineering Research Volume 2nd, Issue 5th, June 2011 ISSN 2229-5518.
  25. A. Aggarwal 2012, "The Secret Key Data Encryption Algorithm Using Genetic Algorithm" at IJARCSSE, 2012.
  26. H. S. Kwok, W. K. S. Tang 2007, Chaos Solutions and Fractals, page 1518–1529.
  27. Y. Mao and G. Chen 2003. Handbook of computational geometry for, computervision, patternrecognition, robotics, and neural computing. Springer.
  28. M. SazzadulHoque, Md. Abu NaserBikas and Md. Abdul Mukit 2012 ,"The Implementation of Intrusion Detection System Using(GA)", International Journal of Network Security & Its Applications (IJNSA), Vol. 4, No. 2, March 2012
Index Terms

Computer Science
Information Sciences

Keywords

Secret key cryptography Pseudo random binarysequence generator.