Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

A Study on Genetic Algorithms for Cryptography

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2019
Authors:
B. Reddaiah
10.5120/ijca2019919509

B Reddaiah. A Study on Genetic Algorithms for Cryptography. International Journal of Computer Applications 177(28):1-4, December 2019. BibTeX

@article{10.5120/ijca2019919509,
	author = {B. Reddaiah},
	title = {A Study on Genetic Algorithms for Cryptography},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2019},
	volume = {177},
	number = {28},
	month = {Dec},
	year = {2019},
	issn = {0975-8887},
	pages = {1-4},
	numpages = {4},
	url = {http://www.ijcaonline.org/archives/volume177/number28/31071-2019919509},
	doi = {10.5120/ijca2019919509},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

In this electronic era institutions and enterprises thinks that there data is very crucial in all their activities. As this based on electronic transmission of data from one place to other, secure mode of transmission is needed. This is to counter security attacks that are evident in transmission. Different security services and mechanisms are needed to provide security and integrity to the resource owners. Security mechanisms that provide security are to be constantly updated to counter attacks. In the process of providing new services and mechanisms, special functions are to be included to strengthen the processing. In this paper different genetic algorithms are discussed that are gaining importance in the field of cryptography that in providing security to data.

References

  1. B. Reddaiah. “A Study on Pairing Functions for Cryptography,” IJCA (0975-8887), Vol. 149, No. 10, September 2016: pp.4-7.
  2. P. P Charles & P. L. Shari, “Security in Computing: 4th edition”, Prentice-Hall, Inc.,2008.
  3. S. Hebert, “A Brief History of Cryptography”, an article available at http://cybercrimes.net/aindex.html
  4. A. S. Tanenbaum, “Modern Operating Systems”, Prentice Hall, 2003.
  5. D. KHAN, “The Codebreakers”, Macmillan Publishing Company, New York, 1967.
  6. Behrouz A. Forouzan, Cryptography, and Network Security, Special Indian Edition, TATA McGraw Hill.
  7. S. William, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50.

Keywords

Security mechanisms, Security attack, selection, Crossover, Mutation, Fitness function.