![]() |
10.5120/ijca2019919509 |
B Reddaiah. A Study on Genetic Algorithms for Cryptography. International Journal of Computer Applications 177(28):1-4, December 2019. BibTeX
@article{10.5120/ijca2019919509, author = {B. Reddaiah}, title = {A Study on Genetic Algorithms for Cryptography}, journal = {International Journal of Computer Applications}, issue_date = {December 2019}, volume = {177}, number = {28}, month = {Dec}, year = {2019}, issn = {0975-8887}, pages = {1-4}, numpages = {4}, url = {http://www.ijcaonline.org/archives/volume177/number28/31071-2019919509}, doi = {10.5120/ijca2019919509}, publisher = {Foundation of Computer Science (FCS), NY, USA}, address = {New York, USA} }
Abstract
In this electronic era institutions and enterprises thinks that there data is very crucial in all their activities. As this based on electronic transmission of data from one place to other, secure mode of transmission is needed. This is to counter security attacks that are evident in transmission. Different security services and mechanisms are needed to provide security and integrity to the resource owners. Security mechanisms that provide security are to be constantly updated to counter attacks. In the process of providing new services and mechanisms, special functions are to be included to strengthen the processing. In this paper different genetic algorithms are discussed that are gaining importance in the field of cryptography that in providing security to data.
References
- B. Reddaiah. “A Study on Pairing Functions for Cryptography,” IJCA (0975-8887), Vol. 149, No. 10, September 2016: pp.4-7.
- P. P Charles & P. L. Shari, “Security in Computing: 4th edition”, Prentice-Hall, Inc.,2008.
- S. Hebert, “A Brief History of Cryptography”, an article available at http://cybercrimes.net/aindex.html
- A. S. Tanenbaum, “Modern Operating Systems”, Prentice Hall, 2003.
- D. KHAN, “The Codebreakers”, Macmillan Publishing Company, New York, 1967.
- Behrouz A. Forouzan, Cryptography, and Network Security, Special Indian Edition, TATA McGraw Hill.
- S. William, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50.
Keywords
Security mechanisms, Security attack, selection, Crossover, Mutation, Fitness function.