CFP last date
22 April 2024
Call for Paper
May Edition
IJCA solicits high quality original research papers for the upcoming May edition of the journal. The last date of research paper submission is 22 April 2024

Submit your paper
Know more
Reseach Article

A Study on Genetic Algorithms for Cryptography

by B. Reddaiah
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 28
Year of Publication: 2019
Authors: B. Reddaiah
10.5120/ijca2019919509

B. Reddaiah . A Study on Genetic Algorithms for Cryptography. International Journal of Computer Applications. 177, 28 ( Dec 2019), 1-4. DOI=10.5120/ijca2019919509

@article{ 10.5120/ijca2019919509,
author = { B. Reddaiah },
title = { A Study on Genetic Algorithms for Cryptography },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2019 },
volume = { 177 },
number = { 28 },
month = { Dec },
year = { 2019 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number28/31071-2019919509/ },
doi = { 10.5120/ijca2019919509 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:47:07.148082+05:30
%A B. Reddaiah
%T A Study on Genetic Algorithms for Cryptography
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 28
%P 1-4
%D 2019
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this electronic era institutions and enterprises thinks that there data is very crucial in all their activities. As this based on electronic transmission of data from one place to other, secure mode of transmission is needed. This is to counter security attacks that are evident in transmission. Different security services and mechanisms are needed to provide security and integrity to the resource owners. Security mechanisms that provide security are to be constantly updated to counter attacks. In the process of providing new services and mechanisms, special functions are to be included to strengthen the processing. In this paper different genetic algorithms are discussed that are gaining importance in the field of cryptography that in providing security to data.

References
  1. B. Reddaiah. “A Study on Pairing Functions for Cryptography,” IJCA (0975-8887), Vol. 149, No. 10, September 2016: pp.4-7.
  2. P. P Charles & P. L. Shari, “Security in Computing: 4th edition”, Prentice-Hall, Inc.,2008.
  3. S. Hebert, “A Brief History of Cryptography”, an article available at http://cybercrimes.net/aindex.html
  4. A. S. Tanenbaum, “Modern Operating Systems”, Prentice Hall, 2003.
  5. D. KHAN, “The Codebreakers”, Macmillan Publishing Company, New York, 1967.
  6. Behrouz A. Forouzan, Cryptography, and Network Security, Special Indian Edition, TATA McGraw Hill.
  7. S. William, Cryptography and Network Security: Principles and Practice, 2nd edition, Prentice-Hall, Inc., 1999 pp 23-50.
Index Terms

Computer Science
Information Sciences

Keywords

Security mechanisms Security attack selection Crossover Mutation Fitness function.