Call for Paper - March 2023 Edition
IJCA solicits original research papers for the March 2023 Edition. Last date of manuscript submission is February 20, 2023. Read More

Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function

International Journal of Computer Applications
© 2011 by IJCA Journal
Number 1 - Article 1
Year of Publication: 2011
Y.V. Srinivasa Murthy
Dr. S. C. Satapathy
P. Srinivasu
A.A.S. Saranya

Srinivasa Y V Murthy, Dr. S C Satapathy, P Srinivasu and A A S Saranya. Article:Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function. International Journal of Computer Applications 32(9):30-36, October 2011. Full text available. BibTeX

	author = {Y.V. Srinivasa Murthy and Dr. S. C. Satapathy and P. Srinivasu and A.A.S. Saranya},
	title = {Article:Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function},
	journal = {International Journal of Computer Applications},
	year = {2011},
	volume = {32},
	number = {9},
	pages = {30-36},
	month = {October},
	note = {Full text available}


This paper is mainly concerned with providing security for messages in cellular networks. Encryption of data in cellular networks is mandatory since it is sensitive to eaves dropping. This project focuses on encrypting the data sent between the mobile stations and base stations using a stream cipher method. However, the keys for encryption are generated using an evolutionary computation approach termed genetic algorithm. This genetic algorithm technique gives the best or optimal key for encryption. Before we single point cross over technique is used in generating optimal key for encryption but this paper emphasizes on genetic algorithm technique for different sizes of population and different number of iterations considering multi point crossover. The plain text which is to be encrypted along with the key are encoded using the arithmetic coding technique. Encryption is done to convert the plain text into cipher text. And the comparison with the existing system is explained in detail.


  • [DAVI91] L. Davis, “Handbook of Genetic Algorithms”, Von Nostrand Reinhold, New York, 1991.
  • [GOLD88] D. Goldberg, “Genetic Algorithms in Search, Optimization and Machine Learning”, Addison-Wesley, Red-wood City, CA, 1988.
  • Charles P. Fleeger, Shari Lawrence P. Fleeger, “Security in computing”, Third Edition, Prentice Hall of India, 2003.
  • Chung-Ping Wu, C.C. Jay Kuo, “Design of Integrated Multimedia Compression and Encryption Systems”, IEEE Tran-sactions on Multimedia, Volume - 7, Issue - 5, October, 2005 Page (s): 828 - 839.
  • David E. Goldberg, Kelsey Miman and Christina Tidd. “Genetic Algorithm: A Bibliography”. University of Illinois at Urbana – Champaign 1992.
  • Donald E Knuth, “Dynamic Huffman Coding, Journal of Algorithms”, Volume 6, Issue 2, June 1985, Pages 163 – 180, ISSN: 0196 – 6774, 10.1016/0196-6774 (85) 90036-7.
  • Gary William Flake, “The Computational Beauty of Nature”. MIT Press, Cambridge, MA.
  • Gustavus J. Simmons. 1979. “Symmetric and Asymmetric Encryption”. ACM Comput. Surv. 11,4 (December, 1979), 305-330. DOI=10.1145/356789.356793
  • Ian H. Witten, Radford M Neal and John G. Cleary, 1987. “Arithmetic Coding for Data Compression”. Comm. ACM 30, 6 (June–1987), 520 540. DOI=10.1145/214762.214771.
  • J. Eberspacher, H. J. Vogel, C. Bettestetter, and C. Hartmann, “GSM, Architectuer, Protocols and Services”. 3rd Edition. John Wiley, Ltd., 2001.
  • Jingyuan Zhang, Ivan Stojmenovic, “Cellular Networks”, University of Alabama, University of Ottawa, Canada.
  • Michel Mouly, Marie-Bernadette Pautet. 1992. “The GSM System for Mobile Communications”. Telecom Publishing.
  • Rivest, Ronald L. (1990), “Cryptography: In Handbook of Wireless Networks and Mobile Computing”, (Stojmenovic I Ed), John Wiley & Sons, 27 – 49, (2002)
  • Scottt Fluhrer, Itsik Mantin and Adi Shamir, “Weaknesses in the key scheduling algorithm of RC4”, Lecture Notes in Computer Science, Vol. 2259, Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography Pages: 1 - 24, Year of Publication: 2001.
  • Tom Clements. "Making Sense of Cellular”. Article, published in Sun Developer Network(SDN) of Oracle Corporation, July 2002.