CFP last date
22 April 2024
Reseach Article

Article:Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function

by Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, P. Srinivasu, A.A.S. Saranya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 32 - Number 9
Year of Publication: 2011
Authors: Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, P. Srinivasu, A.A.S. Saranya
10.5120/3934-5588

Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, P. Srinivasu, A.A.S. Saranya . Article:Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function. International Journal of Computer Applications. 32, 9 ( October 2011), 30-36. DOI=10.5120/3934-5588

@article{ 10.5120/3934-5588,
author = { Y.V. Srinivasa Murthy, Dr. S. C. Satapathy, P. Srinivasu, A.A.S. Saranya },
title = { Article:Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function },
journal = { International Journal of Computer Applications },
issue_date = { October 2011 },
volume = { 32 },
number = { 9 },
month = { October },
year = { 2011 },
issn = { 0975-8887 },
pages = { 30-36 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume32/number9/3934-5588/ },
doi = { 10.5120/3934-5588 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:18:46.215196+05:30
%A Y.V. Srinivasa Murthy
%A Dr. S. C. Satapathy
%A P. Srinivasu
%A A.A.S. Saranya
%T Article:Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function
%J International Journal of Computer Applications
%@ 0975-8887
%V 32
%N 9
%P 30-36
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper is mainly concerned with providing security for messages in cellular networks. Encryption of data in cellular networks is mandatory since it is sensitive to eaves dropping. This project focuses on encrypting the data sent between the mobile stations and base stations using a stream cipher method. However, the keys for encryption are generated using an evolutionary computation approach termed genetic algorithm. This genetic algorithm technique gives the best or optimal key for encryption. Before we single point cross over technique is used in generating optimal key for encryption but this paper emphasizes on genetic algorithm technique for different sizes of population and different number of iterations considering multi point crossover. The plain text which is to be encrypted along with the key are encoded using the arithmetic coding technique. Encryption is done to convert the plain text into cipher text. And the comparison with the existing system is explained in detail.

References
  1. [DAVI91] L. Davis, “Handbook of Genetic Algorithms”, Von Nostrand Reinhold, New York, 1991.
  2. [GOLD88] D. Goldberg, “Genetic Algorithms in Search, Optimization and Machine Learning”, Addison-Wesley, Red-wood City, CA, 1988.
  3. Charles P. Fleeger, Shari Lawrence P. Fleeger, “Security in computing”, Third Edition, Prentice Hall of India, 2003.
  4. Chung-Ping Wu, C.C. Jay Kuo, “Design of Integrated Multimedia Compression and Encryption Systems”, IEEE Tran-sactions on Multimedia, Volume - 7, Issue - 5, October, 2005 Page (s): 828 - 839.
  5. David E. Goldberg, Kelsey Miman and Christina Tidd. “Genetic Algorithm: A Bibliography”. University of Illinois at Urbana – Champaign 1992.
  6. Donald E Knuth, “Dynamic Huffman Coding, Journal of Algorithms”, Volume 6, Issue 2, June 1985, Pages 163 – 180, ISSN: 0196 – 6774, 10.1016/0196-6774 (85) 90036-7.
  7. Gary William Flake, “The Computational Beauty of Nature”. MIT Press, Cambridge, MA.
  8. Gustavus J. Simmons. 1979. “Symmetric and Asymmetric Encryption”. ACM Comput. Surv. 11,4 (December, 1979), 305-330. DOI=10.1145/356789.356793
  9. Ian H. Witten, Radford M Neal and John G. Cleary, 1987. “Arithmetic Coding for Data Compression”. Comm. ACM 30, 6 (June–1987), 520 540. DOI=10.1145/214762.214771.
  10. J. Eberspacher, H. J. Vogel, C. Bettestetter, and C. Hartmann, “GSM, Architectuer, Protocols and Services”. 3rd Edition. John Wiley, Ltd., 2001.
  11. Jingyuan Zhang, Ivan Stojmenovic, “Cellular Networks”, University of Alabama, University of Ottawa, Canada.
  12. Michel Mouly, Marie-Bernadette Pautet. 1992. “The GSM System for Mobile Communications”. Telecom Publishing.
  13. Rivest, Ronald L. (1990), “Cryptography: In Handbook of Wireless Networks and Mobile Computing”, (Stojmenovic I Ed), John Wiley & Sons, 27 – 49, (2002)
  14. Scottt Fluhrer, Itsik Mantin and Adi Shamir, “Weaknesses in the key scheduling algorithm of RC4”, Lecture Notes in Computer Science, Vol. 2259, Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography Pages: 1 - 24, Year of Publication: 2001.
  15. Tom Clements. "Making Sense of Cellular”. Article, published in Sun Developer Network(SDN) of Oracle Corporation, July 2002.
Index Terms

Computer Science
Information Sciences

Keywords

Algorithms Security Ciphers Networks Encoding