CFP last date
20 May 2024
Reseach Article

Generating the Best Fit Key in Cryptography using Genetic Algorithm

by Sania Jawaid, Adeeba Jamal
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 98 - Number 20
Year of Publication: 2014
Authors: Sania Jawaid, Adeeba Jamal
10.5120/17301-7767

Sania Jawaid, Adeeba Jamal . Generating the Best Fit Key in Cryptography using Genetic Algorithm. International Journal of Computer Applications. 98, 20 ( July 2014), 33-39. DOI=10.5120/17301-7767

@article{ 10.5120/17301-7767,
author = { Sania Jawaid, Adeeba Jamal },
title = { Generating the Best Fit Key in Cryptography using Genetic Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { July 2014 },
volume = { 98 },
number = { 20 },
month = { July },
year = { 2014 },
issn = { 0975-8887 },
pages = { 33-39 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume98/number20/17301-7767/ },
doi = { 10.5120/17301-7767 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:26:44.068281+05:30
%A Sania Jawaid
%A Adeeba Jamal
%T Generating the Best Fit Key in Cryptography using Genetic Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 98
%N 20
%P 33-39
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The goal of network security is to provide a secure, effective and private communication between the sender and the receiver. In order to achieve a high level of security, data is sent in the encrypted form to its intended recipient. But, tampering with the text and eavesdropping have assumed colossal proportions. This is generally done by decoding the key. Therefore, to make the key strong and almost unpredictable, a method based on the theory of natural selection has been proposed in the paper. This method finds the best fit element in the environment. as the paper uses Genetic Algorithm to accomplish the above task. The paper not only illustrates this innovative method of key generation but also demonstrates its implementation. To achieve even more high standards of security Data Encryption Standard cipher program has been used for verification and validation.

References
  1. Behrouz A Forouzan, "Data Communication and Networking" Tata McGraw- Hill Publishing Company Limited, Special Indian Edition 2006.
  2. William Stallings, "Network Security Essentials," Fourth edition.
  3. William Stallings, "Cryptography and Network security", Fifth Edition.
  4. Harsh Bhasin and Nakul Arora, "Key Generation for Cryptography using Genetic Algorithm".
  5. Sindhuja K and Pramela Devi S, "A Symmetric Key Encryption Technique Using Genetic Algorithm", Sindhuja K et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, ISSN: 0975-9646 Vol. 5 (1), 2014, pg 414-416.
  6. Y. V. Srinivasa Murthy, Dr. S. C. Satapathy, P. Srinivasu and A. A. S. Saranya, "Key Generation for Text Encryption in Cellular Networks using Multi-point Crossover Function", International Journal of Computer Applications (0975-8887) Volume 32-No. 9, October 2001.
  7. Bethany Delman, Genetic Algorithms in Cryptography, MS Thesis 2004.
  8. A. Tragha, F. Omary, A. Kriouile, "Genetic Algorithms Inspired Cryptography", A. M. S. E Association for the Advancement of Modeling & Simulation Techniques in Enterprises, Series D: Computer Science and Statistics, November 2007.
  9. A Kumar, N Rajpal, Application of Genetic Algorithm in the Field of Steganography, in Journal of Information Technology, Vol. 2, No. 1, Jul-Dec. 2004, pg 12-15.
  10. Oded Goldreich, Foundations of Cryptography, Volume 1: Basic Tools, Cambridge University Press, 2001, ISBN 0-521-79172-3.
  11. A. J. Bagnall, "The Applications of Genetic Algorithms in Cryptanalysis", School of Information Systems, University Of East Anglia, 1996.
  12. N. Koblitz, "A Course in Number Theory and Cryptography", Springer-Verlag, New York, Inc. , 1994.
  13. Harsh Bhasin, "Test Data Generation Using Artificial Life and Cellular Automata", ACM SIGsoft Software Engineering Notes, January 2014.
  14. Harsh Bhasin, Neha Singla, "Cellular Genetic Test data Generation": ACM Sigsoft Software Engineering Notes, September Edition, 2013.
  15. Harsh Bhasin et. al. , "Cellular Automata based Test Data Generation", ACM Sigsoft Software Engineering Notes, July, 2013.
Index Terms

Computer Science
Information Sciences

Keywords

Genetic Algorithm Data Encryption Standard Cryptography Key Generation