CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A Novel Approach to Cryptography using Modified Substitution Cipher and Hybrid Crossover Technique

Published on December 2013 by Sainik Kumar Mahata, Shikha Nogaja, Smita Srivastava, Monalisa Dey, Subhranil Som
2nd International conference on Computing Communication and Sensor Network 2013
Foundation of Computer Science USA
CCSN2013 - Number 2
December 2013
Authors: Sainik Kumar Mahata, Shikha Nogaja, Smita Srivastava, Monalisa Dey, Subhranil Som
91621fbf-6f95-449e-a38b-e87534ad5f84

Sainik Kumar Mahata, Shikha Nogaja, Smita Srivastava, Monalisa Dey, Subhranil Som . A Novel Approach to Cryptography using Modified Substitution Cipher and Hybrid Crossover Technique. 2nd International conference on Computing Communication and Sensor Network 2013. CCSN2013, 2 (December 2013), 33-37.

@article{
author = { Sainik Kumar Mahata, Shikha Nogaja, Smita Srivastava, Monalisa Dey, Subhranil Som },
title = { A Novel Approach to Cryptography using Modified Substitution Cipher and Hybrid Crossover Technique },
journal = { 2nd International conference on Computing Communication and Sensor Network 2013 },
issue_date = { December 2013 },
volume = { CCSN2013 },
number = { 2 },
month = { December },
year = { 2013 },
issn = 0975-8887,
pages = { 33-37 },
numpages = 5,
url = { /proceedings/ccsn2013/number2/14766-1334/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 2nd International conference on Computing Communication and Sensor Network 2013
%A Sainik Kumar Mahata
%A Shikha Nogaja
%A Smita Srivastava
%A Monalisa Dey
%A Subhranil Som
%T A Novel Approach to Cryptography using Modified Substitution Cipher and Hybrid Crossover Technique
%J 2nd International conference on Computing Communication and Sensor Network 2013
%@ 0975-8887
%V CCSN2013
%N 2
%P 33-37
%D 2013
%I International Journal of Computer Applications
Abstract

In the modern globally connected world, with the internet growing continually, the exchange of information over the web has made the data quite vulnerable. The need for data security is thus increasing exponentially day by day. Cryptography is a scientific measure used for the protection of sensitive communications. In this paper, a novel approach for information security is introduced. The encryption technique is incorporated using two methods namely, a modified approach to substitution cipher and a two step hybrid crossover technique. The devised algorithm uses two keys, thereby, increasing the security aspect. Moreover the entire process is done on alphabetical data thus increasing the scope of its implementation.

References
  1. Poonam Garg, "Genetic algorithms and simulated annealing: a comparison between three approaches for the crypto analysis of transposition cipher", Journal of Theoretical and Applied Information Technology, Volume 5No4, pp. 387-392, 2004
  2. Dr. G. Raghavendra Rao, Nalini . N, "A New Encryption and Decryption Algorithm Combining the Features of Genetic Algorithm (GA) And Cryptography", International Conference on Cognitive Systems, pp. 1-5, New Delhi, December 14-15, 2004.
  3. A. J. Bagnall, "the application of genetic algorithms in cryptanalysis" School of Information System, University of East Anglia, 1996.
  4. N. Koblitz, "A Course in Number Theory and Cryptography", 2nd Edition, Springer- Verlag, New York, 1994
  5. S. Som, M. Banerjee, "Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function", International Journal of Computer Applications, Special Issue, CCSN 2012, pp. 1-5, March, 2013.
  6. R. Toeneh, S. Arumugam, "Breaking Transposition cipher with genetic algorithm", ELEKTRONIKA IR ELEKTROTECHNIKA, The College of Information Sciences and Technology, The Pennsylvania State University, Volume 7(79), 2007.
  7. Atul Kahate, "Cryptography and Network Security" 2nd Edition, TATA McGRAW HILL Publications.
  8. Melanie Mitchell, "An introduction to Genetic Algorithms". A Bradford Book The MIT Press, Fifth Printing, 1999.
Index Terms

Computer Science
Information Sciences

Keywords

Crossover Cryptography Data Security Encryption Substitution Technique.