CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function

Published on March 2013 by Subhranil Som, Mandira Banerjee
International Conference on Computing, Communication and Sensor Network
Foundation of Computer Science USA
CCSN2012 - Number 4
March 2013
Authors: Subhranil Som, Mandira Banerjee
df8043a8-9304-4c62-bee1-d17488659acb

Subhranil Som, Mandira Banerjee . Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function. International Conference on Computing, Communication and Sensor Network. CCSN2012, 4 (March 2013), 1-5.

@article{
author = { Subhranil Som, Mandira Banerjee },
title = { Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function },
journal = { International Conference on Computing, Communication and Sensor Network },
issue_date = { March 2013 },
volume = { CCSN2012 },
number = { 4 },
month = { March },
year = { 2013 },
issn = 0975-8887,
pages = { 1-5 },
numpages = 5,
url = { /specialissues/ccsn2012/number4/10869-1033/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 International Conference on Computing, Communication and Sensor Network
%A Subhranil Som
%A Mandira Banerjee
%T Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function
%J International Conference on Computing, Communication and Sensor Network
%@ 0975-8887
%V CCSN2012
%N 4
%P 1-5
%D 2013
%I International Journal of Computer Applications
Abstract

In this paper a new algorithm for encryption and decryption is introduced. The process of substitution and genetic function is the core of the proposed algorithm. In this encryption technique two keys are required for the encryption or decryption of a message. Input stream will be produced intermediate cipher text on which two stages of crossover will be used in the process of encryption and decryption to produce final cipher text.

References
  1. Poonam Garg, "Genetic algorithms and simulated annealing: a comparison between three approaches for the crypto analysis of transposition cipher" IMT, INDIA-2004
  2. Dr. G. Raghavendra, Nalini N, "a new encryption and decryption algorithm combining the features of genetic algorithm (GA) and cryptography" NIE, Mysore.
  3. A. J. Bagnall, "the application of genetic algorithms in cryptanalysis" School of information system, University of East Anglia, 1996
  4. N. Koblitz, "a coursein number theory and cryptography', Springer- verlag, New York, 1994
  5. R. Toeneh, S. Arumugam, "Breaking Transposition cipher with genetic algorithm", Chennai, India
  6. Bethany Delman, "Genetic algorithm in cryptography", Rochester, New York, July – 2004
  7. Atul Kahate, "Cryptography and Network Security" 2nd edition, TATA McGRAW HILL
  8. Melanie Mitchell, "An introduction to Genetic Algorithms". A Bradford book.
Index Terms

Computer Science
Information Sciences

Keywords

Substitution Encryption Decryption Key Crossover Cipher Text Plain Text