Call for Paper - November 2019 Edition
IJCA solicits original research papers for the November 2019 Edition. Last date of manuscript submission is October 21, 2019. Read More

Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function

Print
PDF
IJCA Special Issue on International Conference on Computing, Communication and Sensor Network
© 2013 by IJCA Journal
CCSN2012 - Number 4
Year of Publication: 2013
Authors:
Subhranil Som
Mandira Banerjee

Subhranil Som and Mandira Banerjee. Article: Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function. IJCA Special Issue on International Conference on Computing, Communication and Sensor Network CCSN2012(4):1-5, March 2013. Full text available. BibTeX

@article{key:article,
	author = {Subhranil Som and Mandira Banerjee},
	title = {Article: Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function},
	journal = {IJCA Special Issue on International Conference on Computing, Communication and Sensor Network},
	year = {2013},
	volume = {CCSN2012},
	number = {4},
	pages = {1-5},
	month = {March},
	note = {Full text available}
}

Abstract

In this paper a new algorithm for encryption and decryption is introduced. The process of substitution and genetic function is the core of the proposed algorithm. In this encryption technique two keys are required for the encryption or decryption of a message. Input stream will be produced intermediate cipher text on which two stages of crossover will be used in the process of encryption and decryption to produce final cipher text.

References

  • Poonam Garg, "Genetic algorithms and simulated annealing: a comparison between three approaches for the crypto analysis of transposition cipher" IMT, INDIA-2004
  • Dr. G. Raghavendra, Nalini N, "a new encryption and decryption algorithm combining the features of genetic algorithm (GA) and cryptography" NIE, Mysore.
  • A. J. Bagnall, "the application of genetic algorithms in cryptanalysis" School of information system, University of East Anglia, 1996
  • N. Koblitz, "a coursein number theory and cryptography', Springer- verlag, New York, 1994
  • R. Toeneh, S. Arumugam, "Breaking Transposition cipher with genetic algorithm", Chennai, India
  • Bethany Delman, "Genetic algorithm in cryptography", Rochester, New York, July – 2004
  • Atul Kahate, "Cryptography and Network Security" 2nd edition, TATA McGRAW HILL
  • Melanie Mitchell, "An introduction to Genetic Algorithms". A Bradford book.