IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
Scopus/Elsevier
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 9 - Issue 1, January 2020 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



A Competitive Study Between Different Cryptographic Algorithms

[Full Text]

 

AUTHOR(S)

Ohoud Al-Harthi, Mohammed A. AlZain, Jehad Al-Amri, Mohammed Baz, Mehedi Masud,

 

KEYWORDS

Decryption, Symmetric Encryption, Plaintext, Cipher Text. Cryptography, Genetic Algorithm, Encryption, Decryption, key, Mutation.

 

ABSTRACT

Encryption is the strategy of blocking message therefore entirely the supposed receiver can browse it. Through the rapid development of digital Information swapping in automatic suggests that data Safety is turning into far additional necessary in information storage and transmission. It’s a kind of substitution code throughout which individually and every message interval the plaintext is swapped by a message. Throughout this research, author improved the old Caesar cipher and stuck the key size collectively. Coding and scrambling of the letters at intervals the Cipher Text. Genetic algorithms (GAs) are a category of optimization algorithms. GAs commit to solving issues through modeling a simplified version of genetic processes. There are several issues that a GA approach is beneficial. It is, however, undetermined if cryptology is such a tangle. General Terms Security, Encryption

 

REFERENCES

[1] M. Abdalla, J. H. An, M. Bellare, and C. Namprempre, "From Identification to Signatures Via the Fiat–Shamir Transform: Necessary and Sufficient Conditions for Security and Forward-Security," IEEE Transactions on Information Theory, vol. 54, no. 8, pp. 3631-3646, 2008.
[2] J. H. Holland, Adaptation in natural and artificial systems: an introductory analysis with applications to biology, control, and artificial intelligence. MIT press, 1992.
[3] J. Sanchez, R. Correa, H. Buenaño, S. Arias, and H. Gomez, "Encryption techniques: A theoretical overview and future proposals," in 2016 Third International Conference on eDemocracy & eGovernment (ICEDEG), 2016: IEEE, pp. 60-64.
[4] I. Rechenber, "Optimierung technischer Systeme nach Prinzipien der biologischen Evolution," Verlag nicht ermittelbar, 1970.
[5] H.-P. Schwefel, "Optimierung von Simulationsmodellen mit der Evolutionsstrategie," in Simulationsmethoden in der Medizin und Biologie: Springer, 1978, pp. 115-129.
[6] A. Kumar and M. K. Ghose, "Overview of information security using genetic algorithm and chaos," Information Security Journal: A Global Perspective, vol. 18, no. 6, pp. 306-315, 2009.
[7] A.-A. M. Aliyu and A. Olaniyan, "Vigenere Cipher: Trends, Review and Possible Modifications," International Journal of Computer Applications, vol. 135, no. 11, 2016.
[8] G. Matthews, "Elementary Cryptanalysis—A Mathematical Approach. By Abraham Sinkov. Pp. ix, 189. 1968.(Random House.)," The Mathematical Gazette, vol. 54, no. 389, pp. 307-308, 1970.
[9] S. Mewada, P. Sharma, and S. Gautam, "Exploration of efficient symmetric algorithms," in 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), 2016: IEEE, pp. 663-666.
[10] A. Sharma, R. Thakur, and S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud," International Journal of Scientific Research in Computer Science and Engineering, vol. 4, no. 5, pp. 5-11, 2016.
[11] W. Stallings, L. Brown, M. D. Bauer, and A. K. Bhattacharjee, Computer security: principles and practice. Pearson Education Upper Saddle River, NJ, USA, 2012.
[12] A. Kumar and K. Chatterjee, "An efficient stream cipher using Genetic Algorithm," in 2016 International Conference on Wireless Communications, Signal Processing and Networking (WiSPNET), 2016: IEEE, pp. 2322-2326.
[13] C. Guo and X. Yang, "A programming of genetic algorithm in matlab7. 0," Modern Applied Science, vol. 5, no. 1, p. 230, 2011.
[14] C. R. Gaidhani, V. M. Deshpande, and V. N. Bora, "Image Steganography for Message Hiding Using Genetic Algorithm," International Journal of Computer Sciences and Engineering, vol. 2, no. 3, pp. 67-70, 2014.
[15] A. Tragha, F. Omary, and A. Kriouile, "Genetic algorithms inspired cryptography," AMSE Association for the Advancement of Modeling & Simulation Techniques in Enterprises, Series D: Computer Science and Statistics, 2005.
[16] A. Tragha, F. Omary, and A. Mouloudi, "Improved cryptography inspired by genetic algorithms," in ICIGA, 2006 International Conference on Hybrid Information Technology (ICHIT'06).
[17] A. Agarwal, "Secret key encryption algorithm using genetic algorithm," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 4, pp. 216-218, 2012.
[18] S. Goyat, "Genetic key generation for public key cryptography," International Journal of Soft Computing and Engineering (IJSCE) ISSN, pp. 2231-2307, 2012.
[19] F. Ahmad, S. Khalid, and M. S. Hussain, "Encrypting data using the features of memetic algorithm and cryptography," International Journal of Engineering Research and Applications, ISSN, pp. 2248-9622, 2011.
[20] G. N. Rajendra and B. R. Kaur, "A New Approach for Data Encryption Using Genetic Algorithms and Brain Mu Waves," 2011.
[21] S. Prajapat and R. S. Thakur, "Various approaches towards cryptanalysis," International Journal of Computer Applications, vol. 127, no. 14, pp. 15-24, 2015.
[22] https://de.wikipedia.org/wiki/Caesar-Verschl%C3%BCsselung, ed.
[23] https://studyflix.de/informatik/hamming-distanz-396, ed.
[24] https://www.youtube.com/watch?v=qaYVyXh4Zlo, ed.
[25] C. Riman and P. E. Abi-Char, "Comparative Analysis of Block Cipher-Based Encryption Algorithms: A Survey," Information Security and Computer Fraud, vol. 3, no. 1, pp. 1-7, 2015.
[26] https://www.slideshare.net/AMedOs/introduction-to-genetic-algorithms-26956618, ed.
[27] T. Abut, "Dynamic Model And Optimal Control Of A Snake Robot: TAROBOT–," International Journal of Scientific & Technology Research, vol. 4, no. 11, p. 4, 2015.
[28] M. I. Nazeer, G. A. Mallah, N. A. Shaikh, R. Bhatra, R. A. Memon, and M. I. Mangrio, "Implication of Genetic Algorithm in Cryptography to Enhance Security," INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, vol. 9, no. 6, pp. 375-379, 2018.
[29] M. A. AlZain, A. S. Li, B. Soh and M. Masud, Byzantine
Fault- Tolerant Architecture in Cloud Data Management,
International Journal of Knowledge Society Research
(IJKSR), 7 (2016), pp. 86-98.
[30] M. A. AlZain, A. S. Li, B. Soh and M. Masud, Managing
Multi- Cloud Data Dependability Faults, Knowledge-Intensive Economies and Opportunities for Social, Organizational, and Technological Growth, IGI Global, 2019, pp. 207-221.
[31] M. A. Alzain and E. Pardede, Using multi shares for ensuring
privacy in database-as-a-service, 2011 44th Hawaii International Conference on System Sciences, IEEE, 2011, pp. 1-9.
[32] M. A. AlZain, E. Pardede, B. Soh and J. A. Thom, Cloud
computing security: from single to multi-clouds, 2012 45th
Hawaii International Conference on System Sciences, IEEE,
2012, pp. 5490-5499.
[33] M. A. AlZain, B. Soh and E. Pardede, A byzantine fault
tolerance model for a multi-cloud computing, 2013 IEEE 16Th
International Conference On Computational Science And
Engineering, IEEE, 2013, pp. 130-137.
[34] M. A. AlZain, B. Soh and E. Pardede, Mcdb: using multi-clouds
to ensure security in cloud computing, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, IEEE, 2011, pp. 784-791.
[35] M. A. AlZain, B. Soh and E. Pardede, A new approach using
redundancy technique to improve security in cloud computing, Proceedings Title: 2012 International Conference on Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), IEEE, 2012, pp. 230-235.
[36] M. A. AlZain, B. Soh and E. Pardede, A new model to ensure
security in cloud computing services, Journal of Service Science Research, 4 (2012), pp. 49-70.
[37] M. A. AlZain, B. Soh and E. Pardede, A survey on data security
issues in cloud computing: From single to multi-clouds, Journal of Software, 8 (2013), pp. 1068-1078.
[38] M. A. AlZain, Data security, data management and
performance evaluation in a multi-cloud computing model,
(2014).
[39] M. A. AlZain, Utilization of Double Random Phase
Encoding for Securing Color Images, International Journal
of Computer Applications, 975 (2018), pp. 8887.
[40] M. A. AlZain and J. F. Al-Amri, Application of Data
Steganographic Method in Video Sequences Using
Histogram Shifting in the Discrete Wavelet Transform,
International Journal of Applied Engineering Research, 13
(2018), pp. 6380-6387.