IJSTR

International Journal of Scientific & Technology Research

IJSTR@Facebook IJSTR@Twitter IJSTR@Linkedin
Home About Us Scope Editorial Board Blog/Latest News Contact Us
CALL FOR PAPERS
AUTHORS
DOWNLOADS
CONTACT
QR CODE
IJSTR-QR Code

IJSTR >> Volume 4 - Issue 7, July 2015 Edition



International Journal of Scientific & Technology Research  
International Journal of Scientific & Technology Research

Website: http://www.ijstr.org

ISSN 2277-8616



An Encryption Technique Using Genetic Operators

[Full Text]

 

AUTHOR(S)

Amritha Thekkumbadan Veetil

 

KEYWORDS

Keywords: Genetic Algorithm, Crossover, Mutation, Encryption, Decryption, Secret key, Cryptography.

 

ABSTRACT

Abstract: Encryption is a tool for protecting and securing data. Security provides safety and reliability. As the need for communication is increasing day by day, there comes necessity of encrypting data in-order to ensure a secure communication. This paper presents application of genetic operators in the field of cryptography. As mostly tampering of data occurs in the network, the messages should be protected when it is transmitted through any network. This paper introduces a new encryption technique where the genetic operators ‘crossover’ and ‘mutation’ are used to encrypt messages, so as to protect the data during transmission. The goal is to provide a better encryption technique which is difficult for cryptanalysis.

 

REFERENCES

[1] Behrouz A. Forouzan , “Cryptography & Network security“, Tata McGraw – Hill, 2007.

[2] William Stallings,“Cryptography and Network Security”, 3rd Edition.

[3] S., N. Sivanandan, S. N. Deepa, “Introduction to Genetic Algorithm”,Springer Verlag Berlin Heidelberg, 2008.

[4] Ankita Agarwal, “Secret Key Encryption Algorithm Using Genetic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, April 2012.

[5] Sindhuja K , Pramela Devi S, “A Symmetric Key Encryption Technique Using Genetic Algorithm”, International Journal of Computer Science and Information Technologies, Vol. 5 (1 2014).