scispace - formally typeset
Open AccessJournal ArticleDOI

A Study on Cryptography using Genetic Algorithm

Rajat Jhingran, +2 more
- 20 May 2015 - 
- Vol. 118, Iss: 20, pp 10-14
Reads0
Chats0
TLDR
This paper proposes a new approach for e-security applications using the concept of genetic algorithms with pseudorandom sequence to encrypt and decrypt data stream and presents application of GA in the field of cryptography.
Abstract
Cryptography is a basic tool for protection and securing data. Security provides safety, reliability and accuracy. Genetic Algorithm (GA) is typically used to obtain solution for optimization and search problems. This paper presents application of GA in the field of cryptography. The selection of key in the field ofpublic key cryptography is a selection process in which keys can be categorized on the basis of their fitness function, making GA a better candidate for the key generation. We propose a new approach for e-security applications using the concept of genetic algorithms with pseudorandom sequence to encrypt and decrypt data stream. Many different image encryption methods have been proposed to keep the security of these images. Image encryption algorithms try to convert an image to another image that is hard to understand.

read more

Content maybe subject to copyright    Report

Citations
More filters
Journal ArticleDOI

Best Fit DNA-Based Cryptographic Keys: The Genetic Algorithm Approach

TL;DR: A Genetic Algorithm inspired method to strengthen weak keys obtained from Random DNA-based Key Generators instead of completely discarding them is proposed.
Journal ArticleDOI

CryptoGA: a cryptosystem based on genetic algorithm for cloud data security

TL;DR: Experimental results analysis show that the proposed model, CryptoGA, is robust and provides better performance on selected parameters as compared to state-of-the-art cryptographic algorithms i.e. DES, 3DES, RSA, Blowfish, and AES.
Journal ArticleDOI

Implication of Genetic Algorithm in Cryptography to Enhance Security

TL;DR: It has been observed that the proposed algorithm has better results in terms of the key strength but is less computational efficient than other two.
Journal ArticleDOI

Fuzzy Genetic Elliptic Curve Diffie Hellman Algorithm for Secured Communication in Networks

TL;DR: The intelligent rules are used for ranking during key selection process, multi attribute decision making model with fuzzy reasoning for obtaining keys and genetic algorithms for effective optimization of computation in ECC contributes to obtain the proposed FGECDH algorithm.
Proceedings ArticleDOI

A bio-inspired model to provide data security in cloud storage

TL;DR: A security mechanism to improve the security of data in cloud storage is suggested and it is suggested that the data need to be encrypted before being stored on the cloud.
References
More filters
Book

Handbook of computational geometry

TL;DR: The Davenport-Schinzel sequences and their geometric applications, as well as randomizedalgorithms in computaional geometry, are described.
Proceedings ArticleDOI

ICIGA: Improved Cryptography Inspired by Genetic Algorithms

TL;DR: A symmetrical blocks ciphering system, that is an improvement of the cryptosystem inspired from genetic algorithm published in AMSE periodical, that the user can choose the size blocks and the length key.
Proceedings ArticleDOI

Real Time Video Processing on FPGA Using on the Fly Partial Reconfiguration

TL;DR: The implementation of mean and median filters for real time video signal on Virtex-4 FPGA using Partial reconfiguration is described and considerable savings in device resources, bit stream size and configuration time is observed.
Proceedings ArticleDOI

Image encryption using genetic algorithm

TL;DR: Experimental results show that the proposed method can be used effectively for image encryption and randomness of the encrypted image is measured by entropy, correlation coefficients and histogram analysis.
Related Papers (5)