Alok Singh Jadaun : is currently persuing his M.Tech (C.S.E. II
Year) from Bhagwant University Ajmer (Rajasthan).
Er. Vikas Chaudhary : is currently working in Department of
Computer Science & Engineering as a Head of Department in
Bhagwant University Ajmer. He is M.tech(cs).
Er. Lavkush Sharma : is currently working in Department in
Computer Science & Engineering as a Assistant Professor in
Raja Balwant Singh Engineering Technical Campus Bichpuri
Agra. He is M.tech(C.S.) and 10 years teaching experience.
Gajendra Pal Singh : is currently persuing B.Tech (IV) year in
Computer Science & Engineering from Raja Balwant Singh
Engineering & Technical Campus Bichpuri Agra.
[1] Clark, A.J., “Optimization Heuristics for Cryptology”.
Thesis PhD, in Information Security Research Centre,
Faculty of Information Technology, Queensland
University of Technology, February 1998.
[2] Stallings, W., "Cryptography And Network Security,
Principle And Practices", 3rd Edition, Pearson
Education, 2005.
[3] Rolf,O., "Contemporary Cryptography" Artech House
Computer Security Series, Boston- London, 2005.
[4] William Stallings., “Cryptography and Network
Security, Principles and Practices”, 3rd edition,
Pearson Education, 2004.
[5] Andrew John Clark, “Optimization Heuristics for
Cryptology” / PhD thesis, Information Security
Research Centre Faculty of Information Technology
Queensland University of Technology, February
1998.
[6] Andrew John Clark, “Optimization Heuristics for
Cryptology” / PhD thesis, Information Security
Research Centre Faculty of Information Technology
Queensland University of Technology, February
1998.
[7] David E. Goldberg, “Genetic Algorithms in search,
Optimization and Machine Learning,”, New Delhi:
Dorling Kindersley (India), pp. 7.
[8] A.S.Al-Khalid, S.S. Omran Dalal, A.Hammood,
“Using Genetic Algorithms To Break A Simple
Transposition Cipher”, Foundation of Technical
Education College Of Elec. & Electronic Techniques
(Baghdad-IRAQ), May 8, 2013.
[9] R.Toemeh, Department of computer Science and
Engineering, Government College of Technology,
S.Arumugam, Additional Director, Directorate of
technical education, Chennai, India, “Breaking
Transposition Cipher With Genetic Algorithm”,2007.
[10] Karel P.Bergmann, Renate Scheidler, Christian Jacob,
“Cryptanalysis Using Genetic Algorithms”,
University Of Calagary 2500 University Dr. NW
Calgary, AB, Canda, Page no 1099,1100.