Data security is crucial for almost all businesses and home computer users. Client information, payment information,
personal files, bank account details etc. are very important and hard to replace. It is potentially dangerous and can grow into a threat if it
falls in the wrong hands; to protect the data encryption is one of the most widely used techniques. This paper deals with the integrity and
confidentiality of data, which is transmitted through different mediums. Genetic algorithms (GAs) have many functions, in this paper we
use the genetic algorithm operation such as crossover and mutation functions, genetic algorithm concepts with pseudorandom function
are being used to encrypt and decrypt data. The encryption process is applied over a binary file therefore the algorithm can be applied
over any type of data.
Published In:IJCSN Journal Volume 6, Issue 3
Date of Publication : June 2017
Pages : 455-459
Figures :04
Tables : 01
P Srikanth : Assistant Professor, School of Computer Science & Engineering,
University of Petroleum & Energy Studies
Dehradun, Uttarakhand-248007, India.
Abhinav Mehta : Student, Final year B. tech CSE-IT, School of Computer Science & Engineering,
University of Petroleum & Energy Studies
Dehradun, Uttarakhand-248007, India.
Neha Yadav : Student, Final year B. tech CSE-IT, School of Computer Science & Engineering,
University of Petroleum & Energy Studies
Dehradun, Uttarakhand-248007, India.
Sahil Singh : Student, Final year B. tech CSE-IT, School of Computer Science & Engineering,
University of Petroleum & Energy Studies
Dehradun, Uttarakhand-248007, India.
Shubham Singhal : Student, Final year B. tech CSE-IT, School of Computer Science & Engineering,
University of Petroleum & Energy Studies
Dehradun, Uttarakhand-248007, India.
In this paper, a cryptography algorithm for encryption and
decryption of data which uses the operations of genetic
algorithm. Encryption of binary data is successful and we
have satisfied our goals. Thus, we conclude that applying
operations of Genetic Algorithm to provide security to the
data in a file is a feasible.
The algorithm is tested and results are reported, we have
used multiplicative congruential generator method for the
generation of pseudorandom numbers. In the future work,
same algorithm we can apply for media files like images
and video and testing it over.
[1] Stallings, W.,Cryptography and network security
principles and practice (5th ed.), Boston: Pearson, (2014).
[2] Deo, N., System simulation with digital computer,
Prentice Hall of India Publications, (2011).
[3] SuvajitDutta andTanumay Das, “a Cryptography
Algorithm Using the Operations of Genetic Algorithm &
Pseudo Random Sequence Generating
Functions”,International Journal of Advances in
Computer Science and Technology, Volume 3, (2014),
ISSN 2320 – 2602.
[4] David E Goldberg, “Genetic algorithms in search,
optimization and machine learning”. (1989).
[5] Delman, B., “Genetic Algorithms in Cryptography”,M.S.
in Computer Engineering, Rochester Institute
ofTechnology, Rochester, New York, July(2014).
[6] Goyat, S.,“GENETIC KEY GENERATION FOR
PUBLIC KEY CRYPTOGRAPHY”, International
Journal of Soft Computing and Engineering (IJSCE),
Volume 2(3), (2012).
[7] Bhasin, H., Bhatia, S., “Applications of Genetic
Algorithm in Machine learning”, IJSCIT, Volume 2(5),
(2011).