Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Encryption and Decryption Using Genetic Algorithm Operations and Pseudorandom Number  
  Authors : P Srikanth; Abhinav Mehta; Neha Yadav; Sahil Singh; Shubham Singhal
  Cite as:

 

Data security is crucial for almost all businesses and home computer users. Client information, payment information, personal files, bank account details etc. are very important and hard to replace. It is potentially dangerous and can grow into a threat if it falls in the wrong hands; to protect the data encryption is one of the most widely used techniques. This paper deals with the integrity and confidentiality of data, which is transmitted through different mediums. Genetic algorithms (GAs) have many functions, in this paper we use the genetic algorithm operation such as crossover and mutation functions, genetic algorithm concepts with pseudorandom function are being used to encrypt and decrypt data. The encryption process is applied over a binary file therefore the algorithm can be applied over any type of data.

 

Published In : IJCSN Journal Volume 6, Issue 3

Date of Publication : June 2017

Pages : 455-459

Figures :04

Tables : 01

 

P Srikanth : Assistant Professor, School of Computer Science & Engineering, University of Petroleum & Energy Studies Dehradun, Uttarakhand-248007, India.

Abhinav Mehta : Student, Final year B. tech CSE-IT, School of Computer Science & Engineering, University of Petroleum & Energy Studies Dehradun, Uttarakhand-248007, India.

Neha Yadav : Student, Final year B. tech CSE-IT, School of Computer Science & Engineering, University of Petroleum & Energy Studies Dehradun, Uttarakhand-248007, India.

Sahil Singh : Student, Final year B. tech CSE-IT, School of Computer Science & Engineering, University of Petroleum & Energy Studies Dehradun, Uttarakhand-248007, India.

Shubham Singhal : Student, Final year B. tech CSE-IT, School of Computer Science & Engineering, University of Petroleum & Energy Studies Dehradun, Uttarakhand-248007, India.

 

Security, Integrity, Confidentiality, Crossover, Mutation, Pseudorandom Sequence

In this paper, a cryptography algorithm for encryption and decryption of data which uses the operations of genetic algorithm. Encryption of binary data is successful and we have satisfied our goals. Thus, we conclude that applying operations of Genetic Algorithm to provide security to the data in a file is a feasible. The algorithm is tested and results are reported, we have used multiplicative congruential generator method for the generation of pseudorandom numbers. In the future work, same algorithm we can apply for media files like images and video and testing it over.

 

[1] Stallings, W.,Cryptography and network security principles and practice (5th ed.), Boston: Pearson, (2014). [2] Deo, N., System simulation with digital computer, Prentice Hall of India Publications, (2011). [3] SuvajitDutta andTanumay Das, “a Cryptography Algorithm Using the Operations of Genetic Algorithm & Pseudo Random Sequence Generating Functions”,International Journal of Advances in Computer Science and Technology, Volume 3, (2014), ISSN 2320 – 2602. [4] David E Goldberg, “Genetic algorithms in search, optimization and machine learning”. (1989). [5] Delman, B., “Genetic Algorithms in Cryptography”,M.S. in Computer Engineering, Rochester Institute ofTechnology, Rochester, New York, July(2014). [6] Goyat, S.,“GENETIC KEY GENERATION FOR PUBLIC KEY CRYPTOGRAPHY”, International Journal of Soft Computing and Engineering (IJSCE), Volume 2(3), (2012). [7] Bhasin, H., Bhatia, S., “Applications of Genetic Algorithm in Machine learning”, IJSCIT, Volume 2(5), (2011).