Home
Call For Papers
Submission
Author
Registration
Publications
About
Contact Us

  Text Encryption Using Genetic Algorithm  
  Authors : Dr.Alsadig Mohammed Abdallah; Dr.Mandour Mohammed Ibrahim
  Cite as:

 

At this time with the evolution of technology and the spread of computer networks to the great expansion in the online networks around the world, making all transactions based on the use of computers, such as storing important information on the various storage media, changing text messages, images and multimedia across the network, electronic banking, e-commerce and electronic payment operations using (credit cards, visa card, MasterCard), making the information vulnerable to espionage and hack by vandals and hackers, so it must find ways to protect this information because of the great importance. There are many different text encryption methods to convert text from plain text to cipher text. In this research we will introduce the method that using Genetic Algorithms (GA) which is used to produce encryption method based on (Crossover and Mutation). The proposed encryption method in this study has been tested on some texts and we have got excellent results.

 

Published In : IJCSN Journal Volume 8, Issue 1

Date of Publication : February 2019

Pages : 36-39

Figures :--

Tables : --

 

Dr.Alsadig Mohammed Abdallah : Information Technology Department, College of Computer and Information Sciences, AL-Imam Muhammad ibn Saud Islamic University, Kingdom of Saudi Arabia.

Dr.Mandour Mohammed Ibrahim : Information Technology Department, College of Computer and Information Sciences, AL-Imam Muhammad ibn Saud Islamic University, Kingdom of Saudi Arabia.

 

Genetic Algorithm, Crossover, Mutation, Cryptography, Hackers

A cryptography algorithm for encryption and decryption of data which uses the operations of genetic algorithm. Encryption of binary data is successful and we have satisfied our goals. Thus, we conclude that applying operations of Genetic Algorithm to provide security to the data in a file is possible.

 

1-( Sania Jawaid, Anam Saiyeda, Naba Suroor . Selection of Fittest Key Using Genetic Algorithm and Autocorrelation in Cryptography, Science and Education publishing 2- Amritha Thekkumbadan Veetil, An Encryption Technique Using Genetic Operators, INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME 4, ISSUE 07, JULY 2015 3- Aarti Soni, Suyash Agrawal,Using Genetic Algorithm for Symmetric key Generation in Image Encryption. 4- P Srikanth; Abhinav Mehta; Neha Yadav; Sahil Singh; Shubham Singhal, Encryption and Decryption Using Genetic Algorithm Operations and Pseudorandom Number 5- Mohammed Alhusainy ,image encryption using Genetic Algorithms, information technology journal,2006 6- A Guide to Intelligent Systems,Michael Negnevitsky -Second Edition,2005 7- A Comparison of Crossover and Mutation in Genetic Programming,Sean Luke And Lee Specto 8-Adaptive probabilities of crossover and mutation in genetic algorithms,M. Srinivas Dept. of Comput. IEEE). 9- Symmetric Key Encryption using Genetic Algorithm,Dr. Poornima G. Naik,Mr. Girish R. Naik ,2014).