Encryption and Decryption of Data by Genetic Algorithm
Keywords:
Cryptography, Genetic Algorithm, Encryption, Decryption, Key, Cipher textAbstract
This is the age of science where we deal with a huge set of data daily. Every day user shares huge amount of personal data in social sites, messaging applications, commercial sites and in other service based platforms. To accomplish transactions we need to share our credit/debit card number with passwords too, which makes the transaction very much sensitive. Randomness in the data is called Entropy. The entropy of data is directly proportional to the security of corresponding data. Security is the most favorable and mandatory feature of data transfer and storage based services. Since the quantity of data travel through the networks growing rapidly with respect to time thus enhancement in security is highly needed. According to the described variation of genetic algorithm users will have to give message as well as key also the help of these data sets, algorithm will give ciphertext and hence encryption has been achieved. At receiver’s end decryption of data takes place. The key by which encryption has been done in this algorithm is combination of two matrix of equal length. It will increase the security because of dependency on both the matrix.
References
U. Bodenhofer “Genetic Algorithms: Theory and Applications”, Fuzzy Logic Laboratorium Linz- Hagen berg, Austria, pp. 53-57, 2003.
A. Soni, S. Agrawal, "Using Genetic Algorithm for Symmetric key Generation in Image Encryption", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol.1, Issue.10, pp. 137-141, 2012
S. Prajapat, A. Jain, R.S.Thakur, “A Novel Approach For Information Security with Automatic Variable Key Using Fibonacci QMatrix”, International Journal of Computer & Communication Technology (IJCCT), Vol.3, Issue.3, pp. 54-57, 2012,
S. Mewada, P. Sharma, S.S. Gautam, "Exploration of efficient symmetric algorithms", 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), India, 2016, pp. 663-666.
A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
W. Stalling, "Cryptography and Network Security", Pearson Education, USA, pp.327-365, 2008.
A. Kumar , K. Chatarjee, "An Efficient Stream Cipher using Genetic Algorithm", Proceedings IEEE-WISPNET, India, Page-2322-2326, 2016
C. Guo, X. Yang, "A Programming of Genetic Algorithm in Matlab7.0", Modern Applied Science, Vol.5, Issue.1, pp. 230-236, 2015.
C.R. Gaidhani, V.M. Deshpande, V.N. Bora, "Image Steganography for Message Hiding Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.67-70, 2014.
S. Prajapat, R. S. Thakur, “Various Approaches towards Cryptanalysis”, International Journal of Computer Applications, Vol.127, Issue.14, pp.15-24, 2015.
Downloads
Published
How to Cite
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
Authors contributing to this journal agree to publish their articles under the Creative Commons Attribution 4.0 International License, allowing third parties to share their work (copy, distribute, transmit) and to adapt it, under the condition that the authors are given credit and that in the event of reuse or distribution, the terms of this license are made clear.