Full Paper View Go Back

Encryption and Decryption of Data by Genetic Algorithm

S. Dubey1 , R. Jhaggar2 , R. Verma3 , D. Gaur4

  1. International Institute of Professional Studies, Devi Ahilya University , Indore, India.
  2. International Institute of Professional Studies, Devi Ahilya University , Indore, India.
  3. International Institute of Professional Studies, Devi Ahilya University , Indore, India.
  4. School of Computer Science and Information Technology, Devi Ahilya University, Indore, India.

Correspondence should be addressed to: shubhamdubey1312@gmail.com.


Section:Research Paper, Product Type: Isroset-Journal
Vol.5 , Issue.3 , pp.47-52, Jun-2017


Online published on Jun 30, 2017


Copyright © S. Dubey, R. Jhaggar, R. Verma, D. Gaur . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
 

View this paper at   Google Scholar | DPI Digital Library


XML View     PDF Download

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: S. Dubey, R. Jhaggar, R. Verma, D. Gaur, “Encryption and Decryption of Data by Genetic Algorithm,” International Journal of Scientific Research in Computer Science and Engineering, Vol.5, Issue.3, pp.47-52, 2017.

MLA Style Citation: S. Dubey, R. Jhaggar, R. Verma, D. Gaur "Encryption and Decryption of Data by Genetic Algorithm." International Journal of Scientific Research in Computer Science and Engineering 5.3 (2017): 47-52.

APA Style Citation: S. Dubey, R. Jhaggar, R. Verma, D. Gaur, (2017). Encryption and Decryption of Data by Genetic Algorithm. International Journal of Scientific Research in Computer Science and Engineering, 5(3), 47-52.

BibTex Style Citation:
@article{Dubey_2017,
author = {S. Dubey, R. Jhaggar, R. Verma, D. Gaur},
title = {Encryption and Decryption of Data by Genetic Algorithm},
journal = {International Journal of Scientific Research in Computer Science and Engineering},
issue_date = {6 2017},
volume = {5},
Issue = {3},
month = {6},
year = {2017},
issn = {2347-2693},
pages = {47-52},
url = {https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=389},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.isroset.org/journal/IJSRCSE/full_paper_view.php?paper_id=389
TI - Encryption and Decryption of Data by Genetic Algorithm
T2 - International Journal of Scientific Research in Computer Science and Engineering
AU - S. Dubey, R. Jhaggar, R. Verma, D. Gaur
PY - 2017
DA - 2017/06/30
PB - IJCSE, Indore, INDIA
SP - 47-52
IS - 3
VL - 5
SN - 2347-2693
ER -

500 Views    474 Downloads    212 Downloads
  
  

Abstract :
This is the age of science where we deal with a huge set of data daily. Every day user shares huge amount of personal data in social sites, messaging applications, commercial sites and in other service based platforms. To accomplish transactions we need to share our credit/debit card number with passwords too, which makes the transaction very much sensitive. Randomness in the data is called Entropy. The entropy of data is directly proportional to the security of corresponding data. Security is the most favorable and mandatory feature of data transfer and storage based services. Since the quantity of data travel through the networks growing rapidly with respect to time thus enhancement in security is highly needed. According to the described variation of genetic algorithm users will have to give message as well as key also the help of these data sets, algorithm will give ciphertext and hence encryption has been achieved. At receiver’s end decryption of data takes place. The key by which encryption has been done in this algorithm is combination of two matrix of equal length. It will increase the security because of dependency on both the matrix.

Key-Words / Index Term :
Cryptography, Genetic Algorithm, Encryption, Decryption, Key, Cipher text

References :
[1] U. Bodenhofer “Genetic Algorithms: Theory and Applications”, Fuzzy Logic Laboratorium Linz- Hagen berg, Austria, pp. 53-57, 2003.
[2] A. Soni, S. Agrawal, "Using Genetic Algorithm for Symmetric key Generation in Image Encryption", International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), Vol.1, Issue.10, pp. 137-141, 2012
[3] S. Prajapat, A. Jain, R.S.Thakur, “A Novel Approach For Information Security with Automatic Variable Key Using Fibonacci QMatrix”, International Journal of Computer & Communication Technology (IJCCT), Vol.3, Issue.3, pp. 54-57, 2012,
[4] S. Mewada, P. Sharma, S.S. Gautam, "Exploration of efficient symmetric algorithms", 2016 3rd International Conference on Computing for Sustainable Global Development (INDIACom), India, 2016, pp. 663-666.
[5] A. Sharma, RS Thakur, S. Jaloree, "Investigation of Efficient Cryptic Algorithm for image files Encryption in Cloud", International Journal of Scientific Research in Computer Science and Engineering, Vol.4, Issue.5, pp.5-11, 2016.
[6] W. Stalling, "Cryptography and Network Security", Pearson Education, USA, pp.327-365, 2008.
[7] A. Kumar , K. Chatarjee, "An Efficient Stream Cipher using Genetic Algorithm", Proceedings IEEE-WISPNET, India, Page-2322-2326, 2016
[8] C. Guo, X. Yang, "A Programming of Genetic Algorithm in Matlab7.0", Modern Applied Science, Vol.5, Issue.1, pp. 230-236, 2015.
[9] C.R. Gaidhani, V.M. Deshpande, V.N. Bora, "Image Steganography for Message Hiding Using Genetic Algorithm", International Journal of Computer Sciences and Engineering, Vol.2, Issue.3, pp.67-70, 2014.
[10] S. Prajapat, R. S. Thakur, “Various Approaches towards Cryptanalysis”, International Journal of Computer Applications, Vol.127, Issue.14, pp.15-24, 2015.

Authorization Required

 

You do not have rights to view the full text article.
Please contact administration for subscription to Journal or individual article.
Mail us at  support@isroset.org or view contact page for more details.

Go to Navigation