Implication of Genetic Algorithm in Cryptography to Enhance Security

Abstract

In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating invertible functions are very time consuming. In traditional systems data is being encrypted with the key but still there are possibilities of eavesdrop the key and altered text. Therefore, key must be strong and unpredictable, so a method has been proposed which take the advantage of theory of natural selection. Genetic Algorithms are used to solve many problems by modeling simplified genetic processes and are considered as a class of optimization algorithms. By using Genetic Algorithm the strength of the key is improved that ultimately make the whole algorithm good enough. In the proposed method, data is encrypted by a number of steps. First, a key is generated through random number generator and by applying genetic operations. Next, data is diffused by genetic operators and then logical operators are performed between the diffused data and the key to encrypt the data. Finally, a comparative study has been carried out between our proposed method and two other cryptographic algorithms. It has been observed that the proposed algorithm has better results in terms of the key strength but is less computational efficient than other two.

Authors and Affiliations

Muhammad Irshad Nazeer, Ghulam Ali Mallah, Noor Ahmed Shaikh, Rakhi Bhatra, Raheel Ahmed Memon, Muhammad Ismail Mangrio

Keywords

Related Articles

 Digital Image Watermarking Technique Based on Different Attacks

 Digital watermarking is used to hide the information inside a signal, which cannot be easily extracted by the third party. Its widely used application is copyright protection of digital information. It is different...

A Comparative Study of Classification Algorithms using Data Mining: Crime and Accidents in Denver City the USA

In the last five years, crime and accidents rates have increased in many cities of America. The advancement of new technologies can also lead to criminal misuse. In order to reduce incidents, there is a need to understan...

Weighted Minkowski Similarity Method with CBR for Diagnosing Cardiovascular Disease

This study implements Case-Based Reasoning (CBR) to make the early diagnosis of cardiovascular disease based on the calculation of the feature similarity of old cases. The features used to match old cases with new ones...

RTS/CTS Framework Paradigm and WLAN Qos Provisioning Methods

Wireless local area network (WLAN) communications performance design and management have evolved a lot to be where they are today. They went through some technology’s amendments and innovations. But, some performance too...

Analysis of Accuracy and Precision of WLAN Position Estimation System based on RSS

The coordinates of the position of a wireless access point are the main goal in the wireless localization technique. In common, outdoor wireless localization techniques use the trilateration method by installing several...

Download PDF file
  • EP ID EP322967
  • DOI 10.14569/IJACSA.2018.090651
  • Views 109
  • Downloads 1

How To Cite

Muhammad Irshad Nazeer, Ghulam Ali Mallah, Noor Ahmed Shaikh, Rakhi Bhatra, Raheel Ahmed Memon, Muhammad Ismail Mangrio (2018). Implication of Genetic Algorithm in Cryptography to Enhance Security. International Journal of Advanced Computer Science & Applications, 9(6), 375-379. https://europub.co.uk/articles/-A-322967