Implication of Genetic Algorithm in Cryptography to Enhance Security

Abstract

In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating invertible functions are very time consuming. In traditional systems data is being encrypted with the key but still there are possibilities of eavesdrop the key and altered text. Therefore, key must be strong and unpredictable, so a method has been proposed which take the advantage of theory of natural selection. Genetic Algorithms are used to solve many problems by modeling simplified genetic processes and are considered as a class of optimization algorithms. By using Genetic Algorithm the strength of the key is improved that ultimately make the whole algorithm good enough. In the proposed method, data is encrypted by a number of steps. First, a key is generated through random number generator and by applying genetic operations. Next, data is diffused by genetic operators and then logical operators are performed between the diffused data and the key to encrypt the data. Finally, a comparative study has been carried out between our proposed method and two other cryptographic algorithms. It has been observed that the proposed algorithm has better results in terms of the key strength but is less computational efficient than other two.

Authors and Affiliations

Muhammad Irshad Nazeer, Ghulam Ali Mallah, Noor Ahmed Shaikh, Rakhi Bhatra, Raheel Ahmed Memon, Muhammad Ismail Mangrio

Keywords

Related Articles

A Framework to Improve Communication and Reliability Between Cloud Consumer and Provider in the Cloud

Cloud services consumers demand reliable methods for choosing appropriate cloud service provider for their requirements. Number of cloud consumer is increasing day by day and so cloud providers, hence requirement for a c...

Security Issues in the Internet of Things (IoT): A Comprehensive Study

Wireless communication networks are highly prone to security threats. The major applications of wireless communication networks are in military, business, healthcare, retail, and transportations. These systems use wired,...

Development of the System to Support Tourists’ Excursion Behavior using Augmented Reality

The purpose of this study is to develop an information system (AR recommended GIS) to support tourists’ excursion behavior by making the accumulating, sharing, and recommending of information concerning urban tourist spo...

An Agglomerative Hierarchical Clustering with Association Rules for Discovering Climate Change Patterns

Ozone analysis is the process of identifying meaningful patterns that would facilitate the prediction of future trends. One of the common techniques that have been used for ozone analysis is the clustering technique. Clu...

Role Based Multi-Agent System for E-Learning (MASeL)

Software agents are autonomous entities that can interact intelligently with other agents as well as their environment in order to carry out a specific task. We have proposed a role-based multi-agent system for e-learnin...

Download PDF file
  • EP ID EP322967
  • DOI 10.14569/IJACSA.2018.090651
  • Views 77
  • Downloads 0

How To Cite

Muhammad Irshad Nazeer, Ghulam Ali Mallah, Noor Ahmed Shaikh, Rakhi Bhatra, Raheel Ahmed Memon, Muhammad Ismail Mangrio (2018). Implication of Genetic Algorithm in Cryptography to Enhance Security. International Journal of Advanced Computer Science & Applications, 9(6), 375-379. https://europub.co.uk/articles/-A-322967