Implication of Genetic Algorithm in Cryptography to Enhance Security

Abstract

In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating invertible functions are very time consuming. In traditional systems data is being encrypted with the key but still there are possibilities of eavesdrop the key and altered text. Therefore, key must be strong and unpredictable, so a method has been proposed which take the advantage of theory of natural selection. Genetic Algorithms are used to solve many problems by modeling simplified genetic processes and are considered as a class of optimization algorithms. By using Genetic Algorithm the strength of the key is improved that ultimately make the whole algorithm good enough. In the proposed method, data is encrypted by a number of steps. First, a key is generated through random number generator and by applying genetic operations. Next, data is diffused by genetic operators and then logical operators are performed between the diffused data and the key to encrypt the data. Finally, a comparative study has been carried out between our proposed method and two other cryptographic algorithms. It has been observed that the proposed algorithm has better results in terms of the key strength but is less computational efficient than other two.

Authors and Affiliations

Muhammad Irshad Nazeer, Ghulam Ali Mallah, Noor Ahmed Shaikh, Rakhi Bhatra, Raheel Ahmed Memon, Muhammad Ismail Mangrio

Keywords

Related Articles

An Object-Oriented Smartphone Application for Structural Finite Element Analysis

Smartphones are becoming increasingly ubiquitous both in general society and the workplace. Recent increases in mobile processing power have shown the current generation of smartphones has equivalent processing power to...

Automating the Collection of Object Relational Database Metrics

The quality of software systems is the most important factor to consider when designing and using these systems. The quality of the database or the database management system is particularly important as it is the backbo...

A New Hidden Web Crawling Approach

Traditional search engines deal with the Surface Web which is a set of Web pages directly accessible through hyperlinks and ignores a large part of the Web called hidden Web which is a great amount of valuable informatio...

Cognitive Neural Network Classifier for Fault Management in Cloud Data Center

Pro-actively handling the fault in data center is a means to allocate the VM to Host before failures, so that SLA meets for the tasks running in the data center. Existing solution [1] on fault prediction in datacenter is...

Online Monitoring System Design of Intelligent Circuit Breaker Based on DSP and ARM

In order to accurately analyze the dynamic characteristics of the vacuum circuit breaker, a dual-core master-slave processor structure for online monitoring system based on DSP and ARM is proposed. This structure consist...

Download PDF file
  • EP ID EP322967
  • DOI 10.14569/IJACSA.2018.090651
  • Views 74
  • Downloads 0

How To Cite

Muhammad Irshad Nazeer, Ghulam Ali Mallah, Noor Ahmed Shaikh, Rakhi Bhatra, Raheel Ahmed Memon, Muhammad Ismail Mangrio (2018). Implication of Genetic Algorithm in Cryptography to Enhance Security. International Journal of Advanced Computer Science & Applications, 9(6), 375-379. https://europub.co.uk/articles/-A-322967