Uses of Genetic Algorithm in Cryptanalysis of RSA
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract : The information system security is nowadays paramount, it is for what we are focused in our research to talk about a basic of security which is cryptography, and specially about RSA algorithm, a system of coding with public key developed by Rivest, Shamir and Adleman (R.S.A in 1978).We will discuss tree points inour project, the first step is to understand operation of RSA; (preparation of the key, encryption text and decryption text), and we search how we can calculate a products of two binary numbers with a big size (p × q), and which will be the result? After that we will study the function of genetic algorithm and how we can use itto generate a new number of population that we can use them in our cryptanalysis of RSA algorithm.
Authors and Affiliations
Siham Zoubir , Abderrahim Tragha
Gesture mimicking two Wheeler differential drive Arduino based robot and iRobot Create
Abstract: The project discussed here is a gesture controlled robot having two wheels on either side just like a car. The key features described in the project are i) controlling the movement of the wheels using an embedd...
Improved and Energy Efficient Olsr Protocol Using Spanning Tree in Manet
Abstract: Mobile Adhoc Network is an autonomous and decentralized network. Its topology changes dynamically and message overhead is more due to its frequent change of topology in network. For reliable transmissio...
Review of Various Text Categorization Methods
Abstract : Measuring the similarity between documents is an important operation in the text processing field.Text categorization (also known as text classification, or topic spotting) is the task of automatically s...
Security Enforcement with query routing Information Brokering in Distributed Information Sharing
Abstract: Information brokering system (IBS) shares information via on-demand access. IBS connect large-scale loosely federated data sources via a brokering overlay. It is a peer-to-peer overlay network that comprises di...
Video Transmission over Mobile Adhoc Network Using WEAC Protocol with Zone Routing Algorithm
In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In...