Uses of Genetic Algorithm in Cryptanalysis of RSA
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Abstract : The information system security is nowadays paramount, it is for what we are focused in our research to talk about a basic of security which is cryptography, and specially about RSA algorithm, a system of coding with public key developed by Rivest, Shamir and Adleman (R.S.A in 1978).We will discuss tree points inour project, the first step is to understand operation of RSA; (preparation of the key, encryption text and decryption text), and we search how we can calculate a products of two binary numbers with a big size (p × q), and which will be the result? After that we will study the function of genetic algorithm and how we can use itto generate a new number of population that we can use them in our cryptanalysis of RSA algorithm.
Authors and Affiliations
Siham Zoubir , Abderrahim Tragha
An Improved Non-Blind Digital Image Watermarking on Hadamard Transform for Image Authentication
Abstract : With the advent of internet digital media has been improving with massive advancement in recent years. The distribution of unauthorized copies of media content has also been increasing day by day. Because of e...
A Fuzzy & K-L Based Reduced Reference ImageQuality
Abstract: Reduced-reference (RR) image quality measures aim to predict the visual quality of distorted images with only partial information about the reference images. In this paper, in first stage uses present threshold...
Development of a D.C Circuit Analysis Software Using MicrosoftVisual C#.Net
Abstract: In this paper, the development of D.C circuit simulation software, using Microsoft visual C#.net, hasbeen achieved. This paper aims at (i) analysing a purely resistive planar circuit, (ii) displaying curr...
Study and Analysis of Routing Protocol in Manet
Abstract: AMobile Ad-hoc Network (MANET) is a network that has the ability to communicate each other without any fixed network. It has the capacity to take decisions on its own. MANET has no infrastructure. The bri...
Finding Fast Changing Patterns In the presence of hierarchy
History Generalized Algorithm is used in this paper which is used to find the generalized as well as non generalized itemsets .after finding those itemsets find out the particular node in the tree structure and at...