Uses of Genetic Algorithm in Cryptanalysis of RSA

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3

Abstract

Abstract : The information system security is nowadays paramount, it is for what we are focused in our research to talk about a basic of security which is cryptography, and specially about RSA algorithm, a system of coding with public key developed by Rivest, Shamir and Adleman (R.S.A in 1978).We will discuss tree points inour project, the first step is to understand operation of RSA; (preparation of the key, encryption text and decryption text), and we search how we can calculate a products of two binary numbers with a big size (p × q), and which will be the result? After that we will study the function of genetic algorithm and how we can use itto generate a new number of population that we can use them in our cryptanalysis of RSA algorithm.

Authors and Affiliations

Siham Zoubir , Abderrahim Tragha

Keywords

Related Articles

 Gesture mimicking two Wheeler differential drive Arduino based robot and iRobot Create

Abstract: The project discussed here is a gesture controlled robot having two wheels on either side just like a car. The key features described in the project are i) controlling the movement of the wheels using an embedd...

 Improved and Energy Efficient Olsr Protocol Using Spanning Tree in Manet

 Abstract: Mobile Adhoc Network is an autonomous and decentralized network. Its topology changes dynamically and message overhead is more due to its frequent change of topology in network. For reliable transmissio...

 Review of Various Text Categorization Methods

 Abstract : Measuring the similarity between documents is an important operation in the text processing field.Text categorization (also known as text classification, or topic spotting) is the task of automatically s...

 Security Enforcement with query routing Information Brokering in Distributed Information Sharing

Abstract: Information brokering system (IBS) shares information via on-demand access. IBS connect large-scale loosely federated data sources via a brokering overlay. It is a peer-to-peer overlay network that comprises di...

 Video Transmission over Mobile Adhoc Network Using WEAC Protocol with Zone Routing Algorithm

 In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In...

Download PDF file
  • EP ID EP143833
  • DOI -
  • Views 100
  • Downloads 0

How To Cite

Siham Zoubir, Abderrahim Tragha (2016). Uses of Genetic Algorithm in Cryptanalysis of RSA. IOSR Journals (IOSR Journal of Computer Engineering), 18(3), 48-52. https://europub.co.uk/articles/-A-143833