A Novel Approach to Genetic Algorithm based Cryptography

Download Full Text
Author(s):
Farhat Ullah Khan, Surbhi Bhatia
Published Date:
April 30, 2012
Issue:
Volume 2, Issue 3
Page(s):
7 - 10
DOI:
10.7815/ijorcs.23.2012.022
Views:
4911
Downloads:
979

Keywords:
cryptography, genetic algorithms, one time pad, vernam cipher
Citation:
Farhat Ullah Khan, Surbhi Bhatia, "A Novel Approach to Genetic Algorithm based Cryptography". International Journal of Research in Computer Science, 2 (3): pp. 7-10, April 2012. doi:10.7815/ijorcs.23.2012.022 Other Formats

Abstract

Cryptography is immensely essential ingredient of network security. Public Key Cryptography, one of the most important forms of cryptography, requires the key to be unique and non- repeating. There are two ways of producing the key. One is rigorous mathematically strong algorithmic approach like AES and the other is the approach that mimics nature. The work presented explores various attempts that have been made in this direction and suggests a new technique using Genetic Algorithms. The technique has been implemented and analyzed. The results obtained are encouraging. The samples satisfy most of the tests including gap test, frequency test etc thus strengthening the belief that the algorithm is as strong, if not better than any of the mathematically strong approach.

  1. Harsh Bhasin, Nakul Arora, Reliability Infocom Technology and Optimization 2010, Conference Proceedings pages 226- 230.
  2. Bethany Delman, Genetic Algorithms in Cryptography, MS Thesis 2004.
  3. ABDELSALAM ALMARIMI et al, A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS, Published in: Proceeding CERMA '10 Proceedings of the 2010 IEEE Electronics, Robotics and Automotive Mechanics Conference
  4. Menezes, A., van Oorschot, P., & Vanstone, S. (1997). Handbook of Applied Cryptography Boca Raton: CRC Press
  5. Norman D. Jorstad, CRYPTOGRAPHIC ALGORITHM METRICS, January 1997
  6. Harsh Bhasin, Surbhi Bhatia, Use of Genetic Algorithms for Finding Roots of Algebraic Equations, IJCSIT, Volume 2, Issue 4, Pages 1693-1696
  7. Harsh Bhasin, Supreet Singh, GA-Correlation Based Rule Generation for Expert Systems, IJCSIT, Volume 3, Issue 2, Pages 3733-3736
  8. Harsh Bhasin, Surbhi Bhatia, Application of Genetic Algorithms in Machine learning, IJCSIT, Volume 2, Issue 5, Pages 2412-2415
  9. Stephen Wolfram, Cellular Automata And Complexity: Collected Papers, 1994, ISBN 0-201-62716-7.
  10. Thomson, J. J. (Joseph John), 7 Mar 2010, The corpuscular theory of matter .
  11. Raymond Kan, Xiaulo Wang (November 2008), On the Distribution of the sample Autocorrelation Coefficients.

  • Mishra, Swati, and Siddharth Bali. "Public key cryptography using genetic algorithm." International Journal of Recent Technology and Engineering 2.2 (2013): 150-154.
  • Ratan, Ram. "Applications of genetic algorithms in cryptology." Proceedings of the Third International Conference on Soft Computing for Problem Solving. Springer India, 2014.
  • Pareek, Narendra K., and Vinod Patidar. "Medical image protection using genetic algorithm operations." Soft Computing (2014): 1-10.
  • Hassan, Abdel-karim SO, Ahmed F. Shalash, and Naglaa F. Saudy. "MODIFICATIONS ON RSA CRYPTOSYSTEM USING GENETIC OPTIMIZATION." International Journal of Research and Reviews in Applied Sciences 19.2 (2014): 150.
  • Bhasin, Harsh, and Neha Kathuria. "Cryptography Automata Based Key Generation." International Journal of Scientific Research in Network Security and Communication 1.02 (2013): 15-17.
  • Bagane, Ms Pooja A., and Kshama V. Kulhalli. "Genetic Algorithm for Cryptography: A Review."
  • PAQUELIN, DIDIER, and NASSIM BEN GHMISS. "LA GESTION DU RISQUE DANS LE TRAITEMENT DES INFORMATIONS SENSIBLES." (RISK MANAGEMENT IN THE TREATMENT OF SENSITIVE INFORMATION).