Implication of Genetic Algorithm in Cryptography to Enhance Security

In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating inver...

Full description

Saved in:
Bibliographic Details
Published inInternational journal of advanced computer science & applications Vol. 9; no. 6
Main Authors Nazeer, Muhammad Irshad, Ali, Ghulam, Ahmed, Noor, Bhatra, Rakhi, Ahmed, Raheel, Ismail, Muhammad
Format Journal Article
LanguageEnglish
Published West Yorkshire Science and Information (SAI) Organization Limited 2018
Subjects
Online AccessGet full text
ISSN2158-107X
2156-5570
2156-5570
DOI10.14569/IJACSA.2018.090651

Cover

More Information
Summary:In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating invertible functions are very time consuming. In traditional systems data is being encrypted with the key but still there are possibilities of eavesdrop the key and altered text. Therefore, key must be strong and unpredictable, so a method has been proposed which take the advantage of theory of natural selection. Genetic Algorithms are used to solve many problems by modeling simplified genetic processes and are considered as a class of optimization algorithms. By using Genetic Algorithm the strength of the key is improved that ultimately make the whole algorithm good enough. In the proposed method, data is encrypted by a number of steps. First, a key is generated through random number generator and by applying genetic operations. Next, data is diffused by genetic operators and then logical operators are performed between the diffused data and the key to encrypt the data. Finally, a comparative study has been carried out between our proposed method and two other cryptographic algorithms. It has been observed that the proposed algorithm has better results in terms of the key strength but is less computational efficient than other two.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2158-107X
2156-5570
2156-5570
DOI:10.14569/IJACSA.2018.090651