Implication of Genetic Algorithm in Cryptography to Enhance Security
In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating inver...
Saved in:
| Published in | International journal of advanced computer science & applications Vol. 9; no. 6 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
West Yorkshire
Science and Information (SAI) Organization Limited
2018
|
| Subjects | |
| Online Access | Get full text |
| ISSN | 2158-107X 2156-5570 2156-5570 |
| DOI | 10.14569/IJACSA.2018.090651 |
Cover
| Abstract | In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating invertible functions are very time consuming. In traditional systems data is being encrypted with the key but still there are possibilities of eavesdrop the key and altered text. Therefore, key must be strong and unpredictable, so a method has been proposed which take the advantage of theory of natural selection. Genetic Algorithms are used to solve many problems by modeling simplified genetic processes and are considered as a class of optimization algorithms. By using Genetic Algorithm the strength of the key is improved that ultimately make the whole algorithm good enough. In the proposed method, data is encrypted by a number of steps. First, a key is generated through random number generator and by applying genetic operations. Next, data is diffused by genetic operators and then logical operators are performed between the diffused data and the key to encrypt the data. Finally, a comparative study has been carried out between our proposed method and two other cryptographic algorithms. It has been observed that the proposed algorithm has better results in terms of the key strength but is less computational efficient than other two. |
|---|---|
| AbstractList | In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for high level of security. Modern hash function based systems are better than traditional systems but the complex algorithms of generating invertible functions are very time consuming. In traditional systems data is being encrypted with the key but still there are possibilities of eavesdrop the key and altered text. Therefore, key must be strong and unpredictable, so a method has been proposed which take the advantage of theory of natural selection. Genetic Algorithms are used to solve many problems by modeling simplified genetic processes and are considered as a class of optimization algorithms. By using Genetic Algorithm the strength of the key is improved that ultimately make the whole algorithm good enough. In the proposed method, data is encrypted by a number of steps. First, a key is generated through random number generator and by applying genetic operations. Next, data is diffused by genetic operators and then logical operators are performed between the diffused data and the key to encrypt the data. Finally, a comparative study has been carried out between our proposed method and two other cryptographic algorithms. It has been observed that the proposed algorithm has better results in terms of the key strength but is less computational efficient than other two. |
| Author | Ahmed, Noor Ismail, Muhammad Ahmed, Raheel Bhatra, Rakhi Ali, Ghulam Nazeer, Muhammad Irshad |
| Author_xml | – sequence: 1 givenname: Muhammad Irshad surname: Nazeer fullname: Nazeer, Muhammad Irshad – sequence: 2 givenname: Ghulam surname: Ali fullname: Ali, Ghulam – sequence: 3 givenname: Noor surname: Ahmed fullname: Ahmed, Noor – sequence: 4 givenname: Rakhi surname: Bhatra fullname: Bhatra, Rakhi – sequence: 5 givenname: Raheel surname: Ahmed fullname: Ahmed, Raheel – sequence: 6 givenname: Muhammad surname: Ismail fullname: Ismail, Muhammad |
| BookMark | eNptkF9LwzAUxYNMcM59Al8KPnfmf5vHMeecDHyYgm8hS9Mto0tqmiH99tZVEKb35d6Hc-45_K7BwHlnALhFcIIo4-J--TydracTDFE-gQJyhi7AECPGU8YyODjdeYpg9n4Fxk2zh90QgXlOhuBheagrq1W03iW-TBbGmWh1Mq22Pti4OyTWJbPQ1tFvg6p3bRJ9Mnc75bRJ1kYfO1F7Ay5LVTVm_LNH4O1x_jp7Slcvi-Vsuko1wTimVHADhdnkCpU8R4pSrApqKCXCcA45IbmGRVkUDHGNDN4QgkWGtBGKZZwUZARo__foatV-qqqSdbAHFVqJoDzBkHavdKPkNwzZw-hsd72tDv7jaJoo9_4YXNdUYs44RYR14SMgepUOvmmCKaW28cQlBmWr34Qe91kCOfP-6fWP6wvzTYKi |
| CitedBy_id | crossref_primary_10_1007_s13198_021_01478_0 crossref_primary_10_1109_MCE_2021_3060370 crossref_primary_10_1080_01969722_2023_2175117 crossref_primary_10_1111_exsy_13334 crossref_primary_10_1002_cpe_7691 crossref_primary_10_7717_peerj_cs_1847 |
| ContentType | Journal Article |
| Copyright | 2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| Copyright_xml | – notice: 2018. This work is licensed under https://creativecommons.org/licenses/by/4.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
| DBID | AAYXX CITATION 3V. 7XB 8FE 8FG 8FK 8G5 ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO GNUQQ GUQSH HCIFZ JQ2 K7- M2O MBDVC P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| DOI | 10.14569/IJACSA.2018.090651 |
| DatabaseName | CrossRef ProQuest Central (Corporate) ProQuest Central (purchase pre-March 2016) ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) Research Library ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials AUTh Library subscriptions: ProQuest Central Technology collection ProQuest One Community College ProQuest Central ProQuest Central Student Research Library Prep SciTech Premium Collection ProQuest Computer Science Collection Computer Science Database Research Library Research Library (Corporate) Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic Unpaywall for CDI: Periodical Content Unpaywall |
| DatabaseTitle | CrossRef Publicly Available Content Database Research Library Prep Computer Science Database ProQuest Central Student Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College Research Library (Alumni Edition) ProQuest Central China ProQuest Central ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Research Library ProQuest Central (New) Advanced Technologies & Aerospace Collection ProQuest Central Basic ProQuest One Academic Eastern Edition ProQuest Technology Collection ProQuest SciTech Collection Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Academic ProQuest One Academic (New) ProQuest Central (Alumni) |
| DatabaseTitleList | Publicly Available Content Database |
| Database_xml | – sequence: 1 dbid: UNPAY name: Unpaywall url: https://proxy.k.utb.cz/login?url=https://unpaywall.org/ sourceTypes: Open Access Repository – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Computer Science |
| EISSN | 2156-5570 |
| ExternalDocumentID | 10.14569/ijacsa.2018.090651 10_14569_IJACSA_2018_090651 |
| GroupedDBID | .DC 5VS 8G5 AAYXX ABUWG ADMLS AFKRA ALMA_UNASSIGNED_HOLDINGS ARAPS AZQEC BENPR BGLVJ CCPQU CITATION DWQXO EBS EJD GNUQQ GUQSH HCIFZ K7- KQ8 M2O OK1 PHGZM PHGZT PIMPY PQGLB PUEGO RNS 3V. 7XB 8FE 8FG 8FK JQ2 MBDVC P62 PKEHL PQEST PQQKQ PQUKI PRINS Q9U ADTOC UNPAY |
| ID | FETCH-LOGICAL-c322t-496e09eb8a1f681a442ad4e4439e6606338c0dfdd516c1e2b332971ce9a5763d3 |
| IEDL.DBID | BENPR |
| ISSN | 2158-107X 2156-5570 |
| IngestDate | Tue Aug 19 21:16:25 EDT 2025 Fri Jul 25 05:30:04 EDT 2025 Wed Oct 01 04:49:16 EDT 2025 Thu Apr 24 23:44:16 EDT 2025 |
| IsDoiOpenAccess | true |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | true |
| Issue | 6 |
| Language | English |
| License | cc-by |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c322t-496e09eb8a1f681a442ad4e4439e6606338c0dfdd516c1e2b332971ce9a5763d3 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| OpenAccessLink | https://www.proquest.com/docview/2656413506?pq-origsite=%requestingapplication%&accountid=15518 |
| PQID | 2656413506 |
| PQPubID | 5444811 |
| ParticipantIDs | unpaywall_primary_10_14569_ijacsa_2018_090651 proquest_journals_2656413506 crossref_citationtrail_10_14569_IJACSA_2018_090651 crossref_primary_10_14569_IJACSA_2018_090651 |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 2018-00-00 |
| PublicationDateYYYYMMDD | 2018-01-01 |
| PublicationDate_xml | – year: 2018 text: 2018-00-00 |
| PublicationDecade | 2010 |
| PublicationPlace | West Yorkshire |
| PublicationPlace_xml | – name: West Yorkshire |
| PublicationTitle | International journal of advanced computer science & applications |
| PublicationYear | 2018 |
| Publisher | Science and Information (SAI) Organization Limited |
| Publisher_xml | – name: Science and Information (SAI) Organization Limited |
| SSID | ssj0000392683 |
| Score | 2.1658998 |
| Snippet | In today’s age of information technology secure transmission of information is a big challenge. Symmetric and asymmetric cryptosystems are not appropriate for... |
| SourceID | unpaywall proquest crossref |
| SourceType | Open Access Repository Aggregation Database Enrichment Source Index Database |
| SubjectTerms | Comparative studies Computer systems Cryptography Eavesdropping Genetic algorithms Hash based algorithms Operators (mathematics) Optimization Random numbers Security |
| SummonAdditionalLinks | – databaseName: Unpaywall dbid: UNPAY link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwEB3R5dBeSumHupQiHzjWu3E-nPgYLSDgsEKiW21PlmM7BbpNIjYrRH99x8RZtkJCqtRbIjkjJTP2vBeP3wAcmiBRaRhFtOCJoa63LRVpIShmeo3pzmZh-VBtMeWns_h8nsy3oD-uiKBnqbod_CMnFl8rsxx_e5inYlrz8YVqkLonjJ491lvLupROoxk_tMwXP2ok1Ve_Ro0pX8A2TxChD2B7Nr3Iv7s-c0hXqFOd6q6dsmk692JECCXE-PpG6aXTI2LZKBCYn9nfCesRhb5cVY26v1OLxUZCOtmBVX-sp6tD-TlatcVI_36q8vhf3_UNvPYIluRdyO3Clq3ewk7fHYL4xeIdHG0YJHVJvEGyNkiuKzK5vW9ar5pN2pocV1cuDMmlb6v3HmYnx18np9T3bKAal4aWxoLbQNgiU6zkGVNxHCoT2xhxj-VIlpAR68CUxiSMa2bDIopCkTJthULmE5noAwyqurIfgWSpLrIkTQNtEGYUPAu1KEVoAq51nBk2hLB3jNRe0Nz11VhIR2ycN-XZeT65zKXzpuy8OYQv64eaTs_j-eH7vceln9xLGSIGxtyfBHwIdB0FT811sbRpbu8fx3-CV-6u--WzD4P2dmU_IwhqiwMf038AReIHCg priority: 102 providerName: Unpaywall |
| Title | Implication of Genetic Algorithm in Cryptography to Enhance Security |
| URI | https://www.proquest.com/docview/2656413506 http://thesai.org/Downloads/Volume9No6/Paper_51-Implication_of_Genetic_Algorithm.pdf |
| UnpaywallVersion | publishedVersion |
| Volume | 9 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVAFT databaseName: Open Access Digital Library customDbUrl: eissn: 2156-5570 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000392683 issn: 2158-107X databaseCode: KQ8 dateStart: 20100101 isFulltext: true titleUrlDefault: http://grweb.coalliance.org/oadl/oadl.html providerName: Colorado Alliance of Research Libraries – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 2156-5570 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0000392683 issn: 2158-107X databaseCode: BENPR dateStart: 20100101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV3PT9swFH6CctguY2NMK7_kw47zSJzEsQ8Iha4dcKgQrFI5RY7tAFOXFghC_Pc8N04LQuKUi20pzz--7zkv3wfwwwSJSlkU0YInhjpvWyrTQlJEeo1wZwUr59UWQ348ik_HyXgFhu2_MK6ssj0T5we1mWp3R77PkHjggZsE_HB2S51rlPu62lpoKG-tYA7mEmOrsMacMlYH1o76w7Pzxa1LgHSAz7U5Eeqcrmk69lJESCTk_slp1rvIXMGX-BVIROfwNVwtOeiHh2qmnh7VZPICjgaf4ZPnkSRrJv4LrNhqA9Zbjwbit-xX-H2yLBkn05I4mWnsQrLJFb5dff2f3FSkd_c0q712NamnpF9du8VALry53SaMBv2_vWPqnROoxg1a01hyG0hbCBWWXIQqjpkysY2RfViOKQvmpTowpTFJyHVoWRFFTKahtlJh_hGZ6Bt0qmllvwMRqS5EkqaBNgj2BRdMy1IyE3CtY2HCLrA2QLn2suLO3WKSu_TCRTVvopq7qOZNVLvwc9Fp1qhqvN98p4187rfYfb5cEF2gi9l4O9zNP6Xv1cvhtt4fbhs-usbNPcsOdOq7B7uLzKMu9mBVDP7s-UWFz9HwLLt8BsYa1Lw |
| linkProvider | ProQuest |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1NU9swEN2hcKCXfneaQqkO5VYVW5Zl68B0QgiT8JHpFJjJzZUludBJnUDMMPlz_W1dxXICwww37pYOT-vdt_L6PYAvJohVwqKI5iI21HnbUpnkkmKl11jubMqK-bTFQPTO-eEwHq7Av-ZfGDdW2eTEeaI2Y-3uyHcYEg9MuHEgvk-uqHONcl9XGwsN5a0VzO5cYsz_2HFkZ7fYwk13-_t43tuMHXTPOj3qXQaoxmCuKJfCBtLmqQoLkYaKc6YMtxwrtRVI77GH04EpjIlDoUPL8ihiMgm1lQq5emQi3PcZrPGIS2z-1va6gx8_F7c8AdIPMdcCxdLqdFSToZc-QuIid_qH7c5p2w2Ypd8CiWwgvF8el5x3_aacqNmtGo3ulL-DV_DC81bSrgPtNazY8g28bDwhiE8Rb2G_vxxRJ-OCOFlrXELao9-IZnXxl1yWpHM9m1ReK5tUY9ItL1zwkVNvpvcOzp8Ew_ewWo5L-wFImug8jZMk0AbJRS5SpmUhmQmE1jw1YQtYA1CmvYy5c9MYZa6dcahmNaqZQzWrUW3B18WiSa3i8fjjmw3ymX-lp9kyAFtAF6fxcLvLP0pP1d3tPj6-3WdY752dHGfH_cHRBjx3C-s7nk1Yra5v7CdkPVW-5UOLwK-njub_GHMONQ |
| linkToUnpaywall | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1NT9wwEB3R5dBeSumHupQiHzjWu3E-nPgYLSDgsEKiW21PlmM7BbpNIjYrRH99x8RZtkJCqtRbIjkjJTP2vBeP3wAcmiBRaRhFtOCJoa63LRVpIShmeo3pzmZh-VBtMeWns_h8nsy3oD-uiKBnqbod_CMnFl8rsxx_e5inYlrz8YVqkLonjJ491lvLupROoxk_tMwXP2ok1Ve_Ro0pX8A2TxChD2B7Nr3Iv7s-c0hXqFOd6q6dsmk692JECCXE-PpG6aXTI2LZKBCYn9nfCesRhb5cVY26v1OLxUZCOtmBVX-sp6tD-TlatcVI_36q8vhf3_UNvPYIluRdyO3Clq3ewk7fHYL4xeIdHG0YJHVJvEGyNkiuKzK5vW9ar5pN2pocV1cuDMmlb6v3HmYnx18np9T3bKAal4aWxoLbQNgiU6zkGVNxHCoT2xhxj-VIlpAR68CUxiSMa2bDIopCkTJthULmE5noAwyqurIfgWSpLrIkTQNtEGYUPAu1KEVoAq51nBk2hLB3jNRe0Nz11VhIR2ycN-XZeT65zKXzpuy8OYQv64eaTs_j-eH7vceln9xLGSIGxtyfBHwIdB0FT811sbRpbu8fx3-CV-6u--WzD4P2dmU_IwhqiwMf038AReIHCg |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Implication+of+Genetic+Algorithm+in+Cryptography+to+Enhance+Security&rft.jtitle=International+journal+of+advanced+computer+science+%26+applications&rft.au=Muhammad+Irshad+Nazeer&rft.au=Ghulam+Ali+Mallah&rft.au=Noor+Ahmed+Shaikh&rft.au=Bhatra%2C+Rakhi&rft.date=2018&rft.pub=Science+and+Information+%28SAI%29+Organization+Limited&rft.issn=2158-107X&rft.eissn=2156-5570&rft.volume=9&rft.issue=6&rft_id=info:doi/10.14569%2FIJACSA.2018.090651 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2158-107X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2158-107X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2158-107X&client=summon |