Features of Genetic Algorithm for Plain Text Encryption

Riyadh Bassil Abduljabbar

Abstract


In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by The mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high speed Processing.

Keywords


Genetic algorithm Text Encryption - Crossover - Mutation - Plain Text

References


S. Dutta, T. Das, S. Jash, D. Patra and P. Paul, "A Cryptography Algorithm Using the Operations of Genetic Algorithm & Pseudo Random Sequence Generating Functions," International Journal, vol. 3, no. 5, 2014.

A. Kumar and K. Chatterjee, "An efficient stream cipher using genetic algorithm," in IEEE, 2016.

A. Agarwal, "Secret key encryption algorithm using genetic algorithm," International Journal of Advanced Research in Computer Science and Software Engineering, vol. 2, no. 4, 2012.

R. Toemeh and S. Arumugam, "Breaking transposition cipher with genetic algorithm," Elektronika ir Elektrotechnika, vol. 79, no. 7, pp. 75-78, 2007.

S. Singh, S. K. Maakar and S. Kumar, "A performance analysis of DES and RSA cryptography," International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), vol. 2, no. 3, 2013.

H. M. Mousa, "Bat-Genetic Encryption Technique," 2019.

N. H. Waleed, "Implementation of Symmetric Encryption Algorithms," Computer Engineering and Intelligent Systems, vol. 8, no. 4, pp. 13-18, 2017.

S. Goyat, "Genetic key generation for public key cryptography," International Journal of Soft Computing and Engineering (IJSCE) ISSN, pp. 2231-2307, 2012.

O. K. Hamid, "Arabic Text Encryption Using Artificial Neural Networks," Engineering and Technology Journal, vol. 34, no. 5 Part (A) Engineering, pp. 887-899, 2016.

M. A. Mohammed, Z. H. Salih, N. {c{T}}{u{a}}pu{c{s}} and R. A. Kareem, "Security and accountability for sharing the data stored in the cloud," in IEEE, 2016.

A. Soni and S. Agrawal, "Using genetic algorithm for symmetric key generation in image encryption," International Journal of Advanced Research in Computer Engineering & Technology (IJARCET), vol. 1, no. 10, pp. 137-140, 2012.

M. Kraj{v{c}}ovi{v{c}}, V. Han{v{c}}insk{`y}, L. Dulina, P. Grzn{'a}r, M. Ga{v{s}}o and J. Vacul{'i}k, "Parameter setting for a genetic algorithm layout planner as a toll of sustainable manufacturing," Sustainability, vol. 11, no. 7, p. 2083, 2019.

R. Jhingran, V. Thada and S. Dhaka, "A study on cryptography using genetic algorithm," International Journal of Computer Applications, vol. 118, no. 20, 2015.

K. Sindhuja and S. P. Devi, "A symmetric key encryption technique using genetic algorithm," international journal of computer science and information technologies, vol. 5, no. 1, pp. 414-416, 2014.

P. Srikanth, A. Mehta, N. Yadav, S. Singh and S. Singhal, "Encryption and Decryption Using Genetic Algorithm Operations and Pseudorandom Number," IJCSN-International Journal of Computer Science and Network, vol. 6, no. 3, pp. 455-459, 2017.

M. I. Nazeer, G. A. Mallah, R. Bhatra and R. Memon, "Implication of Genetic Algorithm in Cryptography to Enhance Security," Int. J. Adv. Comput. Sci. Appl, vol. 9, no. 6, pp. 375-379, 2018.

D. M. Abdallah;, "Text Encryption Using Genetic Algorithm," IJCSN - International Journal of Computer Science and Network, vol. 8, 2019.

B. Pushpa, "Data Encryption Technique Using Genetic Algorithm and Random Number Generator," International Journal of Innovative Research in Engineering & Science ISSN, pp. 2319-5665, 2015.

C. C. Wen, "Enhancing the Randomness of Symmetric Key using Genetic Algorithm," International Journal of Innovative Technology and Exploring Engineering (IJITEE), vol. 8, 2019.

A.-H. Nazar and S. Jassim, "Simultaneous video compression and encryption for real-time secure transmission [J]," 2013.

S. Mishra and S. Bali, "Public key cryptography using genetic algorithm," International Journal of Recent Technology and Engineering, vol. 2, no. 2, pp. 150-154, 2013.




DOI: http://doi.org/10.11591/ijece.v11i1.pp%25p
Total views : 0 times


Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

ISSN 2088-8708, e-ISSN 2722-2578