Optimized Data Encryption System Based on GA

International Journal of Computer Science and Engineering
© 2015 by SSRG - IJCSE Journal
Volume 2 Issue 9
Year of Publication : 2015
Authors : K.Thamodaran

pdf
How to Cite?

K.Thamodaran, "Optimized Data Encryption System Based on GA," SSRG International Journal of Computer Science and Engineering , vol. 2,  no. 9, pp. 24-30, 2015. Crossref, https://doi.org/10.14445/23488387/IJCSE-V2I9P104

Abstract:

Encryption techniques are playing vital role to alter the digital data in to another form which is tough to understand and maintain the data confidentiality. In this paper an optimized data encryption system based on interweaving technique and Genetic Algorithm(GA) is developed which provide solutions to the issues such as statistical attacks, confidentiality, illegal duplication and manipulation of digital data. GA is an important optimization technique and is employed to optimize the performance of our proposed system. The transposition or permutation of characters in the plaintext is responsible for confusion, and the influence of each bit of the secret key on each plaintext causes diffusion. The 256 bit symmetric key is generated with help of GA and integrated for encryption.

Keywords:

Cryptography, Decryption, Encryption, Genetic Algorithm, Interweaving, Secret Key.

References:

[1] Bruce Schneider, “Applied Cryptography”, John Wiley and Sons, 1996.
[2] Menzes A. J., Paul, C., Van Dorschot, V., Vanstone, S. A., “Handbook of Applied Cryptography”, CRS Press 5th Printing,2001.
[3] Trappe.W, Washington.L.C., “Introduction to Cryptography: with Coding Theory”, Prentice-Hall, Upper Saddle River, NJ, 2002.
[4] Stallings W. Cryptography and Network Security- Principles and Practices. 3rd ed. Upper Saddle River, NJ: Prentice Hall; 2003.
[5] A. Tragha, F. Omary, A. Kriouile, ,Genetic Algorithms Inspired Cryptography A.M.S.E Association for the Advancement of Modeling & Simulation Techniques in Enterprises, Series D : Computer Science and Statistics, November 2005.
[6] Behrouz A.Forouzan , “Cryptography and Network Security ” ,TMH, 2010.
[7] Nitin Kumar, Rajendra Bedi, Rajneesh Kaur, “A New Approach for Data Encryption Using Genetic Algorithms and Brain Mu Waves”,International Journal of Scientific and Engineering Research, Volume 2, Issue 5, pp1-4, May 2011.
[8] Ankita Agarwal , “Secret Key Encryption Algorithm Using Genetic Algorithm”, International Journal of Advanced Research in Computer Science and Software Engineering, Volume 2, Issue 4, pp216-218, April 2012 .
[9] Faiyaz Ahamad, Saba Khalid, Mohd. Shahid Hussain published a paper entitled, “Encrypting Data Using The Features of Memetic Algorithm and Cryptography” at International Journal of Engineering Research and Applications, Vol. 2, Issue 3, pp.3049-3051. May-Jun 2012.
[10] Sonia Goyat, “Genetic Key Generation For Public Key Cryptography”, International Journal of Soft Computing and Engineering, Volume-2, Issue-3, pp 231-233, July 2012 231.
[11] S.Mishra, S. Bali “Public Key Cryptography Using Genetic Algorithm”, International Journal of Recent Technology and Engineering , Volume-2, Issue-2, pp 150-154, May 2013.
[12] Dr.Dilbag Singh, Pooja Rani, Dr. Rajesh Kumar, “To Design a Genetic Algorithm for Cryptography to Enhance the Security”, International Journal of Innovations in Engineering and Technology Volume 2, Issue 2, pp 380- 385, April 2013.
[13] Dutt I, Paul S. Chaudhuri SN. Implementation of network security using genetic algorithm. International Journal of Advanced Research in Computer Sci ence and Software Engineering, 2013; 3(2):234–41.
[14] Sindhuja K, Devi PS. A symmetric key encryption technique using genetic algorithm, International Journal of Computer Science and Information Technology, Vol. 5, no.1, pp 414– 416, 2014;
[15] Prasenjit Kumar Das, Pradeep Kumar , “A Novel Cryptography Approach Based On Genetic Algorithm”, International Journal of Engineering Sciences & Research Technology, pp 771-776, March, 2015.
[16] Shruti Sekra, Samta Balpande, Karishma Mulani, “ Steganography Using Genetic Encryption along with Visual Cryptography”, SSRG International Journal of Computer Science and Engineering, Volume 2, Issue 1,pp 5- 9, January 2015.
[17] David E Goldberg, “Genetic algorithms in search, optimization and machine learning”, Addision- Wesley Pub.Co.1989.
[18] Anil Kumar and M. K. Ghose,”Overview of Information Security Using Genetic Algorithm and Chaos”, Information Security Journal: A Global Perspective, vol 18,pp 306–315, 2009.