Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 9 SI
Page No. 8679 - 8682

Data Encryption Employing Genetic Algorithm Based on a New Algorithm of Key Generator

Authors : Safa Saad A. Al-Murieb and Fryal Jassim Abd Al-Razaq

References

Afarin, R. and S. Mozaffari, 2013. Image encryption using genetic algorithm and binary patterns. Proceedings of the 2013 10th International ISC Conference on Information Security and Cryptology (ISCISC), August 29-30, 2013, IEEE, Yazd, Iran, ISBN:978-1-4799-1638-2, pp: 1-5.

Bhowmik, S. and S. Acharyya, 2011. Image cryptography: The genetic algorithm approach. Proceedings of the 2011 IEEE International Conference on Computer Science and Automation Engineering (CSAE) Vol. 2, June 10-12, 2011, IEEE, Shanghai, China, ISBN:978-1-4244-8727-1, pp: 223-227.

Dutta, S., T. Das, S. Jash, D. Patra and P. Paul, 2014. A cryptography algorithm using the operations of genetic algorithm and pseudo random sequence generating functions. Intl. J., 3: 325-330.

Enayatifar, R. and A.H. Abdullah, 2011. Image security via genetic algorithm. Proceedings of the 2011 International Conference on Computer and Software Modeling IPCSIT Vol. 14, May 26, 2011, IACSIT Press, Singapore, pp: 198-203.

Gondro, C. and B.P. Kinghorn, 2007. A simple genetic algorithm for multiple sequence alignment. Genet. Mol. Res., 6: 964-982.
PubMed  |  Direct Link  |  

Hassan, A.K.S., A.F. Shalash and N.F. Saudy, 2014. Modifications on RSA cryptosystem using genetic optimization. Intl. J. Res. Rev. Appl. Sci., 19: 150-155.
Direct Link  |  

Jhingran, R.,V. Thada and S. Dhaka, 2015. A study on cryptography using genetic algorithm. Int. J. Comput. Appl., 118: 10-14.
Direct Link  |  

Matthews, R.A., 1993. The use of genetic algorithms in cryptanalysis. Cryptologia, 17: 187-201.
Direct Link  |  

Singh, P., G. Gosawi and S. Dubey, 2014. Genetic algorithms: A technique for cryptography real time data transmission. Binary J. Data Mining Networking, 4: 37-40.
Direct Link  |  

Stallings, W., 2011. Cryptography and Network Security: Principles and Practice. 5th Edn., Prentice Hall, Upper Saddle River, New Jersey, USA., ISBN:9780137056323, Pages: 743.

Tragha, A., F. Omary and A. Mouloudi, 2006. ICIGA: Improved cryptography inspired by genetic algorithms. Proceedings of the International Conference on Hybrid Information Technology (ICHIT'06) Vol. 1, November 9-11, 2006, IEEE, Cheju Island, South Korea, pp: 335-341.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved