Encryption-and-Decryption-Using-Genetic-Algorithm-Operations-and-Pseudorandom-Number
Encryption-and-Decryption-Using-Genetic-Algorithm-Operations-and-Pseudorandom-Number
Abstract- Data security is crucial for almost all businesses and home computer users. Client information, payment information,
personal files, bank account details etc. are very important and hard to replace. It is potentially dangerous and can grow into a threat if it
falls in the wrong hands; to protect the data encryption is one of the most widely used techniques. This paper deals with the integrity and
confidentiality of data, which is transmitted through different mediums. Genetic algorithms (GAs) have many functions, in this paper we
use the genetic algorithm operation such as crossover and mutation functions, genetic algorithm concepts with pseudorandom function
are being used to encrypt and decrypt data. The encryption process is applied over a binary file therefore the algorithm can be applied
over any type of data.
n today’s world providing security to the data is one of The process in which two chromosomes or two attributes
I
the most concerned issue; there has been a huge loss are taken and a resultant chromosome(new) is formed by
of data through illegal access therefore, providing taking some part of first chromosome and the rest by
security is priority these days. To protect the second chromosome.
important information from hackers or against illegal
access and modifications, cryptographic schemes are There are three types of crossover operation in genetic
needed. Cryptographic schemes are of two types: algorithm.
symmetric and asymmetric cryptography. The symmetric
cryptographyis the one which uses the same key for A.Single point crossover:the selected chromosome is
encryption and decryption[1,2,3].In asymmetrical broken into half and the new chromosome is formed by
cryptography two keys are used, one for encryption(known interchanging or swapping the half of the selected two
as public key) and the other for decryption(known as the chromosomes.
private key). B. Two-point crossover: the selected chromosome is
divided into three parts by taking two pointsand then one
The genetic algorithm is a search algorithm which is based parts of each chromosomes are swapped to form new
on the mechanics of natural selection and natural genetics. chromosome.
The set of operators usually consists of mutation, C. Multi point crossover: the selected chromosome is
crossover and selection[3,4]. divided into ‘n’ number of parts and then the swapping is
done in order to form new or resultant chromosomes[6].
Genetic algorithms contain operations which are bio-
inspired operators such 1.2. Mutation
as mutation, crossover and selection. They are used to
optimize and search problems by generating high-quality Mutation is a genetic operation which is similar to
solutions. In this paper crossover and mutation operation biological mutation and is used to create genetic diversity
are used[5]. of its one generation from its successive generation.
455
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 3, June 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
Mutation allows the algorithm to prevent the population of unauthorized access to data. This method contains the use
chromosomes from becoming similar to each other. of the operations of genetic algorithm in order to encrypt
the data.
1.3. Pseudorandom Number:
Studies tell us that Genetic algorithm for cryptography is
There are various methods through which random better than typical algorithms for cryptography. Genetic
numbers can be generated, but the most commonly used algorithms contain process/operations which are bio-
method is multiplicative congruential generator also called inspired operators such
as power residue generator. The function used to generate as mutation, crossover and selection. They are used to
pseudo random number is optimize and search problems by generating high-quality
solutions. The method discussed below generate different
Xi+1=Xi.a (modulo m) key by pseudorandom function for each block of data
according to which the crossover is applied and in order to
Where Xi is the ithpseudo random number and Xi+1 is the provide more security mutation is also applied.
succeeding pseudo random number of Xi. Here a and m are
positive integer numbers, a will be constantly multiplied Since the proposed method is being applied to the binary
by Xi and the result i.e. Xi.a will be divided by m until the data therefore it can be used to encrypt different type of
remainder becomes less than m. The first number, also file.
called as seed(X0) is the number using which we start
calculating pseudo random numbers.
3. Proposed Method
The proposed method is important as in today’s world
providing security to data is on everyone’s priority list
therefore cryptography schemes are needed for preventing Fig.2 Decryption
456
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 3, June 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
457
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 3, June 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
6. Application
458
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.
IJCSN - International Journal of Computer Science and Network, Volume 6, Issue 3, June 2017
ISSN (Online) : 2277-5420
www.IJCSN.org
Impact Factor: 1.5
459
Copyright (c) 2017 International Journal of Computer Science and Network. All Rights Reserved.