SlideShare a Scribd company logo
1 of 6
Download to read offline
ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629
American International Journal of
Research in Science, Technology,
Engineering & Mathematics
AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 84
Available online at http://www.iasir.net
AIJRSTEM is a refereed, indexed, peer-reviewed, multidisciplinary and open access journal published by
International Association of Scientific Innovation and Research (IASIR), USA
(An Association Unifying the Sciences, Engineering, and Applied Research)
GeneticAlgorithm in Hill Cipher Encryption
Andysah Putera Utama Siahaan
Faculty of Computer Science
Universitas Pembangunan Panca Budi
Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia
Abstract: The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row
must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The
wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing
the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for
encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm,
the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the
Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with
Hill Cipher.
Keywords - Cryptography, Genetic Algorithm, Hill Cipher
I. Introduction
Nowadays, encryption is a very critical aspect to be applied in securing file over the internet. There are two kinds
of the cryptography style, such as classic and modern. Hill Cipher is one of the average methods used. It offers
the high-security level mechanism. In common use, Hill Cipher has two matrix size, 2 x 2 and 3 x 3. This research
will focus on the 3 x 3 matrix. The matrix has nine cells consists of three columns and three rows as well. A
random integer number is usually put in each cell. There is a condition achieve where the determinant of the
matrix must return 1. It is not easy when it is manually performed. It will take a long time do calculate until it
reaches the correct value. The Genetic algorithms try to optimize the time wasted. It generates several or many
populations to fit the destination desired. It is expected the cost of time will be minimized. Furthermore, the
Genetic algorithms can return the key pairs on how many it is desired but the more keys generated, the more time
wasted.
II. Theories
The confidential information must be protected from being intercepted [8]. There are various techniques should
be used to protect the confidential image data from unauthorized access [7][9]. Hill Cipher is the modulo
arithmetic technique in cryptography [1]. Hill Cipher uses the symmetric key as the password to convert plaintext
to ciphertext. The Symmetric key is one of the cryptography systems that have the same kind of keys in encryption
and decryption. The key employed to encryption is actually distinct from decryption, but they are drawn from the
same formula. The key must be inverted before utilized to decrypt the ciphertext. This cryptographic technique
has the matrix as the vessel of information exchanges either on encryption or decryption part [2]. The general
theory of the matrix used in Hill Cipher is the multiplication between the matrix and the inverse of the matrix [3].
Without getting the right key, the process of encryption and decryption can be done. Figure 1 is the example of
encryption process.
Figure 1. Hill Cipher Encryption
C1 is dependent on the multiplication of K11, K12, K13 and P1, P2, P3. The result of the multiplication has
modular expression of the total character. Genetic algorithm is a computational algorithm that inspired the theory
of evolution which was later adopted into computational algorithms is used to solve a search value in an
Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1),
June-August, 2016, pp. 84-89
AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 85
optimization problem [4]. This algorithm is built on the genetic processes in living organisms. This following
figure explains the step of the Genetic algorithm process.
Figure 2. Step of genetic algorithm
There are three main steps in Genetic algorithms such as selection, crossover and mutation. Selection is used to
recombine the population with the highest probability. The random number generated is combined with the
cumulative probability. The nearest value is taken in order to replace the original value of the population.
Figure 3. Roulette Wheel Selection
Figure 3 shows one of the selection methods. The method above is Roulette Wheel Selection. Individuals are
mapped into a line segment in a sequence such that each individual segment has the exact same size as its fitness.
A random number generated. Individuals who have a segment within the segment in the region of the random
numbers will be selected [6]. This process is repeated until the number of individuals is obtained. Crossover is a
genetic algorithm operator to mix the chromosome with the extra chromosome chosen to produce child
chromosome from one generation to the next. It usually selects some qualified parents [5]. The qualification is the
crossover rate value. This value relates to select the parent chromosome.
Initialize Population
Fitness Evaluation
Selection
Crossover
Mutation
Result
Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1),
June-August, 2016, pp. 84-89
AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 86
Figure 4. One cut point crossover
Figure 4 indicates the crossover based on one cut point division. Mutation is a genetic operator employed to
maintain genetic diversity from one generation of a population of genetic algorithm chromosomes to the next.
This operator repositions the chromosomes by exchanging the value of the chromosome.
Figure 5. Swap Mutation
Figure 5 shows the example of swap mutation. The R4 and R6 are swapped in mutation. The chromosome index
does not change, but the value of the index is substituted for the other value in the other index. Mutation causes
movement in the search space and may produce stronger chromosome.
III. Related Work
The previous researches of Hill Cipher do not say anything how to optimize the key search. The key is always
obtained by trial and error method. This is not the clever idea to get the correct key in Hill Cipher. It needs the
proper determinant to have the cipher text return its original message. It still requires more times to produce the
key manually. Once the determinant gets wrong, it has to be recalculated from the beginning. There are nine
numbers composed as the key for the encryption and decryption.
IV. Proposed Work
Every chromosome in Hill Cipher consists of nine numbers. Each cell has a value in range of 0 to 255 which
represents the a byte number. Since the ASCII value does not exceed 255, it needs to be nomalized by a modular
expression (MOD).
Figure 6. Hill Cipher Chromosome
K11 K12 K13 K21 K22 K23 K31 K32 K33
x x x x x x x x x
Figure 6 shows the form of the Hill Cipher chromosome. The matrix is transformed into one-dimension vector.
Each cell is filled with a random integer number (x). The fitness function evaluates the determinant of the
chromosome by this following formula.
𝐹 = 𝐷eterminant (1)
Where:
F = Fitness
D = Determinant
The genetic algorithm of this method is rather straightforward than the one of a usual method for scheduling
because it does not have to search until the fitness value reaches no error. It searches the ideal fitness which does
not contain an even value. Since the determinant is in the odd number, it is good for Hill Cipher. But, in this case,
it still find until the determinant reaches 1.
Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1),
June-August, 2016, pp. 84-89
AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 87
V. Testing and Implementation
Before knowing how the method works, first thing first is to prepare the data. The first step is to generate the
initial population. For example, the Generation is set to 30 and Population Size is 20. The initial random population
is given in table 1. Each number in the cell is a random integer.
Table I. Initial Population
K11 K12 K13 K21 K22 K23 K31 K32 K33
108 85 165 89 69 185 97 185 54
65 86 135 47 224 116 213 112 6
227 29 41 44 1 141 101 218 32
174 195 136 196 220 37 108 144 43
31 232 46 145 120 234 196 242 63
190 54 140 128 118 179 151 108 43
90 64 85 24 242 106 154 178 244
172 124 121 98 194 81 73 183 135
215 82 163 62 103 13 79 165 164
147 47 77 212 45 112 249 18 80
213 7 244 195 246 197 244 25 119
196 92 115 59 55 190 44 191 27
134 29 216 72 200 78 196 7 131
168 214 80 10 104 177 1 114 177
145 20 91 221 73 79 149 137 73
50 89 246 142 168 108 85 116 244
119 141 61 167 254 239 66 77 65
40 187 243 193 58 195 14 154 172
190 168 210 137 178 63 5 146 173
139 26 47 226 179 242 187 137 228
Every chromosome is calculated to get the fitness, probability and cumulative probability. The next step is to
conduct selection, crossover, and mutation. Table 2 shows the fitness, probability, and cumulative probability of
population.
Table II. Fitness, Probability, and Cumulative Probability
F P CP
1 0,0003652 0,0003652
64 0,0233747 0,02374
210 0,0766983 0,1004383
238 0,0869248 0,187363
9 0,0032871 0,1906501
76 0,0277575 0,2184076
150 0,0547845 0,2731921
186 0,0679328 0,3411249
203 0,0741417 0,4152666
174 0,06355 0,4788167
241 0,0880205 0,5668371
84 0,0306793 0,5975164
0 0 0,5975164
152 0,055515 0,6530314
172 0,0628196 0,715851
188 0,0686633 0,7845142
223 0,0814463 0,8659606
169 0,0617239 0,9276844
2 0,0007305 0,9284149
196 0,0715851 1
Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1),
June-August, 2016, pp. 84-89
AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 88
The process of selection, crossover and mutation has modified the population structure. The order of the key
changes to the other number from other chromosomes. The new generation results from the latest updated
chromosomes as saw in Table 2.
Table III. Next Generation Population
K11 K12 K13 K21 K22 K23 K31 K32 K33
134 47 216 112 213 90 18 7 131
85 47 244 195 85 212 244 196 249
119 63 77 78 145 72 249 18 135
108 47 197 179 47 239 119 234 65
167 89 7 142 179 108 200 116 89
78 64 116 24 242 112 27 191 80
80 44 185 7 1 141 62 242 32
254 29 106 196 200 50 13 29 185
31 232 46 145 120 216 154 178 244
139 85 227 226 212 165 168 137 228
218 244 41 163 168 147 112 242 244
228 85 147 234 69 97 131 141 54
147 47 77 61 232 246 249 18 80
215 82 142 101 103 29 79 165 164
187 120 86 59 55 190 44 6 213
31 45 46 134 116 89 196 242 63
65 86 246 196 224 92 66 112 72
77 115 135 246 224 26 213 112 6
116 196 65 77 45 212 25 137 50
139 26 47 226 45 47 187 242 108
This process continues to the latest generation. It is the last result where the Hill Cipher keys are generated. At
the end of the process to the total of the Hill Cipher key is variant. Table 4 shows the final result of the Genetic
algorithm.
Table IV. The Final Result
K11 K12 K13 K21 K22 K23 K31 K32 K33
147 69 62 147 232 82 29 147 147
147 62 147 232 246 29 82 147 246
82 147 232 69 246 82 246 72 147
After getting the result, the key combination is now formed as showed in Table 5. The numbers showed in the
blocks are generated by the genetic algorithm. It is cannot be performed manually because it takes much time to
calculate the determinant.
Table V. The Key Combination
Key 1 Key 2 Key 3
147 69 62 147 62 147 82 147 232
147 232 82 232 246 29 69 246 82
29 147 147 82 147 246 246 72 147
The key in the block section is used to encrypt the plaintext in Hill Cipher algorithm.
Plaintext : ANDYSAHXX (
65 78 68
89 83 65
72 88 88
)
Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1),
June-August, 2016, pp. 84-89
AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 89
Key : (
147 69 62
147 232 82
29 147 147
)
Ciphertext : ÑË38%`H8 (
209 203 51
56 37 17
96 72 56
)
Key Inverse : (
82 131 218
249 171 228
57 40 241
)
Plaintext : ANDYSAHXX (
65 78 68
89 83 65
72 88 88
)
There are three keys produced by the genetic algorithm. The calculation aboe is the proof of Key 1. The
determinant is 1 and it is suitable for the Hill Cipher process. When the determinant is 1, it can return the ciphertext
back to the plain text.
VI. Conclusion
On the Hill Cipher algorithm that uses a 3x3 matrix, searching key that has the proper determinant takes time. If
it is performed in that way, it slows down the process of cryptography. Genetic algorithms greatly assist the
process of the encryption and the decryption on the Hill Cipher. It produces a series of numbers quickly. This
technique generates several alternatives that can be used on the Hill Cipher algorithm. In this study, the genetic
algorithm has a valuable contribution when combined with the Hill Cipher method.
References
[1] Abdullah, A. A., Khalaf, R., & Riza, M. (2015). A Realizable Quantum Three-Pass Protocol Authentication. Mathematical
Problems in Engineering.
[2] Chase, J., & Davis, M. (2010). Extending the Hill Cipher.
[3] Chowdhury, S. I., Shohag, S. A., & Sahid, H. (2011). A Secured Message Transaction Approach by Dynamic Hill Cipher
Generation and Digest Concatenation. International Journal of Computer Applications, 23(9), 25-31.
[4] Ghanbari, A. A., Broumandnia, A., Navidi, H., & Ahmadi, A. (2012). Brain Computer Interface with Genetic Algorithm.
International Journal of Information and Communication Technology Research, 2(1), 79-86.
[5] Lin, C. H., Yu, J. L., Liu, J. C., Lai, W. S., & Ho, C. H. (2009). Genetic Algorithm for Shortest Driving Time in Intelligent
Transportation Systems. International Journal of Hybrid Information Technology, 2(1), 21-30.
[6] Szénási, S., & Vámossy, Z. (2013). Implementation of a Distributed Genetic Algorithm for Parameter Optimization in a Cell Nuclei
Detection Project. Acta Polytechnica Hungarica, 10(4), 59-86.
[7] A. P. U. Siahaan, "RC4 Technique in Visual Cryptography RGB Image Encryption," International Journal of Computer Science
and Engineering, vol. 3, no. 7, pp. 1-6, 2016
[8] A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” International Journal of Science and
Research, vol. 5, no. 7, 2016.
[9] A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers,” International Journal of Engineering Trends and Technology,
vol. 37, no. 1, pp. 15-18, 2016.
Biography
Andysah Putera Utama Siahaan was born in Medan, Indonesia, in 1980. He received the S.Kom. degree in
computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2010, and the M.Kom. in
computer science as well from the University of Sumatera Utara, Medan, Indonesia, in 2012. In 2010, he joined
the Department of Engineering, Universitas Pembangunan Panca Budi, as a Lecturer, and in 2012 became a
junior researcher. He is applying for his Ph. D. degree in 2016. He has written in several international journal
and conference. He is now active in writing papers and joining conferences.

More Related Content

What's hot

cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra Sami Ullah
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesComputer Science Journals
 
Cryptography an application of vectors and matrices
Cryptography an application of vectors and matricesCryptography an application of vectors and matrices
Cryptography an application of vectors and matricesdianasc04
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyIOSR Journals
 
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONA NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONijscmcj
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Austin Benson
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...cscpconf
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd Iaetsd
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTScsandit
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyIJCERT
 
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMCAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMEditor IJMTER
 
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...eSAT Journals
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemIAEME Publication
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)IOSR Journals
 

What's hot (18)

cryptography Application of linear algebra
cryptography Application of linear algebra cryptography Application of linear algebra
cryptography Application of linear algebra
 
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite MachinesAn ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
An ElGamal Encryption Scheme of Adjacency Matrix and Finite Machines
 
G029037043
G029037043G029037043
G029037043
 
Cryptography an application of vectors and matrices
Cryptography an application of vectors and matricesCryptography an application of vectors and matrices
Cryptography an application of vectors and matrices
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Low Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve CryptographyLow Power FPGA Based Elliptical Curve Cryptography
Low Power FPGA Based Elliptical Curve Cryptography
 
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSIONA NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
A NEW ALGORITHM TO CONSTRUCT S-BOXES WITH HIGH DIFFUSION
 
Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)Learning multifractal structure in large networks (KDD 2014)
Learning multifractal structure in large networks (KDD 2014)
 
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
Steganography Using Adaptive Pixel Value Differencing(APVD) of Gray Images Th...
 
Iaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detectionIaetsd implementation of lsb image steganography system using edge detection
Iaetsd implementation of lsb image steganography system using edge detection
 
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTSA SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
A SURVEY ON ELLIPTIC CURVE DIGITAL SIGNATURE ALGORITHM AND ITS VARIANTS
 
Network Security CS3-4
Network Security CS3-4 Network Security CS3-4
Network Security CS3-4
 
Data Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve CryptographyData Security Using Elliptic Curve Cryptography
Data Security Using Elliptic Curve Cryptography
 
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEMCAMINA GROUP FOR THE MOR CRYPTOSYSTEM
CAMINA GROUP FOR THE MOR CRYPTOSYSTEM
 
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...A novel block cipher involving keys in a key bunch matrix as powers of the pl...
A novel block cipher involving keys in a key bunch matrix as powers of the pl...
 
A comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystemA comparative analysis of the possible attacks on rsa cryptosystem
A comparative analysis of the possible attacks on rsa cryptosystem
 
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
Blind Signature Scheme Based On Elliptical Curve Cryptography (ECC)
 

Similar to Genetic Algorithm in Hill Cipher Encryption

Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular AutomataCost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automataijait
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityEswar Publications
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...IJCNCJournal
 
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...cscpconf
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED
 
An Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmAn Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmIOSR Journals
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionIJERA Editor
 
Loss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingLoss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingIJERA Editor
 
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...IJECEIAES
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEIJNSA Journal
 
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...CSCJournals
 
A Comparative Analysis of Feature Selection Methods for Clustering DNA Sequences
A Comparative Analysis of Feature Selection Methods for Clustering DNA SequencesA Comparative Analysis of Feature Selection Methods for Clustering DNA Sequences
A Comparative Analysis of Feature Selection Methods for Clustering DNA SequencesCSCJournals
 
Geometry in cryptography a review
Geometry in cryptography   a reviewGeometry in cryptography   a review
Geometry in cryptography a revieweSAT Journals
 
Roty_Shift: A Proposed Method for Generating Secret Keys
Roty_Shift: A Proposed Method for Generating Secret KeysRoty_Shift: A Proposed Method for Generating Secret Keys
Roty_Shift: A Proposed Method for Generating Secret KeysIJCSIS Research Publications
 
Optimizing search-space-of-othello-using-hybrid-approach
Optimizing search-space-of-othello-using-hybrid-approachOptimizing search-space-of-othello-using-hybrid-approach
Optimizing search-space-of-othello-using-hybrid-approachEditor IJMTER
 
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve EquationsSymmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve EquationsIJECEIAES
 

Similar to Genetic Algorithm in Hill Cipher Encryption (20)

Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
 
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular AutomataCost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
Cost Optimized Design Technique for Pseudo-Random Numbers in Cellular Automata
 
I1803014852
I1803014852I1803014852
I1803014852
 
Nearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and IntegrityNearest Prime Cipher for Data Confidentiality and Integrity
Nearest Prime Cipher for Data Confidentiality and Integrity
 
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
Security Analysis of AES and Enhancing its Security by Modifying S-Box with a...
 
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
AN ALTERNATIVE APPROACH FOR SELECTION OF PSEUDO RANDOM NUMBERS FOR ONLINE EXA...
 
Extensive Survey on Datamining Algoritms for Pattern Extraction
Extensive Survey on Datamining Algoritms for Pattern ExtractionExtensive Survey on Datamining Algoritms for Pattern Extraction
Extensive Survey on Datamining Algoritms for Pattern Extraction
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13
 
An Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution AlgorithmAn Adaptive Masker for the Differential Evolution Algorithm
An Adaptive Masker for the Differential Evolution Algorithm
 
New Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel EncryptionNew Technique Using Multiple Symmetric keys for Multilevel Encryption
New Technique Using Multiple Symmetric keys for Multilevel Encryption
 
Loss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic CodingLoss less DNA Solidity Using Huffman and Arithmetic Coding
Loss less DNA Solidity Using Huffman and Arithmetic Coding
 
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
Domain Examination of Chaos Logistics Function As A Key Generator in Cryptogr...
 
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUEEFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
EFFICIENT DIGITAL ENCRYPTION ALGORITHM BASED ON MATRIX SCRAMBLING TECHNIQUE
 
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...
The Convergence Speed of Single- And Multi-Objective Immune Algorithm Based O...
 
50120140503015
5012014050301550120140503015
50120140503015
 
A Comparative Analysis of Feature Selection Methods for Clustering DNA Sequences
A Comparative Analysis of Feature Selection Methods for Clustering DNA SequencesA Comparative Analysis of Feature Selection Methods for Clustering DNA Sequences
A Comparative Analysis of Feature Selection Methods for Clustering DNA Sequences
 
Geometry in cryptography a review
Geometry in cryptography   a reviewGeometry in cryptography   a review
Geometry in cryptography a review
 
Roty_Shift: A Proposed Method for Generating Secret Keys
Roty_Shift: A Proposed Method for Generating Secret KeysRoty_Shift: A Proposed Method for Generating Secret Keys
Roty_Shift: A Proposed Method for Generating Secret Keys
 
Optimizing search-space-of-othello-using-hybrid-approach
Optimizing search-space-of-othello-using-hybrid-approachOptimizing search-space-of-othello-using-hybrid-approach
Optimizing search-space-of-othello-using-hybrid-approach
 
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve EquationsSymmetric Key based Encryption and Decryption using Lissajous Curve Equations
Symmetric Key based Encryption and Decryption using Lissajous Curve Equations
 

More from Universitas Pembangunan Panca Budi

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Universitas Pembangunan Panca Budi
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa Universitas Pembangunan Panca Budi
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Universitas Pembangunan Panca Budi
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityUniversitas Pembangunan Panca Budi
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphUniversitas Pembangunan Panca Budi
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionUniversitas Pembangunan Panca Budi
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmUniversitas Pembangunan Panca Budi
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Universitas Pembangunan Panca Budi
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishUniversitas Pembangunan Panca Budi
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...Universitas Pembangunan Panca Budi
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Universitas Pembangunan Panca Budi
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaUniversitas Pembangunan Panca Budi
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Universitas Pembangunan Panca Budi
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningUniversitas Pembangunan Panca Budi
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityUniversitas Pembangunan Panca Budi
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodUniversitas Pembangunan Panca Budi
 

More from Universitas Pembangunan Panca Budi (20)

Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
Application of Data Encryption Standard and Lempel-Ziv-Welch Algorithm for Fi...
 
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
An Implementation of a Filter Design Passive LC in Reduce a Current Harmonisa
 
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
Simultaneous Response of Dividend Policy and Value of Indonesia Manufacturing...
 
Insecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed SecurityInsecure Whatsapp Chat History, Data Storage and Proposed Security
Insecure Whatsapp Chat History, Data Storage and Proposed Security
 
Online Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory StudyOnline Shoppers Acceptance: An Exploratory Study
Online Shoppers Acceptance: An Exploratory Study
 
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on GraphPrim and Genetic Algorithms Performance in Determining Optimum Route on Graph
Prim and Genetic Algorithms Performance in Determining Optimum Route on Graph
 
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose DecisionMulti-Attribute Decision Making with VIKOR Method for Any Purpose Decision
Multi-Attribute Decision Making with VIKOR Method for Any Purpose Decision
 
Mobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny AlgorithmMobile Application Detection of Road Damage using Canny Algorithm
Mobile Application Detection of Road Damage using Canny Algorithm
 
Super-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE AlgorithmSuper-Encryption Cryptography with IDEA and WAKE Algorithm
Super-Encryption Cryptography with IDEA and WAKE Algorithm
 
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
Technique for Order Preference by Similarity to Ideal Solution as Decision Su...
 
Prototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic EnglishPrototype Application Multimedia Learning for Teaching Basic English
Prototype Application Multimedia Learning for Teaching Basic English
 
TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...TOPSIS Method Application for Decision Support System in Internal Control for...
TOPSIS Method Application for Decision Support System in Internal Control for...
 
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
Combination of Levenshtein Distance and Rabin-Karp to Improve the Accuracy of...
 
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in IndonesiaViolations of Cybercrime and the Strength of Jurisdiction in Indonesia
Violations of Cybercrime and the Strength of Jurisdiction in Indonesia
 
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
Marketing Strategy through Markov Optimization to Predict Sales on Specific P...
 
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory PlanningPrim's Algorithm for Optimizing Fiber Optic Trajectory Planning
Prim's Algorithm for Optimizing Fiber Optic Trajectory Planning
 
Image Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface CalculationImage Similarity Test Using Eigenface Calculation
Image Similarity Test Using Eigenface Calculation
 
Data Compression Using Elias Delta Code
Data Compression Using Elias Delta CodeData Compression Using Elias Delta Code
Data Compression Using Elias Delta Code
 
A Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network SecurityA Review of IP and MAC Address Filtering in Wireless Network Security
A Review of IP and MAC Address Filtering in Wireless Network Security
 
Expert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor MethodExpert System of Catfish Disease Determinant Using Certainty Factor Method
Expert System of Catfish Disease Determinant Using Certainty Factor Method
 

Recently uploaded

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupJonathanParaisoCruz
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 

Recently uploaded (20)

ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
MARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized GroupMARGINALIZATION (Different learners in Marginalized Group
MARGINALIZATION (Different learners in Marginalized Group
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 

Genetic Algorithm in Hill Cipher Encryption

  • 1. ISSN (Print): 2328-3491, ISSN (Online): 2328-3580, ISSN (CD-ROM): 2328-3629 American International Journal of Research in Science, Technology, Engineering & Mathematics AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 84 Available online at http://www.iasir.net AIJRSTEM is a refereed, indexed, peer-reviewed, multidisciplinary and open access journal published by International Association of Scientific Innovation and Research (IASIR), USA (An Association Unifying the Sciences, Engineering, and Applied Research) GeneticAlgorithm in Hill Cipher Encryption Andysah Putera Utama Siahaan Faculty of Computer Science Universitas Pembangunan Panca Budi Jl. Jend. Gatot Subroto Km. 4,5 Sei Sikambing, 20122, Medan, Sumatera Utara, Indonesia Abstract: The matrix in Hill Cipher was designed to perform encryption and decryption. Every column and row must be inserted by integer numbers. But, not any key that can be given to the matrix used for the process. The wrong determinant result cannot be used in the process because it produces the incorrect plaintext when doing the decryption after the encryption. Genetic algorithms offer the optimized way to determine the key used for encryption and decryption on the Hill Cipher. By determining the evaluation function in the genetic algorithm, the key that fits the composition will be obtained. By implementing this algorithm, the search of the key on the Hill Cipher will be easily done without spending too much time. Genetic algorithms do well if it is combined with Hill Cipher. Keywords - Cryptography, Genetic Algorithm, Hill Cipher I. Introduction Nowadays, encryption is a very critical aspect to be applied in securing file over the internet. There are two kinds of the cryptography style, such as classic and modern. Hill Cipher is one of the average methods used. It offers the high-security level mechanism. In common use, Hill Cipher has two matrix size, 2 x 2 and 3 x 3. This research will focus on the 3 x 3 matrix. The matrix has nine cells consists of three columns and three rows as well. A random integer number is usually put in each cell. There is a condition achieve where the determinant of the matrix must return 1. It is not easy when it is manually performed. It will take a long time do calculate until it reaches the correct value. The Genetic algorithms try to optimize the time wasted. It generates several or many populations to fit the destination desired. It is expected the cost of time will be minimized. Furthermore, the Genetic algorithms can return the key pairs on how many it is desired but the more keys generated, the more time wasted. II. Theories The confidential information must be protected from being intercepted [8]. There are various techniques should be used to protect the confidential image data from unauthorized access [7][9]. Hill Cipher is the modulo arithmetic technique in cryptography [1]. Hill Cipher uses the symmetric key as the password to convert plaintext to ciphertext. The Symmetric key is one of the cryptography systems that have the same kind of keys in encryption and decryption. The key employed to encryption is actually distinct from decryption, but they are drawn from the same formula. The key must be inverted before utilized to decrypt the ciphertext. This cryptographic technique has the matrix as the vessel of information exchanges either on encryption or decryption part [2]. The general theory of the matrix used in Hill Cipher is the multiplication between the matrix and the inverse of the matrix [3]. Without getting the right key, the process of encryption and decryption can be done. Figure 1 is the example of encryption process. Figure 1. Hill Cipher Encryption C1 is dependent on the multiplication of K11, K12, K13 and P1, P2, P3. The result of the multiplication has modular expression of the total character. Genetic algorithm is a computational algorithm that inspired the theory of evolution which was later adopted into computational algorithms is used to solve a search value in an
  • 2. Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1), June-August, 2016, pp. 84-89 AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 85 optimization problem [4]. This algorithm is built on the genetic processes in living organisms. This following figure explains the step of the Genetic algorithm process. Figure 2. Step of genetic algorithm There are three main steps in Genetic algorithms such as selection, crossover and mutation. Selection is used to recombine the population with the highest probability. The random number generated is combined with the cumulative probability. The nearest value is taken in order to replace the original value of the population. Figure 3. Roulette Wheel Selection Figure 3 shows one of the selection methods. The method above is Roulette Wheel Selection. Individuals are mapped into a line segment in a sequence such that each individual segment has the exact same size as its fitness. A random number generated. Individuals who have a segment within the segment in the region of the random numbers will be selected [6]. This process is repeated until the number of individuals is obtained. Crossover is a genetic algorithm operator to mix the chromosome with the extra chromosome chosen to produce child chromosome from one generation to the next. It usually selects some qualified parents [5]. The qualification is the crossover rate value. This value relates to select the parent chromosome. Initialize Population Fitness Evaluation Selection Crossover Mutation Result
  • 3. Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1), June-August, 2016, pp. 84-89 AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 86 Figure 4. One cut point crossover Figure 4 indicates the crossover based on one cut point division. Mutation is a genetic operator employed to maintain genetic diversity from one generation of a population of genetic algorithm chromosomes to the next. This operator repositions the chromosomes by exchanging the value of the chromosome. Figure 5. Swap Mutation Figure 5 shows the example of swap mutation. The R4 and R6 are swapped in mutation. The chromosome index does not change, but the value of the index is substituted for the other value in the other index. Mutation causes movement in the search space and may produce stronger chromosome. III. Related Work The previous researches of Hill Cipher do not say anything how to optimize the key search. The key is always obtained by trial and error method. This is not the clever idea to get the correct key in Hill Cipher. It needs the proper determinant to have the cipher text return its original message. It still requires more times to produce the key manually. Once the determinant gets wrong, it has to be recalculated from the beginning. There are nine numbers composed as the key for the encryption and decryption. IV. Proposed Work Every chromosome in Hill Cipher consists of nine numbers. Each cell has a value in range of 0 to 255 which represents the a byte number. Since the ASCII value does not exceed 255, it needs to be nomalized by a modular expression (MOD). Figure 6. Hill Cipher Chromosome K11 K12 K13 K21 K22 K23 K31 K32 K33 x x x x x x x x x Figure 6 shows the form of the Hill Cipher chromosome. The matrix is transformed into one-dimension vector. Each cell is filled with a random integer number (x). The fitness function evaluates the determinant of the chromosome by this following formula. 𝐹 = 𝐷eterminant (1) Where: F = Fitness D = Determinant The genetic algorithm of this method is rather straightforward than the one of a usual method for scheduling because it does not have to search until the fitness value reaches no error. It searches the ideal fitness which does not contain an even value. Since the determinant is in the odd number, it is good for Hill Cipher. But, in this case, it still find until the determinant reaches 1.
  • 4. Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1), June-August, 2016, pp. 84-89 AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 87 V. Testing and Implementation Before knowing how the method works, first thing first is to prepare the data. The first step is to generate the initial population. For example, the Generation is set to 30 and Population Size is 20. The initial random population is given in table 1. Each number in the cell is a random integer. Table I. Initial Population K11 K12 K13 K21 K22 K23 K31 K32 K33 108 85 165 89 69 185 97 185 54 65 86 135 47 224 116 213 112 6 227 29 41 44 1 141 101 218 32 174 195 136 196 220 37 108 144 43 31 232 46 145 120 234 196 242 63 190 54 140 128 118 179 151 108 43 90 64 85 24 242 106 154 178 244 172 124 121 98 194 81 73 183 135 215 82 163 62 103 13 79 165 164 147 47 77 212 45 112 249 18 80 213 7 244 195 246 197 244 25 119 196 92 115 59 55 190 44 191 27 134 29 216 72 200 78 196 7 131 168 214 80 10 104 177 1 114 177 145 20 91 221 73 79 149 137 73 50 89 246 142 168 108 85 116 244 119 141 61 167 254 239 66 77 65 40 187 243 193 58 195 14 154 172 190 168 210 137 178 63 5 146 173 139 26 47 226 179 242 187 137 228 Every chromosome is calculated to get the fitness, probability and cumulative probability. The next step is to conduct selection, crossover, and mutation. Table 2 shows the fitness, probability, and cumulative probability of population. Table II. Fitness, Probability, and Cumulative Probability F P CP 1 0,0003652 0,0003652 64 0,0233747 0,02374 210 0,0766983 0,1004383 238 0,0869248 0,187363 9 0,0032871 0,1906501 76 0,0277575 0,2184076 150 0,0547845 0,2731921 186 0,0679328 0,3411249 203 0,0741417 0,4152666 174 0,06355 0,4788167 241 0,0880205 0,5668371 84 0,0306793 0,5975164 0 0 0,5975164 152 0,055515 0,6530314 172 0,0628196 0,715851 188 0,0686633 0,7845142 223 0,0814463 0,8659606 169 0,0617239 0,9276844 2 0,0007305 0,9284149 196 0,0715851 1
  • 5. Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1), June-August, 2016, pp. 84-89 AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 88 The process of selection, crossover and mutation has modified the population structure. The order of the key changes to the other number from other chromosomes. The new generation results from the latest updated chromosomes as saw in Table 2. Table III. Next Generation Population K11 K12 K13 K21 K22 K23 K31 K32 K33 134 47 216 112 213 90 18 7 131 85 47 244 195 85 212 244 196 249 119 63 77 78 145 72 249 18 135 108 47 197 179 47 239 119 234 65 167 89 7 142 179 108 200 116 89 78 64 116 24 242 112 27 191 80 80 44 185 7 1 141 62 242 32 254 29 106 196 200 50 13 29 185 31 232 46 145 120 216 154 178 244 139 85 227 226 212 165 168 137 228 218 244 41 163 168 147 112 242 244 228 85 147 234 69 97 131 141 54 147 47 77 61 232 246 249 18 80 215 82 142 101 103 29 79 165 164 187 120 86 59 55 190 44 6 213 31 45 46 134 116 89 196 242 63 65 86 246 196 224 92 66 112 72 77 115 135 246 224 26 213 112 6 116 196 65 77 45 212 25 137 50 139 26 47 226 45 47 187 242 108 This process continues to the latest generation. It is the last result where the Hill Cipher keys are generated. At the end of the process to the total of the Hill Cipher key is variant. Table 4 shows the final result of the Genetic algorithm. Table IV. The Final Result K11 K12 K13 K21 K22 K23 K31 K32 K33 147 69 62 147 232 82 29 147 147 147 62 147 232 246 29 82 147 246 82 147 232 69 246 82 246 72 147 After getting the result, the key combination is now formed as showed in Table 5. The numbers showed in the blocks are generated by the genetic algorithm. It is cannot be performed manually because it takes much time to calculate the determinant. Table V. The Key Combination Key 1 Key 2 Key 3 147 69 62 147 62 147 82 147 232 147 232 82 232 246 29 69 246 82 29 147 147 82 147 246 246 72 147 The key in the block section is used to encrypt the plaintext in Hill Cipher algorithm. Plaintext : ANDYSAHXX ( 65 78 68 89 83 65 72 88 88 )
  • 6. Andysah Putera Utama Siahaan, American International Journal of Research in Science, Technology, Engineering & Mathematics, 15(1), June-August, 2016, pp. 84-89 AIJRSTEM 16-227; © 2016, AIJRSTEM All Rights Reserved Page 89 Key : ( 147 69 62 147 232 82 29 147 147 ) Ciphertext : ÑË38%`H8 ( 209 203 51 56 37 17 96 72 56 ) Key Inverse : ( 82 131 218 249 171 228 57 40 241 ) Plaintext : ANDYSAHXX ( 65 78 68 89 83 65 72 88 88 ) There are three keys produced by the genetic algorithm. The calculation aboe is the proof of Key 1. The determinant is 1 and it is suitable for the Hill Cipher process. When the determinant is 1, it can return the ciphertext back to the plain text. VI. Conclusion On the Hill Cipher algorithm that uses a 3x3 matrix, searching key that has the proper determinant takes time. If it is performed in that way, it slows down the process of cryptography. Genetic algorithms greatly assist the process of the encryption and the decryption on the Hill Cipher. It produces a series of numbers quickly. This technique generates several alternatives that can be used on the Hill Cipher algorithm. In this study, the genetic algorithm has a valuable contribution when combined with the Hill Cipher method. References [1] Abdullah, A. A., Khalaf, R., & Riza, M. (2015). A Realizable Quantum Three-Pass Protocol Authentication. Mathematical Problems in Engineering. [2] Chase, J., & Davis, M. (2010). Extending the Hill Cipher. [3] Chowdhury, S. I., Shohag, S. A., & Sahid, H. (2011). A Secured Message Transaction Approach by Dynamic Hill Cipher Generation and Digest Concatenation. International Journal of Computer Applications, 23(9), 25-31. [4] Ghanbari, A. A., Broumandnia, A., Navidi, H., & Ahmadi, A. (2012). Brain Computer Interface with Genetic Algorithm. International Journal of Information and Communication Technology Research, 2(1), 79-86. [5] Lin, C. H., Yu, J. L., Liu, J. C., Lai, W. S., & Ho, C. H. (2009). Genetic Algorithm for Shortest Driving Time in Intelligent Transportation Systems. International Journal of Hybrid Information Technology, 2(1), 21-30. [6] Szénási, S., & Vámossy, Z. (2013). Implementation of a Distributed Genetic Algorithm for Parameter Optimization in a Cell Nuclei Detection Project. Acta Polytechnica Hungarica, 10(4), 59-86. [7] A. P. U. Siahaan, "RC4 Technique in Visual Cryptography RGB Image Encryption," International Journal of Computer Science and Engineering, vol. 3, no. 7, pp. 1-6, 2016 [8] A. P. U. Siahaan, “Three-Pass Protocol Concept in Hill Cipher Encryption Technique,” International Journal of Science and Research, vol. 5, no. 7, 2016. [9] A. P. U. Siahaan, “Factorization Hack of RSA Secret Numbers,” International Journal of Engineering Trends and Technology, vol. 37, no. 1, pp. 15-18, 2016. Biography Andysah Putera Utama Siahaan was born in Medan, Indonesia, in 1980. He received the S.Kom. degree in computer science from Universitas Pembangunan Panca Budi, Medan, Indonesia, in 2010, and the M.Kom. in computer science as well from the University of Sumatera Utara, Medan, Indonesia, in 2012. In 2010, he joined the Department of Engineering, Universitas Pembangunan Panca Budi, as a Lecturer, and in 2012 became a junior researcher. He is applying for his Ph. D. degree in 2016. He has written in several international journal and conference. He is now active in writing papers and joining conferences.