SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5121
Embedding Randomness into Symmetric Key Encryption using Genetic
Algorithm
Globy Yohannan1, Prof. Soumya J.W2
1PG Scholar, Dept. of ECE, Believers Church Caarmel Engineering College, Perunnad, Kerala, India,
2Assoc. Prof, Dept. of ECE, Believers Church Caarmel Engineering College, Perunnad, Kerala, India
----------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Data security is equally important as the storing
and communication of data. Shared key encryption is a
method that provides security by using pre-shared key. It
generates the same cipher text for the same set of plain text
and key. Security can be improved by imposing some sort of
randomness in the key. This can be achieved by using genetic
algorithm. Using this algorithm different cipher text can be
generated for same set of plain text and key. Because of the
randomness added to cipher text generation, standard attack
methods such as brute force, chosen-plaintext attacks etc. are
made more difficult. The effectiveness of the algorithm is
tested on plain text, and speech and results are satisfactory.
Key Words: Shared key encryption, Randomness,
Embedding, Extracting, Genetic algorithm, Data security.
1. INTRODUCTION
Nowadays, communication technologies have become the
medium to exchange the data in the form of text, image and
audio. So, data security is as important as that of the
collection of information. To avoid eavesdropping,
encryption methods are needed. The overhead added to
communication and storing of sensitive data, due to
cryptographic methods, is a necessary side-effect for the
protection of valuable information. Cryptography schemes
ensure data security and avoid modifications by the
unauthorized users. Mainly there are secret key encryption
and public key encryption. Shared key encryption provides
data security by using a pre-shared key. The pre-shared key
is exchanged through a secure medium. In shared key
encryption, same key is used for both encryption and
decryption. Public key encryption method ensures data
security by using two keys (public key and private key).
Public key can be accessed by anyone, but private key can
only be accessed by the owner. Public key encryption
method provides more security than shared key encryption.
To provide the same level of data security as that of the
shared key encryption method, Public key encryption
method is computationally cost and complex. So, it is
necessary to generate an unbreakable algorithm, which is
suitable for less resource consumption devices (that is, low
cost in terms of computation and communicationoverhead).
Same cipher texts are generated for same set of plain text
and key using shared key encryption. Once the shared key is
known to the intruder the entire security will compromise.
To increase the security using shared key, different cipher
texts are generated for same set of plain text and key. And
security can be improved by imposing some sort of
randomness in the key. Randomness can be provided by
using genetic algorithm operators. It generates unique and
minimum correlated (i.e., maximum difference) cipher text.
Randomness imposed by genetic algorithm increases
security but it introduces another problem, theintermediate
key generated by the sender side is not known to the
receiver side. So, we need to embed the intermediate key
along with the cipher text (Note thatthesecurityheremeans
is the analytical security not the security of the symmetric
key encryption). Because of the randomness it is made
difficult to apply the standard attack methods such as
dictionary method, brute force, known key method etc. It is
made impossible to find which function is used for
encryption because of the randomness. This method is
suitable for IoT, mobile andlesscomplexapplications.Thisis
helpful in improving security in cryptographic algorithms in
embedded systems without increasing computational
complexity manifolds.
The security level of any symmetric key algorithmisdirectly
proportional to the execution time [2]. This canbeimproved
by increasing the number of iterations(stages)ofsharedkey
encryption. Genetic algorithm finds the fittest solution for
the given problem using genetic operators. In this paper, a
continuously changing random key is generated with the
help of G.A. So standard attack methods can’t retrieve
information from the encrypted data or cipher text. Unless
the secret key is known to hacker, it is impossible to decrypt
the text because different ciphertextaregeneratingforsame
set of plain text and key each time an iteration of the
algorithm is carried out. Both the key and data are secured
using this method. This is similar to embedding information
into images using steganography.
2. GENETIC ALGORITHM
Genetic algorithms are a class of optimization algorithm [4],
which finds the suitable fittest solution for a given problem
from a population. It is based on natural selection,
inheritance,mutation,andcrossover.Mutationandcrossover
are the genetic algorithm operators in G.A. The genetic
algorithm belongs to the family of evolutionary algorithms,
along with genetic programming, evolution strategies, and
evolutionaryprogramming[3].Geneticalgorithmfindsalotof
application in cryptanalysis field, mathematics, engineering
etc. Genetic algorithm considers an optimization problem as
the environment, where feasiblesolutionsaretheindividuals
living in that environment [1]. Population contains a several
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5122
solutions or individuals or chromosomes. Chromosome
means the possiblesolutiontoparticularproblem.Eachvalue
of chromosome is called the genes.
Genetic algorithm generates the initial populationrandomly.
Once the initial population is generated, it enters the loop to
generatenew population. New populationisgeneratedatthe
end of the loop. Dependingupontherequirementthenumber
of loops can be increased to find the fittest solution.
Regeneration process occurs with the help of genetic
algorithm operators. Operators are selected based on the
application. In this paper, single point crossover and
mutation are used.
After the generation of the initial population, fitness of each
individual is calculated. Based on the result of the fitness
calculation the best fittest solutions are selected from the
population. These solutions are taken as the parents for the
next generation. Newoffspringaredevelopedwiththehelpof
reproduction operators. It selects two or more parents and
after certain recombination new individuals are generated
with crossover operator. Modification of individuals is done
with the help of mutation operator. It helps to maintain
diversity. These offspring along with the parents are used as
the next population. Parents are along with the offspring as
the next population because if we are using offspring alone
for the next stage, we can’t guarantee that the new offspring
will be better than the previous.Sometimesthenewoffspring
may be worse than the previous offspring. Using the parents
along with the offspring wecan assurethat the newoffspring
will be as better as the previous one.
Genetic algorithm is used instead of pseudorandom number
generation because, in the case of pseudorandom number
generator, it generates number that seems to be random but
actually not. G.A is an optimization class and it generates
number that is actually random using genetic operators. The
fitness function in our implementation of genetic algorithm
prefers (selects) chromosomes or individuals which have
minimum correlation and maximum difference with other
individuals of the same generation. This is what we need in
this paper.
3. PROPOSED SCHEME
Genetic algorithm along with embedding is used in the
proposed scheme to improve the security of the sensitive
information. Random keys are generated with the help of
genetic algorithm. It generates unique cipher for same set of
plain textand key each time the algorithm is carried out. And
the random keys are made continuously changing. Our
implementation supports multiplesimultaneousinstancesof
the algorithm. This algorithm is suitable for text, image and
speech file.
In the case of text file the eight bit is vacant (since for inputs
A-Z, a-z, 0-9 and common symbols the 8th bit remains
vacant). But for the case of special characters or images or
text the 8th bit is not vacant. And there is a chance of bit
overflow this can be overcome by using subtraction
operation. The encryption process occurs as three stages.
Secret key is first shared between sender and receiver
through a secure medium. In the first stage:
1. The inputs to this stage are plain text and random
key.
2. Random keys are developed with the help of genetic
algorithm.
3. Plain text is divided into nibbles (means as 4 bits).
Left nibble of plain text is X-ored with the left nibble
of random key.
4. Then the right nibble of the key is subtracted from
the right nibble of the above result.
5. Because of subtraction there is a chance of getting
signed values. To convert the signed values into
unsigned values take 2’s compliment.
6. Then the right nibble of the result of 2’s compliment
is X-ored with the right nibble of the random key.
7. The resultant is given as the input for next stage of
encryption.
Fig-1: Block diagram of Encryption stage
(We are taking the input as 8 bits). The reason for using Xor
instead of OR and AND operation is that, using OR and AND
operation encryption process is possible but during the
decryption stage we can’t get the exact plain text back. Using
Xor operation the exact plaintext can be retrieved duringthe
decryptionprocess.XorOperationisalsoknownasreversible
process. In the second stage of encryption:
1. The input to this stage is the cipher text generated in
the first stage (cipher text 1).
2. The bits in the primeFibonaccipositionsofthecipher
text are complemented (that is, Xor cipher text with
the hexadecimal value 3A).
3. Then the entire cipher text is reversed.
4. After the reverse operation once again, the bits inthe
prime Fibonacci positions of the above result is
complemented.
5. Then the result is divided into nibbles. The leftnibble
is storedas one dimensional array and Xor operation
is performing on the right nibble with reverse of the
left nibble (That is, the 1st bit is Xored with the 8th
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5123
bit and store the result in the 8th bit, The 2nd bit is
Xored with the 7th bit and stored it in the 7th bit and
continue the process till 4th bit is Xored with the 5th
bit and store the result in the 5th bit).
6. The result obtained is given as the input to the third
stage of encryption process.
The reason forusing the Fibonacci primeposition is that, itis
widely seen serieslikethefundamentalsignalssinewaveand
cosine wave. It is possible to predict the growth using this
series. In the Stage three encryption process:
1. The inputs to this stage are cipher text generated
from stage 2 encryption (cipher text 2), shared key
and random key.
2. In this stage the simultaneously generating random
keys are embedding in the cipher text based on the
shared key sequence.
3. Then the cipher text is converted into ASCII value.
Fig-2: Block diagram of Decryption stage
Embedding stage occurs as follows: random keys are
embedded into the cipher text based on the shared key
sequence. If the shared key shows 0 as value, embed a bit
from cipher text. If the sharedkey valueis1,embedabitfrom
random key. Continue the processtillthereremainsnobits.If
the shared key value is exhausted first, continue to scanfrom
the start. For the case of image, reshape the 3-D array (two
dimensions plus color data) into 1-D array and embed any
dimension into 1-D array which is needed in the decryption
process. In the decryption stage the plain text is retrieved
from the encrypted data. Decryption occurs as three stages.
In the decryption stage 1:
1. The inputs to this stage are cipher text 3 and shared
key.
2. In this level random key and cipher text 2 are
extracted from the cipher text 3.
Extraction is the reverse process of embedding. In the
extraction process cipher text and random keys are
extracting based on the sequence of the shared key. Assign 0
as cipher text and 1 as random key or vice versa. And start to
scan the shared key, if the bit of shared key is 0, store the bit
from the cipher text 3 as cipher text 2. If the bit of shared key
is 1, store the bit from the cipher text 3 as random key.
Continue the process till all the bits of the cipher text 3 gets
exhausted. If the shared key is exhausted first, then continue
to scan from the first position. In the decryption stage 2:
1. The input to this stage is cipher text 2.
2. The input is divided into nibbles. The left nibble is
stored as one dimensional array and Xor operation
is performing on the right nibble with reverse of the
left nibble (That is, the 1st bit is Xored with the 8th
bit and store the result in the 8th bit, The 2nd bit is
Xored with the 7th bit and stored it in the 7thbitand
continue the process till 4th bit is Xored withthe5th
bit and store the result in the 5th bit).
3. The bits in the prime Fibonacci positions of the
cipher text are complemented (that is, Xor cipher
text with the hexadecimal value 3A).
4. Then the entire cipher text is reversed.
5. After the reverse operation once againthebitsinthe
prime Fibonacci positions of the above result is
complemented.
Cipher text 1 is regenerated after this stage, which is givenas
the input to next stage. In the decryption stage 3:
1. The inputs to this stage are ciphertext1andrandom
key.
2. The cipher text 1 is divided into nibbles. And Xor
operation is performed on the right nibble of cipher
text with right nibble of the random key.
3. Then the 2’s compliment of the result is taken to
convert the unsigned integertosignedintegervalue.
4. Then the addition operation is performed between
right nibble of the cipher text and the right nibble of
the random key.
5. Xor operation is performed between left nibble of
the cipher text and the left nibble of the key.
The plain text is generated after this stage.
3. RESULTS
The proposed algorithm is tested on text, image and speech
file. Results obtained are quite satisfactory. Below shows the
results obtained for a text file using proposed algorithm.
Algorithm is tested using text file as sentence and as
paragraph. Plain text and shared key given are:
Plain text: Chrysanthemums were first cultivated in China as
a flowering herb as far back as the 15thcentury BC. Over 500
cultivars had been recorded by 1630. The plant is renowned
as one of the Four Gentlemen in Chinese and East Asian art.
The plant is particularly significant during the Double Ninth
Festival.
Shared key: @Farenheit320.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5124
Random keys are kept changing continuously. The following
shows the generated randomkeysandtheencrypteddatafor
the given input:
Random key: 0-#;[Cc0 and - nxGmh.c
Cipher text:
9 Œ1<K˜¬& fR' lŽæâH°#Õ ÃÀ€ æbRÁ4AÆ4V¥$V ‘" !
Vïã4dV†áÑ1 Ò F¤óu ¢R€q FT… äÖ2‚ ÐÁ & ¶¿äÖ2"`
ÓT¥oä5 á# Ä‘Ä%²Ïçö QÅå  ¶T£%UbÒÁ1 F ¡ãÄ
æâÀ 6÷#¥TåÅ æÕ2Âïä$d 僡ЄAÆ”±äÄ ‡ñr€ AÆ ±äõ
… ƒò äEF_ãDó €r „F†TÕT€åP& øA?Ûp 4Ë@ 翱ߡ •
W< À5¾¹1 á ³_ÖïåÑ …åâ …ŸÀæÕ CÁ’³à Ô¡&“¶“Ïß" ³P
vã ‚° £ ¤•Æ”Åv€••“áFôŸÆÃQáïQâ¯c ƒ‘7C ‚Ÿ åæÖ
5. CONCLUSION
The data security using symmetric key encryption can be
improved by imposing some sort of randomness with the
help of genetic algorithm. Finding which function is used for
encryption using standard attack methodsaremadedifficult
using this method. The proposed algorithm is tested for text
and speech files and results obtained are quite satisfactory.
REFERENCES
[1] Ajay Kr. Phogat and Archana Das, “A Symmetric
Cryptography Based on Extended Genetic Algorithm,”
IJCTER, Volume 2 Issue 4, April 2016, pp. 541-547.
[2] Subhajit Das, Satyendra Nath Mandal and Nabin
Ghoshal, “Diffusion and Encryption of Digital Image
Using Genetic Algorithm,” FICTA, Volume 1, 2014.
[3] Suvajit Dutta, Tanumay Das and Sharad Jash, “A
Cryptography AlgorithmUsingthe OperationsofGenetic
Algorithm & Pseudo Random Sequence Generating
Functions,” IJACST, Volume 3, No. 5, May 2014.
[4] Aarti Soni and Suyash Agrawal, ”Using Genetic
Algorithm For Symmetric Key Generation in Image
Encryption,” IJARCET, Volume 1 Issue 10, December
2012.
[5] Sindhuja K and Pramela Devi S, “A Symmetric Key
Encryption Technique Using Genetic Algorithm,”IJCSIT,
Volume 5, 2014.
[6] Rasul Enayatifar and Abdul Hanan Abdullah, “Image
Security Via Genetic Algorithm,” IPCSIT, Volume 14,
2011.

More Related Content

What's hot

Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataIRJET Journal
 
Performance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganographyPerformance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganographyjournalBEEI
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEJournal For Research
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...IOSR Journals
 
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...AJSERJournal
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET Journal
 
IRJET- Public Opinion Analysis on Law Enforcement
IRJET-  	  Public Opinion Analysis on Law EnforcementIRJET-  	  Public Opinion Analysis on Law Enforcement
IRJET- Public Opinion Analysis on Law EnforcementIRJET Journal
 
PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY AN...
PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY AN...PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY AN...
PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY AN...IAEME Publication
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...ijait
 
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODELEXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODELijaia
 
Extractive Summarization with Very Deep Pretrained Language Model
Extractive Summarization with Very Deep Pretrained Language ModelExtractive Summarization with Very Deep Pretrained Language Model
Extractive Summarization with Very Deep Pretrained Language Modelgerogepatton
 
Survey of Various Approaches of Emotion Detection Via Multimodal Approach
Survey of Various Approaches of Emotion Detection Via Multimodal ApproachSurvey of Various Approaches of Emotion Detection Via Multimodal Approach
Survey of Various Approaches of Emotion Detection Via Multimodal ApproachIRJET Journal
 
Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology IJECEIAES
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMcscpconf
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...IOSR Journals
 
Detection of multiword from a wordnet is complex
Detection of multiword from a wordnet is complexDetection of multiword from a wordnet is complex
Detection of multiword from a wordnet is complexeSAT Publishing House
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issuesIAEME Publication
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based onacijjournal
 
THE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATION
THE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATIONTHE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATION
THE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATIONijscai
 

What's hot (20)

Sentiment Analysis on Twitter Data
Sentiment Analysis on Twitter DataSentiment Analysis on Twitter Data
Sentiment Analysis on Twitter Data
 
Performance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganographyPerformance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganography
 
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUEIMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
IMAGE STEGANOGRAPHY USING BLOCK LEVEL ENTROPY THRESHOLDING TECHNIQUE
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
Application of Game Theory to Select the Most Suitable Cryptographic Algorith...
 
IRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech AnalysisIRJET - Threat Prediction using Speech Analysis
IRJET - Threat Prediction using Speech Analysis
 
IRJET- Public Opinion Analysis on Law Enforcement
IRJET-  	  Public Opinion Analysis on Law EnforcementIRJET-  	  Public Opinion Analysis on Law Enforcement
IRJET- Public Opinion Analysis on Law Enforcement
 
PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY AN...
PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY AN...PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY AN...
PATTERN SYNTHESIS OF NON-UNIFORM AMPLITUDE EQUALLY SPACED MICROSTRIP ARRAY AN...
 
Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...Performance Evaluation of Password Authentication using Associative Neural Me...
Performance Evaluation of Password Authentication using Associative Neural Me...
 
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODELEXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
EXTRACTIVE SUMMARIZATION WITH VERY DEEP PRETRAINED LANGUAGE MODEL
 
Extractive Summarization with Very Deep Pretrained Language Model
Extractive Summarization with Very Deep Pretrained Language ModelExtractive Summarization with Very Deep Pretrained Language Model
Extractive Summarization with Very Deep Pretrained Language Model
 
Survey of Various Approaches of Emotion Detection Via Multimodal Approach
Survey of Various Approaches of Emotion Detection Via Multimodal ApproachSurvey of Various Approaches of Emotion Detection Via Multimodal Approach
Survey of Various Approaches of Emotion Detection Via Multimodal Approach
 
Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology Adaptive key generation algorithm based on software engineering methodology
Adaptive key generation algorithm based on software engineering methodology
 
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHMCOMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
COMPUTER INTRUSION DETECTION BY TWOOBJECTIVE FUZZY GENETIC ALGORITHM
 
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...An Approach of Automatic Data Mining Algorithm for Intrusion  Detection and P...
An Approach of Automatic Data Mining Algorithm for Intrusion Detection and P...
 
Detection of multiword from a wordnet is complex
Detection of multiword from a wordnet is complexDetection of multiword from a wordnet is complex
Detection of multiword from a wordnet is complex
 
Public key cryptography
Public key cryptographyPublic key cryptography
Public key cryptography
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
A novel steganographic scheme based on
A novel steganographic scheme based onA novel steganographic scheme based on
A novel steganographic scheme based on
 
THE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATION
THE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATIONTHE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATION
THE EFFECTS OF THE LDA TOPIC MODEL ON SENTIMENT CLASSIFICATION
 

Similar to IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algorithm

Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionIRJET Journal
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueIJERA Editor
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET Journal
 
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHMAUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHMijma
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET Journal
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSacijjournal
 
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...INFOGAIN PUBLICATION
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionIRJET Journal
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED
 
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET Journal
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET Journal
 
M021201092098
M021201092098M021201092098
M021201092098theijes
 
Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...butest
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorIRJET Journal
 
Prediction of Euro 50 Using Back Propagation Neural Network (BPNN) and Geneti...
Prediction of Euro 50 Using Back Propagation Neural Network (BPNN) and Geneti...Prediction of Euro 50 Using Back Propagation Neural Network (BPNN) and Geneti...
Prediction of Euro 50 Using Back Propagation Neural Network (BPNN) and Geneti...AI Publications
 

Similar to IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algorithm (20)

Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHMAUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTSSYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
SYMMETRIC-KEY BASED PRIVACYPRESERVING SCHEME FOR MINING SUPPORT COUNTS
 
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...a performance analysis of generalized key scheme block cipher (gksbc) algorit...
a performance analysis of generalized key scheme block cipher (gksbc) algorit...
 
Machine Learning-Based Phishing Detection
Machine Learning-Based Phishing DetectionMachine Learning-Based Phishing Detection
Machine Learning-Based Phishing Detection
 
IJSRED-V2I2P12
IJSRED-V2I2P12IJSRED-V2I2P12
IJSRED-V2I2P12
 
IRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real NetworkIRJET- Intrusion Detection using IP Binding in Real Network
IRJET- Intrusion Detection using IP Binding in Real Network
 
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
IRJET- A Secured Method of Data Aggregation for Wireless Sensor Networks in t...
 
Ijetcas14 355
Ijetcas14 355Ijetcas14 355
Ijetcas14 355
 
H42063743
H42063743H42063743
H42063743
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
IRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography TechniqueIRJET- Concealing of Deets using Steganography Technique
IRJET- Concealing of Deets using Steganography Technique
 
M021201092098
M021201092098M021201092098
M021201092098
 
Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...Enhancement of Error Correction in Quantum Cryptography BB84 ...
Enhancement of Error Correction in Quantum Cryptography BB84 ...
 
CrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm SimulatorCrAlSim: A Cryptography Algorithm Simulator
CrAlSim: A Cryptography Algorithm Simulator
 
Prediction of Euro 50 Using Back Propagation Neural Network (BPNN) and Geneti...
Prediction of Euro 50 Using Back Propagation Neural Network (BPNN) and Geneti...Prediction of Euro 50 Using Back Propagation Neural Network (BPNN) and Geneti...
Prediction of Euro 50 Using Back Propagation Neural Network (BPNN) and Geneti...
 
G017544855
G017544855G017544855
G017544855
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learningmisbanausheenparvam
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxvipinkmenon1
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort servicejennyeacort
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )Tsuyoshi Horigome
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130Suhani Kapoor
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSKurinjimalarL3
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2RajaP95
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 

Recently uploaded (20)

chaitra-1.pptx fake news detection using machine learning
chaitra-1.pptx  fake news detection using machine learningchaitra-1.pptx  fake news detection using machine learning
chaitra-1.pptx fake news detection using machine learning
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Introduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptxIntroduction to Microprocesso programming and interfacing.pptx
Introduction to Microprocesso programming and interfacing.pptx
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort serviceGurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
Gurgaon ✡️9711147426✨Call In girls Gurgaon Sector 51 escort service
 
SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )SPICE PARK APR2024 ( 6,793 SPICE Models )
SPICE PARK APR2024 ( 6,793 SPICE Models )
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
VIP Call Girls Service Hitech City Hyderabad Call +91-8250192130
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICSAPPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
APPLICATIONS-AC/DC DRIVES-OPERATING CHARACTERISTICS
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2HARMONY IN THE HUMAN BEING - Unit-II UHV-2
HARMONY IN THE HUMAN BEING - Unit-II UHV-2
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 

IRJET- Embedding Randomness into Symmetric Key Encryption using Genetic Algorithm

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5121 Embedding Randomness into Symmetric Key Encryption using Genetic Algorithm Globy Yohannan1, Prof. Soumya J.W2 1PG Scholar, Dept. of ECE, Believers Church Caarmel Engineering College, Perunnad, Kerala, India, 2Assoc. Prof, Dept. of ECE, Believers Church Caarmel Engineering College, Perunnad, Kerala, India ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Data security is equally important as the storing and communication of data. Shared key encryption is a method that provides security by using pre-shared key. It generates the same cipher text for the same set of plain text and key. Security can be improved by imposing some sort of randomness in the key. This can be achieved by using genetic algorithm. Using this algorithm different cipher text can be generated for same set of plain text and key. Because of the randomness added to cipher text generation, standard attack methods such as brute force, chosen-plaintext attacks etc. are made more difficult. The effectiveness of the algorithm is tested on plain text, and speech and results are satisfactory. Key Words: Shared key encryption, Randomness, Embedding, Extracting, Genetic algorithm, Data security. 1. INTRODUCTION Nowadays, communication technologies have become the medium to exchange the data in the form of text, image and audio. So, data security is as important as that of the collection of information. To avoid eavesdropping, encryption methods are needed. The overhead added to communication and storing of sensitive data, due to cryptographic methods, is a necessary side-effect for the protection of valuable information. Cryptography schemes ensure data security and avoid modifications by the unauthorized users. Mainly there are secret key encryption and public key encryption. Shared key encryption provides data security by using a pre-shared key. The pre-shared key is exchanged through a secure medium. In shared key encryption, same key is used for both encryption and decryption. Public key encryption method ensures data security by using two keys (public key and private key). Public key can be accessed by anyone, but private key can only be accessed by the owner. Public key encryption method provides more security than shared key encryption. To provide the same level of data security as that of the shared key encryption method, Public key encryption method is computationally cost and complex. So, it is necessary to generate an unbreakable algorithm, which is suitable for less resource consumption devices (that is, low cost in terms of computation and communicationoverhead). Same cipher texts are generated for same set of plain text and key using shared key encryption. Once the shared key is known to the intruder the entire security will compromise. To increase the security using shared key, different cipher texts are generated for same set of plain text and key. And security can be improved by imposing some sort of randomness in the key. Randomness can be provided by using genetic algorithm operators. It generates unique and minimum correlated (i.e., maximum difference) cipher text. Randomness imposed by genetic algorithm increases security but it introduces another problem, theintermediate key generated by the sender side is not known to the receiver side. So, we need to embed the intermediate key along with the cipher text (Note thatthesecurityheremeans is the analytical security not the security of the symmetric key encryption). Because of the randomness it is made difficult to apply the standard attack methods such as dictionary method, brute force, known key method etc. It is made impossible to find which function is used for encryption because of the randomness. This method is suitable for IoT, mobile andlesscomplexapplications.Thisis helpful in improving security in cryptographic algorithms in embedded systems without increasing computational complexity manifolds. The security level of any symmetric key algorithmisdirectly proportional to the execution time [2]. This canbeimproved by increasing the number of iterations(stages)ofsharedkey encryption. Genetic algorithm finds the fittest solution for the given problem using genetic operators. In this paper, a continuously changing random key is generated with the help of G.A. So standard attack methods can’t retrieve information from the encrypted data or cipher text. Unless the secret key is known to hacker, it is impossible to decrypt the text because different ciphertextaregeneratingforsame set of plain text and key each time an iteration of the algorithm is carried out. Both the key and data are secured using this method. This is similar to embedding information into images using steganography. 2. GENETIC ALGORITHM Genetic algorithms are a class of optimization algorithm [4], which finds the suitable fittest solution for a given problem from a population. It is based on natural selection, inheritance,mutation,andcrossover.Mutationandcrossover are the genetic algorithm operators in G.A. The genetic algorithm belongs to the family of evolutionary algorithms, along with genetic programming, evolution strategies, and evolutionaryprogramming[3].Geneticalgorithmfindsalotof application in cryptanalysis field, mathematics, engineering etc. Genetic algorithm considers an optimization problem as the environment, where feasiblesolutionsaretheindividuals living in that environment [1]. Population contains a several
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5122 solutions or individuals or chromosomes. Chromosome means the possiblesolutiontoparticularproblem.Eachvalue of chromosome is called the genes. Genetic algorithm generates the initial populationrandomly. Once the initial population is generated, it enters the loop to generatenew population. New populationisgeneratedatthe end of the loop. Dependingupontherequirementthenumber of loops can be increased to find the fittest solution. Regeneration process occurs with the help of genetic algorithm operators. Operators are selected based on the application. In this paper, single point crossover and mutation are used. After the generation of the initial population, fitness of each individual is calculated. Based on the result of the fitness calculation the best fittest solutions are selected from the population. These solutions are taken as the parents for the next generation. Newoffspringaredevelopedwiththehelpof reproduction operators. It selects two or more parents and after certain recombination new individuals are generated with crossover operator. Modification of individuals is done with the help of mutation operator. It helps to maintain diversity. These offspring along with the parents are used as the next population. Parents are along with the offspring as the next population because if we are using offspring alone for the next stage, we can’t guarantee that the new offspring will be better than the previous.Sometimesthenewoffspring may be worse than the previous offspring. Using the parents along with the offspring wecan assurethat the newoffspring will be as better as the previous one. Genetic algorithm is used instead of pseudorandom number generation because, in the case of pseudorandom number generator, it generates number that seems to be random but actually not. G.A is an optimization class and it generates number that is actually random using genetic operators. The fitness function in our implementation of genetic algorithm prefers (selects) chromosomes or individuals which have minimum correlation and maximum difference with other individuals of the same generation. This is what we need in this paper. 3. PROPOSED SCHEME Genetic algorithm along with embedding is used in the proposed scheme to improve the security of the sensitive information. Random keys are generated with the help of genetic algorithm. It generates unique cipher for same set of plain textand key each time the algorithm is carried out. And the random keys are made continuously changing. Our implementation supports multiplesimultaneousinstancesof the algorithm. This algorithm is suitable for text, image and speech file. In the case of text file the eight bit is vacant (since for inputs A-Z, a-z, 0-9 and common symbols the 8th bit remains vacant). But for the case of special characters or images or text the 8th bit is not vacant. And there is a chance of bit overflow this can be overcome by using subtraction operation. The encryption process occurs as three stages. Secret key is first shared between sender and receiver through a secure medium. In the first stage: 1. The inputs to this stage are plain text and random key. 2. Random keys are developed with the help of genetic algorithm. 3. Plain text is divided into nibbles (means as 4 bits). Left nibble of plain text is X-ored with the left nibble of random key. 4. Then the right nibble of the key is subtracted from the right nibble of the above result. 5. Because of subtraction there is a chance of getting signed values. To convert the signed values into unsigned values take 2’s compliment. 6. Then the right nibble of the result of 2’s compliment is X-ored with the right nibble of the random key. 7. The resultant is given as the input for next stage of encryption. Fig-1: Block diagram of Encryption stage (We are taking the input as 8 bits). The reason for using Xor instead of OR and AND operation is that, using OR and AND operation encryption process is possible but during the decryption stage we can’t get the exact plain text back. Using Xor operation the exact plaintext can be retrieved duringthe decryptionprocess.XorOperationisalsoknownasreversible process. In the second stage of encryption: 1. The input to this stage is the cipher text generated in the first stage (cipher text 1). 2. The bits in the primeFibonaccipositionsofthecipher text are complemented (that is, Xor cipher text with the hexadecimal value 3A). 3. Then the entire cipher text is reversed. 4. After the reverse operation once again, the bits inthe prime Fibonacci positions of the above result is complemented. 5. Then the result is divided into nibbles. The leftnibble is storedas one dimensional array and Xor operation is performing on the right nibble with reverse of the left nibble (That is, the 1st bit is Xored with the 8th
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5123 bit and store the result in the 8th bit, The 2nd bit is Xored with the 7th bit and stored it in the 7th bit and continue the process till 4th bit is Xored with the 5th bit and store the result in the 5th bit). 6. The result obtained is given as the input to the third stage of encryption process. The reason forusing the Fibonacci primeposition is that, itis widely seen serieslikethefundamentalsignalssinewaveand cosine wave. It is possible to predict the growth using this series. In the Stage three encryption process: 1. The inputs to this stage are cipher text generated from stage 2 encryption (cipher text 2), shared key and random key. 2. In this stage the simultaneously generating random keys are embedding in the cipher text based on the shared key sequence. 3. Then the cipher text is converted into ASCII value. Fig-2: Block diagram of Decryption stage Embedding stage occurs as follows: random keys are embedded into the cipher text based on the shared key sequence. If the shared key shows 0 as value, embed a bit from cipher text. If the sharedkey valueis1,embedabitfrom random key. Continue the processtillthereremainsnobits.If the shared key value is exhausted first, continue to scanfrom the start. For the case of image, reshape the 3-D array (two dimensions plus color data) into 1-D array and embed any dimension into 1-D array which is needed in the decryption process. In the decryption stage the plain text is retrieved from the encrypted data. Decryption occurs as three stages. In the decryption stage 1: 1. The inputs to this stage are cipher text 3 and shared key. 2. In this level random key and cipher text 2 are extracted from the cipher text 3. Extraction is the reverse process of embedding. In the extraction process cipher text and random keys are extracting based on the sequence of the shared key. Assign 0 as cipher text and 1 as random key or vice versa. And start to scan the shared key, if the bit of shared key is 0, store the bit from the cipher text 3 as cipher text 2. If the bit of shared key is 1, store the bit from the cipher text 3 as random key. Continue the process till all the bits of the cipher text 3 gets exhausted. If the shared key is exhausted first, then continue to scan from the first position. In the decryption stage 2: 1. The input to this stage is cipher text 2. 2. The input is divided into nibbles. The left nibble is stored as one dimensional array and Xor operation is performing on the right nibble with reverse of the left nibble (That is, the 1st bit is Xored with the 8th bit and store the result in the 8th bit, The 2nd bit is Xored with the 7th bit and stored it in the 7thbitand continue the process till 4th bit is Xored withthe5th bit and store the result in the 5th bit). 3. The bits in the prime Fibonacci positions of the cipher text are complemented (that is, Xor cipher text with the hexadecimal value 3A). 4. Then the entire cipher text is reversed. 5. After the reverse operation once againthebitsinthe prime Fibonacci positions of the above result is complemented. Cipher text 1 is regenerated after this stage, which is givenas the input to next stage. In the decryption stage 3: 1. The inputs to this stage are ciphertext1andrandom key. 2. The cipher text 1 is divided into nibbles. And Xor operation is performed on the right nibble of cipher text with right nibble of the random key. 3. Then the 2’s compliment of the result is taken to convert the unsigned integertosignedintegervalue. 4. Then the addition operation is performed between right nibble of the cipher text and the right nibble of the random key. 5. Xor operation is performed between left nibble of the cipher text and the left nibble of the key. The plain text is generated after this stage. 3. RESULTS The proposed algorithm is tested on text, image and speech file. Results obtained are quite satisfactory. Below shows the results obtained for a text file using proposed algorithm. Algorithm is tested using text file as sentence and as paragraph. Plain text and shared key given are: Plain text: Chrysanthemums were first cultivated in China as a flowering herb as far back as the 15thcentury BC. Over 500 cultivars had been recorded by 1630. The plant is renowned as one of the Four Gentlemen in Chinese and East Asian art. The plant is particularly significant during the Double Ninth Festival. Shared key: @Farenheit320.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 03 | Mar 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.211 | ISO 9001:2008 Certified Journal | Page 5124 Random keys are kept changing continuously. The following shows the generated randomkeysandtheencrypteddatafor the given input: Random key: 0-#;[Cc0 and - nxGmh.c Cipher text: 9 Œ1<K˜¬& fR' lŽæâH°#Õ ÃÀ€ æbRÁ4AÆ4V¥$V ‘" ! Vïã4dV†áÑ1 Ò F¤óu ¢R€q FT… äÖ2‚ ÐÁ & ¶¿äÖ2"` ÓT¥oä5 á# Ä‘Ä%²Ïçö QÅå  ¶T£%UbÒÁ1 F ¡ãÄ æâÀ 6÷#¥TåÅ æÕ2Âïä$d 僡ЄAÆ”±äÄ ‡ñr€ AÆ ±äõ … ƒò äEF_ãDó €r „F†TÕT€åP& øA?Ûp 4Ë@ 翱ߡ • W< À5¾¹1 á ³_ÖïåÑ …åâ …ŸÀæÕ CÁ’³à Ô¡&“¶“Ïß" ³P vã ‚° £ ¤•Æ”Åv€••“áFôŸÆÃQáïQâ¯c ƒ‘7C ‚Ÿ åæÖ 5. CONCLUSION The data security using symmetric key encryption can be improved by imposing some sort of randomness with the help of genetic algorithm. Finding which function is used for encryption using standard attack methodsaremadedifficult using this method. The proposed algorithm is tested for text and speech files and results obtained are quite satisfactory. REFERENCES [1] Ajay Kr. Phogat and Archana Das, “A Symmetric Cryptography Based on Extended Genetic Algorithm,” IJCTER, Volume 2 Issue 4, April 2016, pp. 541-547. [2] Subhajit Das, Satyendra Nath Mandal and Nabin Ghoshal, “Diffusion and Encryption of Digital Image Using Genetic Algorithm,” FICTA, Volume 1, 2014. [3] Suvajit Dutta, Tanumay Das and Sharad Jash, “A Cryptography AlgorithmUsingthe OperationsofGenetic Algorithm & Pseudo Random Sequence Generating Functions,” IJACST, Volume 3, No. 5, May 2014. [4] Aarti Soni and Suyash Agrawal, ”Using Genetic Algorithm For Symmetric Key Generation in Image Encryption,” IJARCET, Volume 1 Issue 10, December 2012. [5] Sindhuja K and Pramela Devi S, “A Symmetric Key Encryption Technique Using Genetic Algorithm,”IJCSIT, Volume 5, 2014. [6] Rasul Enayatifar and Abdul Hanan Abdullah, “Image Security Via Genetic Algorithm,” IPCSIT, Volume 14, 2011.