SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1474
ENHANCED SECURITY USING GENETIC ALGORITHM IN CRYPTOGRAPHY
B. SRIPRIYA1, N. SRINIVASAN2
1M. Tech Scholar, Department of Computer Science & Engineering, Raghu Engineering college, Dakamarri(V),
Visakhapatanam, AP, India.
2Senior Assistant Professor, Department of Computer Science & Engineering, Raghu Engineering college,
Dakamarri(V), Visakhapatanam, AP, India.
---------------------------------------------------------------------***----------------------------------------------------------------------
Abstract - In present age of information technology the
transmission of data with security is a big challenge. Both
symmetric and asymmetric cryptography systems are not
correct for high level security. Latest hash based function are
far better than the traditional systems but the complex
algorithms functions are very time consuming. In tradition
way of system data is first encrypted with the help of key but
there are still possibilities of hacking the key andchangingthe
text. So, the key should be so strong and efficient, so a format
should be proposed which have the advantage of theory of
natural selection. Genetic Algorithm is used to solve many
problems by simplifying genetic process and itisconsidered as
optimization algorithm. With this Genetic algorithm we can
improve the strength of the key, which can ultimately make
the whole algorithm good and efficient. In this proposed
method, data encryption is done in numberofsteps. Firstly, the
key is generated by random number generator and by the
application of geneticalgorithmoperations. Secondly, thedata
should be diffused by using genetic operations and logical
operations should be performedbetween diffused dataand the
key. Finally, comparative study should be done between
proposed method and cryptography algorithm. It has been
observed that proposed algorithm is having much better
results with strong and efficient key but comparative less
efficient than others.
Key Words: Symmetric Key Cryptography, Genetic
algorithm, Genetic Key, Encryption, Decryption.
1. INTRODUCTION
Cryptography is completely based on Encryption and
Decryption. In the Encryption, the data which is to be sent
from sender to receiver is converted into unreadable form
which is called as encrypted form. And thatdata issendfrom
sender to receiver, at the receiver side the data which is in
encrypted form is converted into original form, which is
called as decryption. Both the encryption process and
decryption process requires a key. For the protection of
important and valuable data, different models of
cryptography algorithms are designed. Mainly there two
types of cryptographic algorithms:
1.SYMMETRIC CRYPTOGRAPHY
2.ASYMMETRIC CRYPTOGRAPHY
In symmetric cryptography, same key is used in both
encryption and decryption. This process is mostly used in
encryption of data due to high performance. In asymmetric
cryptography the key will differ in encryption and in
decryption.
2. METHOD – GENERATION OF GENETIC KEY
Genetic algorithm is a kind of algorithmswhichmakesuseof
the mechanics of natural selection and genetics. It isa partof
Evolutionary Algorithms which are used to solve
optimization problems with the help of mechanisms like
crossover, selection and mutation. The process of solving
optimization problems using Genetic Algorithms.
Fig. 1. Fitness Function of Genetic Algorithm
The main idea of Genetic Algorithm is to imitate the
randomness of the nature of selection process and behavior.
The natural system make population of individuals able to
adapt the surrounding. We can say the survival and
reproduction of the individuals is supported by exclusion of
less fitted individuals.
The population is generated in sucha waythattheindividual
with the highest fitness value is most likely to be replicated
and unfitted individual is discarded based on threshold set
by an iterative application of set of stochastic genetic
operators. Genetic Algorithm performsfollowingoperations
to transform the population to new population based on
fitness value.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1475
3.1 Crossover
Crossover is a genetic operation which joins two
chromosomes to form new chromosome. The newly
generated child chromosome is composed of chromosomes
from each parent.
Crossover is classified as single point, twopointanduniform
crossover. In Single Point only one crossover point is
selected to generate new child. In Two Point crossover two
crossover points are selected to generate new child. In
Uniform crossover bits are selected uniformly from each.
Fig. 2 Types of cross overs
3.2 Mutation
In mutation after crossover at least one bit in each
chromosome is changed. This is performed to reflect the
effect of around in natural genetic process. There are two
major types of Mutation i.e Flipping of Bits and Boundary
Mutation. In Flipping of Bits one or more bits are converted
into 0 to 1 or 1 to 0. In Boundary Mutation randomly upper
or lower block in swapped in chromosome.
Fig. 3 Mutation
3.3 Selection
In selection, chromosomes are chosen from the population
for generating new population. The selection is based on
value of fitness. If the value is high thentheselectionchances
will be more. Selection is classified as Roulette-wheel
Selection, Tournament Selection; Truncation Selection.
3.4 Fitness Function
Fitness function is one of the most important function in
Genetic algorithm because good fitness is useful for the
exploration of search space efficiently and bad fitness
functions are for local optimum solution. Fitness Function
can be categorized as two types. One is Constant fitness
function and another one is Mutable fitness function.
In cryptography, Key Selection is one of the selection
problem and when we consider the key is selected, the key
with highest fitness and randomness is selected. The
applications of Genetic Algorithm are also in heuristic
problems, which make the Genetic algorithm for key
generation and data encryption.
4. RESULTS
After runing the file we will get the above screen as first
screen and that is called as welcome screen, This screen
contains two buttons. One is Sender Frame button, another
one is Reciver Frame button.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1476
By clicking the Sender Frame button in the welcome Screen,
this screen will appear. And the above screen is “ Sender
Frame Screen”.
In the above result we are Uploading the file by using the
button Browse, after that by enter the key,click theGenerate
Genetic key button and then Genetic key will be generated.
By clicking the Encrypt button we can get the Encrypted
data.
After encrypting the data. The sender will send the file, then
the Receiver Frame button should be clicked in the welcome
frame and the above Screen is “Receiver Frame”.
After encryption the encrypted data is stored in default file.
Open Receiver frame and upload the encrypted file by using
the browse button and then enter the genetic key. Click the
Decrypt button and then we can get the Plain text.
5. CONCLUSION
In this paper, we used the Genetic Key for the encryption of
data. The genetic key generated helps us in providing the
privacy along with secrecy. The various techniques such as
mutation, crossover, fitness functions are used for the
generation of genetic key. After the genetic key generation
data is diffused and XOR ed for encryption. In future, we
wish to enhance this project to all types of files including
images, video files and other miscellaneous files. And we
would also increase the efficiency.
6. REFERENCES
[1] R. Jhingran and A. Prof, “A Study on Cryptography using
Genetic Algorithm VikasThadaShivali Dhaka,” Int. J.
Comput. Appl., vol. 118, no. 20, pp. 975–8887, 2015.
[2] A.-K. S. O. Hassan, A. F. Shalash, and N. F. Saudy,
“MODIFICATIONS ON RSA CRYPTOSYSTEM USING
GENETIC OPTIMIZATION,” Int. J. Res. Rev. Appl. Sci.,vol.
19, no. 2, p. 150, 2014.
[3] S. K and P. D. S, “A Symmetric Key EncryptionTechnique
Using Genetic Algorithm.”
[4] A. Soni and S. Agrawal, “Using Genetic Algorithm for
Symmetric key Generation in Image Encryption,” Int. J.
Adv. Res. Comput. En. Technol., vol. 1, no. 10, pp. 2278–
1323, 2012.
[5] S. Jawaid and A. Jamal, “Article: Generating the Best Fit
Key in Cryptography using Genetic Algorithm,” Int. J.
Comput. Appl., vol. 98, no. 20, pp. 33–39, Jul. 2014.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072
© 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1477
[6] G. M. Krishna and V. Lakshmi, “A Proposed Method for
Cryptographic Technique by Using Genetic Function,”
Int. J. Emerg. Eng. Res. Technol., pp. 1–7, 2015.
[7] S. Das, S. N. Mandal, and N. Ghoshal, “Diffusion and
Encryption of Digital Image Using Genetic Algorithm,”in
Proceedings of the 3rdInternational Conference on
Frontiers of Intelligent Computing: Theory and
Applications (FICTA) 2014, 2015, pp. 729–736.
[8] A. Almarimi, A. Kumar, I. Almerhag, and N. Elzoghbi, “A
NEW APPROACH FOR DATA ENCRYPTION USING
GENETIC Original Image Pseudorandom Binary
Sequence GeneratorusingGAandDecryptionDecrypted
Image,” Computer (Long. Beach. Calif).pp. 2–6, 2014.
B. Sripriya,
M. Tech Scholar,
CSE Department,
Raghu Engineering college,
Vishakapatanam.
N. Srinivasan,
Senior Assistant professor,
CSE Department,
Raghu Engineering college,
Vishakapatanam.
Author
Photo
BIOGRAPHIES

More Related Content

What's hot

Performance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganographyPerformance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganography
journalBEEI
 

What's hot (10)

Genetic Algorithm for optimization on IRIS Dataset REPORT pdf
Genetic Algorithm for optimization on IRIS Dataset REPORT pdfGenetic Algorithm for optimization on IRIS Dataset REPORT pdf
Genetic Algorithm for optimization on IRIS Dataset REPORT pdf
 
G017544855
G017544855G017544855
G017544855
 
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM Wmn06MODERNIZED INTRUSION DETECTION USING  ENHANCED APRIORI ALGORITHM
Wmn06MODERNIZED INTRUSION DETECTION USING ENHANCED APRIORI ALGORITHM
 
Performance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganographyPerformance analysis on secured data method in natural language steganography
Performance analysis on secured data method in natural language steganography
 
Detection of Aedes aegypti larvae using single shot multibox detector with tr...
Detection of Aedes aegypti larvae using single shot multibox detector with tr...Detection of Aedes aegypti larvae using single shot multibox detector with tr...
Detection of Aedes aegypti larvae using single shot multibox detector with tr...
 
Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...Survey on evolutionary computation tech techniques and its application in dif...
Survey on evolutionary computation tech techniques and its application in dif...
 
IRJET- Techniques for Analyzing Job Satisfaction in Working Employees – A...
IRJET-  	  Techniques for Analyzing Job Satisfaction in Working Employees – A...IRJET-  	  Techniques for Analyzing Job Satisfaction in Working Employees – A...
IRJET- Techniques for Analyzing Job Satisfaction in Working Employees – A...
 
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
A novel fast-chaff-point-generation-method-using-bioinspired-flower-pollinati...
 
G44083642
G44083642G44083642
G44083642
 
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...
Prognosticating Autism Spectrum Disorder Using Artificial Neural Network: Lev...
 

Similar to IRJET- Enhanced Security using Genetic Algorithm in Cryptography

rpaper
rpaperrpaper
rpaper
imu409
 

Similar to IRJET- Enhanced Security using Genetic Algorithm in Cryptography (20)

Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...Comparative analysis of efficiency of fibonacci random number generator algor...
Comparative analysis of efficiency of fibonacci random number generator algor...
 
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low DistortionEnhanced Efficient & Secure Steganography Algorithm with Low Distortion
Enhanced Efficient & Secure Steganography Algorithm with Low Distortion
 
Image encryption approach for security issues
Image encryption approach for security issuesImage encryption approach for security issues
Image encryption approach for security issues
 
rpaper
rpaperrpaper
rpaper
 
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
IRJET- Cancelable Biometric based Key Generation for Symmetric Cryptography: ...
 
Design and Implementation of New Encryption algorithm to Enhance Performance...
Design and Implementation of New Encryption algorithm to  Enhance Performance...Design and Implementation of New Encryption algorithm to  Enhance Performance...
Design and Implementation of New Encryption algorithm to Enhance Performance...
 
J017446568
J017446568J017446568
J017446568
 
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCESURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
SURVEY OF COMPRESSION AND CRYPTOGRAPHY TECHNIQUES OF DATA SECURITY IN E-COMMERCE
 
Ko3618101814
Ko3618101814Ko3618101814
Ko3618101814
 
IJSRED-V2I2P13
IJSRED-V2I2P13IJSRED-V2I2P13
IJSRED-V2I2P13
 
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHMAUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
AUDIO CRYPTOGRAPHY VIA ENHANCED GENETIC ALGORITHM
 
IRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication SystemIRJET- Voice Modulation and Verification for Smart Authentication System
IRJET- Voice Modulation and Verification for Smart Authentication System
 
ICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptxICMCSI 2023 PPT 1074.pptx
ICMCSI 2023 PPT 1074.pptx
 
ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)ASCII Value Based Encryption System (AVB)
ASCII Value Based Encryption System (AVB)
 
Review paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and SteganographyReview paper on Data Security using Cryptography and Steganography
Review paper on Data Security using Cryptography and Steganography
 
Enhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid ComputingEnhancing the Techniques to Secure Grid Computing
Enhancing the Techniques to Secure Grid Computing
 
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET-  	  Ensuring Security in Cloud Computing Cryptography using CryptographyIRJET-  	  Ensuring Security in Cloud Computing Cryptography using Cryptography
IRJET- Ensuring Security in Cloud Computing Cryptography using Cryptography
 
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
IRJET-Impact of Manual VS Automatic Transfer Switching on Reliability of Powe...
 
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR ValueA Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
A Secure & Optimized Data Hiding Technique Using DWT With PSNR Value
 
IRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image ProcessingIRJET- Advanced Two Factor Authentication using Image Processing
IRJET- Advanced Two Factor Authentication using Image Processing
 

More from IRJET Journal

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
drjose256
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
benjamincojr
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
Kira Dess
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
rahulmanepalli02
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
MaherOthman7
 

Recently uploaded (20)

Working Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdfWorking Principle of Echo Sounder and Doppler Effect.pdf
Working Principle of Echo Sounder and Doppler Effect.pdf
 
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
Tembisa Central Terminating Pills +27838792658 PHOMOLONG Top Abortion Pills F...
 
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdflitvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
litvinenko_Henry_Intrusion_Hong-Kong_2024.pdf
 
Raashid final report on Embedded Systems
Raashid final report on Embedded SystemsRaashid final report on Embedded Systems
Raashid final report on Embedded Systems
 
Basics of Relay for Engineering Students
Basics of Relay for Engineering StudentsBasics of Relay for Engineering Students
Basics of Relay for Engineering Students
 
21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university21scheme vtu syllabus of visveraya technological university
21scheme vtu syllabus of visveraya technological university
 
Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1Research Methodolgy & Intellectual Property Rights Series 1
Research Methodolgy & Intellectual Property Rights Series 1
 
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas SachpazisSeismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
Seismic Hazard Assessment Software in Python by Prof. Dr. Costas Sachpazis
 
electrical installation and maintenance.
electrical installation and maintenance.electrical installation and maintenance.
electrical installation and maintenance.
 
Circuit Breakers for Engineering Students
Circuit Breakers for Engineering StudentsCircuit Breakers for Engineering Students
Circuit Breakers for Engineering Students
 
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTUUNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
UNIT-2 image enhancement.pdf Image Processing Unit 2 AKTU
 
Filters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility ApplicationsFilters for Electromagnetic Compatibility Applications
Filters for Electromagnetic Compatibility Applications
 
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdfInstruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
Instruct Nirmaana 24-Smart and Lean Construction Through Technology.pdf
 
Artificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdfArtificial intelligence presentation2-171219131633.pdf
Artificial intelligence presentation2-171219131633.pdf
 
21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx21P35A0312 Internship eccccccReport.docx
21P35A0312 Internship eccccccReport.docx
 
Intro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney UniIntro to Design (for Engineers) at Sydney Uni
Intro to Design (for Engineers) at Sydney Uni
 
Insurance management system project report.pdf
Insurance management system project report.pdfInsurance management system project report.pdf
Insurance management system project report.pdf
 
Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...Fuzzy logic method-based stress detector with blood pressure and body tempera...
Fuzzy logic method-based stress detector with blood pressure and body tempera...
 
Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..Maher Othman Interior Design Portfolio..
Maher Othman Interior Design Portfolio..
 
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and ToolsMaximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
Maximizing Incident Investigation Efficacy in Oil & Gas: Techniques and Tools
 

IRJET- Enhanced Security using Genetic Algorithm in Cryptography

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1474 ENHANCED SECURITY USING GENETIC ALGORITHM IN CRYPTOGRAPHY B. SRIPRIYA1, N. SRINIVASAN2 1M. Tech Scholar, Department of Computer Science & Engineering, Raghu Engineering college, Dakamarri(V), Visakhapatanam, AP, India. 2Senior Assistant Professor, Department of Computer Science & Engineering, Raghu Engineering college, Dakamarri(V), Visakhapatanam, AP, India. ---------------------------------------------------------------------***---------------------------------------------------------------------- Abstract - In present age of information technology the transmission of data with security is a big challenge. Both symmetric and asymmetric cryptography systems are not correct for high level security. Latest hash based function are far better than the traditional systems but the complex algorithms functions are very time consuming. In tradition way of system data is first encrypted with the help of key but there are still possibilities of hacking the key andchangingthe text. So, the key should be so strong and efficient, so a format should be proposed which have the advantage of theory of natural selection. Genetic Algorithm is used to solve many problems by simplifying genetic process and itisconsidered as optimization algorithm. With this Genetic algorithm we can improve the strength of the key, which can ultimately make the whole algorithm good and efficient. In this proposed method, data encryption is done in numberofsteps. Firstly, the key is generated by random number generator and by the application of geneticalgorithmoperations. Secondly, thedata should be diffused by using genetic operations and logical operations should be performedbetween diffused dataand the key. Finally, comparative study should be done between proposed method and cryptography algorithm. It has been observed that proposed algorithm is having much better results with strong and efficient key but comparative less efficient than others. Key Words: Symmetric Key Cryptography, Genetic algorithm, Genetic Key, Encryption, Decryption. 1. INTRODUCTION Cryptography is completely based on Encryption and Decryption. In the Encryption, the data which is to be sent from sender to receiver is converted into unreadable form which is called as encrypted form. And thatdata issendfrom sender to receiver, at the receiver side the data which is in encrypted form is converted into original form, which is called as decryption. Both the encryption process and decryption process requires a key. For the protection of important and valuable data, different models of cryptography algorithms are designed. Mainly there two types of cryptographic algorithms: 1.SYMMETRIC CRYPTOGRAPHY 2.ASYMMETRIC CRYPTOGRAPHY In symmetric cryptography, same key is used in both encryption and decryption. This process is mostly used in encryption of data due to high performance. In asymmetric cryptography the key will differ in encryption and in decryption. 2. METHOD – GENERATION OF GENETIC KEY Genetic algorithm is a kind of algorithmswhichmakesuseof the mechanics of natural selection and genetics. It isa partof Evolutionary Algorithms which are used to solve optimization problems with the help of mechanisms like crossover, selection and mutation. The process of solving optimization problems using Genetic Algorithms. Fig. 1. Fitness Function of Genetic Algorithm The main idea of Genetic Algorithm is to imitate the randomness of the nature of selection process and behavior. The natural system make population of individuals able to adapt the surrounding. We can say the survival and reproduction of the individuals is supported by exclusion of less fitted individuals. The population is generated in sucha waythattheindividual with the highest fitness value is most likely to be replicated and unfitted individual is discarded based on threshold set by an iterative application of set of stochastic genetic operators. Genetic Algorithm performsfollowingoperations to transform the population to new population based on fitness value.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1475 3.1 Crossover Crossover is a genetic operation which joins two chromosomes to form new chromosome. The newly generated child chromosome is composed of chromosomes from each parent. Crossover is classified as single point, twopointanduniform crossover. In Single Point only one crossover point is selected to generate new child. In Two Point crossover two crossover points are selected to generate new child. In Uniform crossover bits are selected uniformly from each. Fig. 2 Types of cross overs 3.2 Mutation In mutation after crossover at least one bit in each chromosome is changed. This is performed to reflect the effect of around in natural genetic process. There are two major types of Mutation i.e Flipping of Bits and Boundary Mutation. In Flipping of Bits one or more bits are converted into 0 to 1 or 1 to 0. In Boundary Mutation randomly upper or lower block in swapped in chromosome. Fig. 3 Mutation 3.3 Selection In selection, chromosomes are chosen from the population for generating new population. The selection is based on value of fitness. If the value is high thentheselectionchances will be more. Selection is classified as Roulette-wheel Selection, Tournament Selection; Truncation Selection. 3.4 Fitness Function Fitness function is one of the most important function in Genetic algorithm because good fitness is useful for the exploration of search space efficiently and bad fitness functions are for local optimum solution. Fitness Function can be categorized as two types. One is Constant fitness function and another one is Mutable fitness function. In cryptography, Key Selection is one of the selection problem and when we consider the key is selected, the key with highest fitness and randomness is selected. The applications of Genetic Algorithm are also in heuristic problems, which make the Genetic algorithm for key generation and data encryption. 4. RESULTS After runing the file we will get the above screen as first screen and that is called as welcome screen, This screen contains two buttons. One is Sender Frame button, another one is Reciver Frame button.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1476 By clicking the Sender Frame button in the welcome Screen, this screen will appear. And the above screen is “ Sender Frame Screen”. In the above result we are Uploading the file by using the button Browse, after that by enter the key,click theGenerate Genetic key button and then Genetic key will be generated. By clicking the Encrypt button we can get the Encrypted data. After encrypting the data. The sender will send the file, then the Receiver Frame button should be clicked in the welcome frame and the above Screen is “Receiver Frame”. After encryption the encrypted data is stored in default file. Open Receiver frame and upload the encrypted file by using the browse button and then enter the genetic key. Click the Decrypt button and then we can get the Plain text. 5. CONCLUSION In this paper, we used the Genetic Key for the encryption of data. The genetic key generated helps us in providing the privacy along with secrecy. The various techniques such as mutation, crossover, fitness functions are used for the generation of genetic key. After the genetic key generation data is diffused and XOR ed for encryption. In future, we wish to enhance this project to all types of files including images, video files and other miscellaneous files. And we would also increase the efficiency. 6. REFERENCES [1] R. Jhingran and A. Prof, “A Study on Cryptography using Genetic Algorithm VikasThadaShivali Dhaka,” Int. J. Comput. Appl., vol. 118, no. 20, pp. 975–8887, 2015. [2] A.-K. S. O. Hassan, A. F. Shalash, and N. F. Saudy, “MODIFICATIONS ON RSA CRYPTOSYSTEM USING GENETIC OPTIMIZATION,” Int. J. Res. Rev. Appl. Sci.,vol. 19, no. 2, p. 150, 2014. [3] S. K and P. D. S, “A Symmetric Key EncryptionTechnique Using Genetic Algorithm.” [4] A. Soni and S. Agrawal, “Using Genetic Algorithm for Symmetric key Generation in Image Encryption,” Int. J. Adv. Res. Comput. En. Technol., vol. 1, no. 10, pp. 2278– 1323, 2012. [5] S. Jawaid and A. Jamal, “Article: Generating the Best Fit Key in Cryptography using Genetic Algorithm,” Int. J. Comput. Appl., vol. 98, no. 20, pp. 33–39, Jul. 2014.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 06 Issue: 08 | Aug 2019 www.irjet.net p-ISSN: 2395-0072 © 2019, IRJET | Impact Factor value: 7.34 | ISO 9001:2008 Certified Journal | Page 1477 [6] G. M. Krishna and V. Lakshmi, “A Proposed Method for Cryptographic Technique by Using Genetic Function,” Int. J. Emerg. Eng. Res. Technol., pp. 1–7, 2015. [7] S. Das, S. N. Mandal, and N. Ghoshal, “Diffusion and Encryption of Digital Image Using Genetic Algorithm,”in Proceedings of the 3rdInternational Conference on Frontiers of Intelligent Computing: Theory and Applications (FICTA) 2014, 2015, pp. 729–736. [8] A. Almarimi, A. Kumar, I. Almerhag, and N. Elzoghbi, “A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC Original Image Pseudorandom Binary Sequence GeneratorusingGAandDecryptionDecrypted Image,” Computer (Long. Beach. Calif).pp. 2–6, 2014. B. Sripriya, M. Tech Scholar, CSE Department, Raghu Engineering college, Vishakapatanam. N. Srinivasan, Senior Assistant professor, CSE Department, Raghu Engineering college, Vishakapatanam. Author Photo BIOGRAPHIES