Cryptographic Technique using Substitution through Circular Path Followed by Genetic Function
暂无分享,去创建一个
In this paper a new algorithm for encryption and decryption is introduced. The process of substitution and genetic function is the core of the proposed algorithm. In this encryption technique two keys are required for the encryption or decryption of a message. Input stream will be produced intermediate cipher text on which two stages of crossover will be used in the process of encryption and decryption to produce final cipher text.
[1] Anthony J. Bagnall,et al. The Applications of Genetic Algorithms in Cryptanalysis , 1996 .
[2] Dorothea Heiss-Czedik,et al. An Introduction to Genetic Algorithms. , 1997, Artificial Life.
[3] N. Koblitz. A Course in Number Theory and Cryptography , 1987 .
[4] William Stallings,et al. Cryptography and network security , 1998 .
[5] S. Arumugam,et al. Breaking Transposition Cipher with Genetic Algorithm , 2007 .