CFP last date
20 December 2024
Reseach Article

Enciphering the information by using Range Table with Genetic Algorithms

by B. Susheel Kumar, Kanusu Srinivasa Rao, Ratnakumari Challa
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 183 - Number 39
Year of Publication: 2021
Authors: B. Susheel Kumar, Kanusu Srinivasa Rao, Ratnakumari Challa
10.5120/ijca2021921767

B. Susheel Kumar, Kanusu Srinivasa Rao, Ratnakumari Challa . Enciphering the information by using Range Table with Genetic Algorithms. International Journal of Computer Applications. 183, 39 ( Nov 2021), 26-31. DOI=10.5120/ijca2021921767

@article{ 10.5120/ijca2021921767,
author = { B. Susheel Kumar, Kanusu Srinivasa Rao, Ratnakumari Challa },
title = { Enciphering the information by using Range Table with Genetic Algorithms },
journal = { International Journal of Computer Applications },
issue_date = { Nov 2021 },
volume = { 183 },
number = { 39 },
month = { Nov },
year = { 2021 },
issn = { 0975-8887 },
pages = { 26-31 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume183/number39/32189-2021921767/ },
doi = { 10.5120/ijca2021921767 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:19:12.876971+05:30
%A B. Susheel Kumar
%A Kanusu Srinivasa Rao
%A Ratnakumari Challa
%T Enciphering the information by using Range Table with Genetic Algorithms
%J International Journal of Computer Applications
%@ 0975-8887
%V 183
%N 39
%P 26-31
%D 2021
%I Foundation of Computer Science (FCS), NY, USA
Abstract

At the present time, in contrast with the past usage of the internet has been added on. Each and every organization like Educational organizations, Government sectors, Business organizations etc is making the use of internet to enlarge their organizations. In such scenario great amount of sensitive information has being transmitted via the internet. Therefore it is vitally important to secure the information which is transmitting through the internet in order to keep it safe from the intruder attacks. To keep the information safe and secure the concept of cryptography has been developed. Different form of cryptographic algorithms are in use to enciphering the text. In this paper we will discuss about encoding the text by using range table with the help of genetic algorithms

References
  1. William Stallings, "Cryptography and Network Security: Principles and Practices", 4th Edition, Prentice Hall, 2006, page numbers 30-39
  2. Hans Delfs and Helmut Knebl, "Introduction to Cryptography: Principles and Applications", Springer, first edition, 2002, page numbers 11- 14.
  3. Katoch, S., Chauhan, S.S. & Kumar, V. A review on genetic algorithm: past, present, and future. Multimed Tools Appl 80, 8091–8126 (2021). https://doi.org/10.1007/s11042-020-10139-6
  4. K. F. Man, K. S. Tang and S. Kwong, "Genetic algorithms: concepts and applications [in engineering design]," in IEEE Transactions on Industrial Electronics, vol. 43, no. 5, pp. 519-534, Oct. 1996, doi: 10.1109/41.538609.
  5. Nasution, A & Efendi, Sahrul & Suwilo, S. (2018). Image Steganography In Securing Sound File Using Arithmetic Coding Algorithm, Triple Data Encryption Standard (3DES) and Modified Least Significant Bit (MLSB). Journal of Physics: Conference Series. 1007. 012010. 10.1088/1742-6596/1007/1/012010.
  6. Behrouz A. Forouzan, “ cryptography and Network Security”, Special Indian Edition, TATA McGraw Hill.. .
  7. S.Tanebaum, “ Modern Operating Systems”, Prentice Hall, 2003.
  8. S. Dubey, R. Jhaggar, R. Verma, D. Gaur, “Encryption and Decryption of Data by Genetic Algorithm”, International Journal of Scientific Research in Computer Science and Engineering Vol.5, Issue.3, pp.42-46, June (2017).
  9. Jian Wang etc " Digital Image Encryption Algorithm Design Based on Genetic Hyperchaos”, international journal of optics, Volume 2016 , https://doi.org/10.1155/2016/2053724.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptography Plain text Cipher text Range Table LSB Genetic algorithms