a new approach for data encryption using genetic algorithms

Upload: nithinkharvi

Post on 14-Apr-2018

223 views

Category:

Documents


0 download

TRANSCRIPT

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    1/15

    A NEW APPROACH FOR DATA ENCRYPTI

    USING GENETIC ALGORITHMS

    Under the guidance of:Mr. Radhakrishna Dodman

    Assistant Professor

    Department of CSEN.M.A.M. Institute of Tech

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    2/15

    1. INTRODUCTION 2. OVERVIEW OF CRYPTOGRAPHY 3. LITERATURE SURVEY 4. DESIGN 5. IMPLEMENTATION 6. EXPERIMENTAL RESULTS 7. CONCLUSION AND FUTURE WORK REFRENCES

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    3/15

    In todays information age, information sharing and

    has increased exponentially. Security is the most imfactor in information system.

    The purpose of the project is to communication uninto everyone except the intended receiver(s).

    Protect sensitive information in a large number of ap

    including personal data security, internet security, and military communications security, etc. thrprocesses of encryption/decryption.

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    4/15

    There are two types of cryptographic schemes:

    symmetric cryptography and asymmetric cryptograp

    Goal of CryptographyConfidentiality , Data integrity, Authentication , Non

    repudiation

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    5/15

    A. Tragha et al.[9, 10], in 2005 & 2006 descri

    symmetrical block ciphering system named ICIGA Cryptography Inspired by Genetic Algorithmgenerates a session key in a random process.

    M. Husainy [11] in 2006 proposes Image Encryption

    Genetic Algorithm based Image Encryption using muand crossover concept.

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    6/15

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    7/15

    LFSRs (linear feedback shift registers) provide a simpfor generating non sequential lists of numbers quick

    microcontrollers. Generating the pseudo-random nuonly requires a left-shift operation and an XOR oper

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    8/15

    Choose a random point on the two parents

    Split parents at this crossover point

    Create children by exchanging tails1-point Parent 1: 1 0 1 0 |0 0 1 1crossover Parent 2: 0 0 1 1 |0 1 0 0

    Offspring 1: 1 0 1 0 | 0 1 0 0Offspring 2: 0 0 1 1 | 0 0 1 1

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    9/15

    THE ENCRYPTION PROCESSWe consider two consecutive bytes of the data stream A1 and A2 asA1 = 11100010A2 = 11001001

    Consider decimal value sequence of LFSR asZn=276, 78, 98, 26..

    After taking mod 8 of Z1 it becomesZ1=4

    After crossover A1 and A2 with Z1=4B1 = 11101001B2 = 11000010

    After XOR B1 with Z2 (78) and B2 with Z3 (98) we get cipher text asC1=B1Z2

    = 1110100101001110=10100111

    C2=B2Z3=11000010 01100010=10100000

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    10/15

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    11/15

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    12/15

    Time analysis of the encryption:

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    13/15

    Conclusion:In this Project, we have proposed a new approa

    security. We used the concept of genetic algorithms icryptography along with the randomness properties oThis way of transferring secret information is highly sreliable. So, without the knowledge of the pseudoransequence no one will be able to extract the message.

    Future Work:In the future work, we plan to design a sophisti

    software based on this technique which will be targetuse in highly secure multimedia data transmissionapplications.

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    14/15

    [1] J.Daemen and V.Rijmen. The Design of Rijndael, AES-AdvanceEncryption Standard}, ISBN 3-540-42580-2 (Springer-VeHeidelberg, New York).

    [2] Data Encryption Standard (DES),National Bureau Standards FIPPublication 46(1977).

    [3] R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaininsignatures and public key cryptosystems, Commun. Assoc.

    Comput.(1978) [4] Menzes A. J., Paul, C., Van Dorschot, V., Vanstone, S.A., Handb

    Applied Cryptography, CRS Press fifthPrinting 2001.

    [5] Douglas, R. Stinson, Cryptography- Theory and Practice, CRC 1995. [6] Wenbo Mao, Modern Cryptography: Theory and Practice, Publi

    Prentice Hall PTR, Copyright: HewlettPackard, 2004. [7] A Kumar, N Rajpal, Application of Genetic Algorithm in the F

    Steganography, in Journal of Information Technology, Vol. 2Dec.2004, pp-12-15.

  • 7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS

    15/15