a new approach for data encryption using genetic algorithms
TRANSCRIPT
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
1/15
A NEW APPROACH FOR DATA ENCRYPTI
USING GENETIC ALGORITHMS
Under the guidance of:Mr. Radhakrishna Dodman
Assistant Professor
Department of CSEN.M.A.M. Institute of Tech
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
2/15
1. INTRODUCTION 2. OVERVIEW OF CRYPTOGRAPHY 3. LITERATURE SURVEY 4. DESIGN 5. IMPLEMENTATION 6. EXPERIMENTAL RESULTS 7. CONCLUSION AND FUTURE WORK REFRENCES
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
3/15
In todays information age, information sharing and
has increased exponentially. Security is the most imfactor in information system.
The purpose of the project is to communication uninto everyone except the intended receiver(s).
Protect sensitive information in a large number of ap
including personal data security, internet security, and military communications security, etc. thrprocesses of encryption/decryption.
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
4/15
There are two types of cryptographic schemes:
symmetric cryptography and asymmetric cryptograp
Goal of CryptographyConfidentiality , Data integrity, Authentication , Non
repudiation
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
5/15
A. Tragha et al.[9, 10], in 2005 & 2006 descri
symmetrical block ciphering system named ICIGA Cryptography Inspired by Genetic Algorithmgenerates a session key in a random process.
M. Husainy [11] in 2006 proposes Image Encryption
Genetic Algorithm based Image Encryption using muand crossover concept.
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
6/15
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
7/15
LFSRs (linear feedback shift registers) provide a simpfor generating non sequential lists of numbers quick
microcontrollers. Generating the pseudo-random nuonly requires a left-shift operation and an XOR oper
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
8/15
Choose a random point on the two parents
Split parents at this crossover point
Create children by exchanging tails1-point Parent 1: 1 0 1 0 |0 0 1 1crossover Parent 2: 0 0 1 1 |0 1 0 0
Offspring 1: 1 0 1 0 | 0 1 0 0Offspring 2: 0 0 1 1 | 0 0 1 1
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
9/15
THE ENCRYPTION PROCESSWe consider two consecutive bytes of the data stream A1 and A2 asA1 = 11100010A2 = 11001001
Consider decimal value sequence of LFSR asZn=276, 78, 98, 26..
After taking mod 8 of Z1 it becomesZ1=4
After crossover A1 and A2 with Z1=4B1 = 11101001B2 = 11000010
After XOR B1 with Z2 (78) and B2 with Z3 (98) we get cipher text asC1=B1Z2
= 1110100101001110=10100111
C2=B2Z3=11000010 01100010=10100000
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
10/15
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
11/15
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
12/15
Time analysis of the encryption:
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
13/15
Conclusion:In this Project, we have proposed a new approa
security. We used the concept of genetic algorithms icryptography along with the randomness properties oThis way of transferring secret information is highly sreliable. So, without the knowledge of the pseudoransequence no one will be able to extract the message.
Future Work:In the future work, we plan to design a sophisti
software based on this technique which will be targetuse in highly secure multimedia data transmissionapplications.
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
14/15
[1] J.Daemen and V.Rijmen. The Design of Rijndael, AES-AdvanceEncryption Standard}, ISBN 3-540-42580-2 (Springer-VeHeidelberg, New York).
[2] Data Encryption Standard (DES),National Bureau Standards FIPPublication 46(1977).
[3] R. L. Rivest, A. Shamir, and L. Adleman, A method for obtaininsignatures and public key cryptosystems, Commun. Assoc.
Comput.(1978) [4] Menzes A. J., Paul, C., Van Dorschot, V., Vanstone, S.A., Handb
Applied Cryptography, CRS Press fifthPrinting 2001.
[5] Douglas, R. Stinson, Cryptography- Theory and Practice, CRC 1995. [6] Wenbo Mao, Modern Cryptography: Theory and Practice, Publi
Prentice Hall PTR, Copyright: HewlettPackard, 2004. [7] A Kumar, N Rajpal, Application of Genetic Algorithm in the F
Steganography, in Journal of Information Technology, Vol. 2Dec.2004, pp-12-15.
-
7/27/2019 A NEW APPROACH FOR DATA ENCRYPTION USING GENETIC ALGORITHMS
15/15