Abstract

As technology is growing faster and exchanging of data is mostly carried through internet different mechanisms are being developed to counter unwanted access to the data. By introducing the web and pay out programs, it becomes very difficult to protect the data even with more mechanisms. It is becoming a big concern and worry in securing individuals data. These types of problems can be solved with cryptography and data can be secured in the network. In developing security systems Genetic algorithms are playing important role. In this proposed work crossover function from Genetic algorithms along with bitwise logical operations are used together to build a hybrid cryptosystem.

Highlights

  • In present days using of web services becomes essential for individuals and groups

  • The safety transmission is made possible by developing a mechanism that protects data and the process is known as encryption

  • Method of changing from original text to scrambled form is referred as encryption or enciphering and getting back original text from scrambled form is called decryption or deciphering [1]

Read more

Summary

INTRODUCTION

In present days using of web services becomes essential for individuals and groups. With internet services from the past years, communication is made possible and easy to communicate to all parts of the world. E-business is one area that picked with significant advantage that is provided by the internet In this scenario securing confidential data becomes very important. Cryptography is the science that plays a vital role and one of the best methodologies. This science is having a huge and pretty good history in securing data [7]. It is more significant modem systems too [5] This science provides absolute and reliable security by considering scientific functions that strengthen the security services along with mathematical operations. The safety transmission is made possible by developing a mechanism that protects data and the process is known as encryption. When this process is used on any kind of data, it is impossible to bring the originality of data by not involving decryption process [6]

CRYPTOGRAPHY AS BACKGROUND
PROPOSED SCHEME
Encryption Algorithm
Uniform crossover Function
Decryption Algorithm
Decryption
ADVANTAGES OF PROPOSED ALGORITHM
CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call