Cryptographic Technique Using Substitution Through Circular Path Followed by Genetic Function

Provided by: International Journal of Computer Applications
Topic: Security
Format: PDF
The demand for effective Internet Security is increasing exponentially day by day. So for high protection, maintaining integrity of the data a robust and secure security system is needed. Cryptography is the science of making communications unintelligible to everyone except the intended receiver(s). In this paper, a new algorithm for encryption and decryption is introduced. The process of substitution and genetic function is the core of the proposed algorithm. In this encryption technique, two keys are required for the encryption or decryption of a message. Input stream will be produced intermediate cipher text on which two stages of crossover will be used in the process of encryption and decryption to produce final cipher text.

Find By Topic