Genetic Key Generation For Public Key Cryptography

Provided by: International Journal of Soft Computing and Engineering (IJSCE)
Topic: Data Management
Format: PDF
The importance of cryptography can be judged by the fact that it is used almost everywhere. It is essential in e transactions, LAN data transfer, in Databases and even while storing data in the people's own computer. There are many methods of cryptography. Some of that have large complexity and are pretty cumbersome, while other are based on the theory of natural selection. The fact that selecting key for the public key cryptography is a selection process in which various keys can be categorized on the basis of their fitness, makes Genetic Algorithms a good contender for the process to be followed for generating key.

Find By Topic