Sri Vasavi College, Erode Self-Finance Wing 3rd February 2017 National Conference on Computer and Communication NCCC’17

Format: Volume 5, Issue 1, No 9, 2017

Copyright: All Rights Reserved ©2017

Year of Publication: 2017



View PDF Format


In today‟s computer world security, integrity, confidentiality of the organization‟s data is the most significant problem. Cryptography is an important technique for securing information. Many problems can be solved using genetic algorithms through modeling a simplified version of genetic processes. The Genetic Algorithms (GAs) are exploration algorithms based on the theory of natural selection with an inventive finesse of nature. The central idea of research on GAs has been robustness. The technique has been implemented and analyzed. Cryptography proposed efficient solution to save from harm sensitive information in a large number of applications including personal data security, internet security, diplomatic and military communications security, etc. through the processes of encryption/decryption.


[1] Amritha Thekkumbadan Veetil, “An Encryption Technique using Genetic Operators”. International Journal of Scientific and Technology Research, Volume 4, Issue 07, July 2015. [2] Ankita Agarwal, “Secret Key Encryption Algorithm using Genetic Algorithm”. International Journal of Advanced Research in Computer Science and Software Engineering, Vol: 2, Issue 4, April 2012. [3] Farhat Ullah Khan, Surbhi Bhatia, “A Novel Approach to Genetic Algorithm based Cryptography”. International Journal of Research in Computer Science, 2 (3): pp. 7-10, April 2012. doi:10.7815/ijorcs.23.2012.022. [4] Martin Javurek and Marcel Harakal, “Cryptography and Genetic Algorithms”, Science and Military 1/2016. [5] Pushba B R, “Data Encryption Technique using Genetic Algorithm and Random number generator”. International Journal of Innovative Research in Engineering and Science, Volume 4, Issue 4, April 2015. [6] Rajat Jhingran, Vikas Thada, Shivali Dhaka, “A Study on Cryptography using Genetic Algorithm”. International Journal of Computer Applications, Volume 118 – No. 20, May 2015. [7] Sindhuja K and Pramela Devi S, “A Symmetric Key encryption technique using Genetic Algorithm”. (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (1), 2014, 414-416.


Genetic Algorithm, Mutation, Encryption, Decryption, Cryptography.

This work is licensed under a Creative Commons Attribution 3.0 Unported License.   

Facebook IconYouTube IconTwitter IconVisit Our Blog