A New Substitution Block Cipher Using Genetic Algorithm
In cryptography, a substitution block cipher is a method of encryption by which units of plain text are replaced with cipher text according to a regular system. The receiver deciphers the text by performing an inverse substitution. If the cipher operates on single blocks, it is termed as simple substitution block cipher. We proposed an algorithm which considers a random matrix key which on execution of a sequence of steps generates a sequence. Based on the equality of values, this sequence is being divided into basins. Each basin represents one block of data on which the genetic algorithm operations like crossover and mutation are performed. Each block of plain text is replaced by summation of ASCII value of plain text and the sequence is generated to form the cipher text. Thus, the cipher text obtained is very difficult to be broken without knowing the key, which provides high security.
KeywordsGenetic Algorithm (GA) random matrix key basins sequence generation
Unable to display preview. Download preview PDF.
- 1.Gorodilov, A., Morozenko, V.: Genetic Algorithms for finding the key’s length and crypto analysis of the permutation cipher. International Journal Information Theories and Applications 15 (2008)Google Scholar
- 2.Delman, B.: Genetic Algorithms in Cryptography, published in web (July 2004)Google Scholar
- 3.Whitley, D.: A Genetic Algorithm Tutorial, Computer Science Department, Colorado State University, Fort Collins, CO 80523Google Scholar
- 5.Stallings, W.: Cryptography and Network Security: Principles and Practices, 3rd edn. Pearson Education (2004)Google Scholar
- 6.Bose, R.: Introduction to Cryptography – – Tata Mc-Grew–hill Publisher ltd. (2001) Google Scholar
- 7.Koblitz, N.: A course in number theory and Cryptography. Springer-Verlag, New York, Inc. (1994)Google Scholar
- 8.Nalani, N., Raghavendra Rao, G.: Cryptanalysis of Simplified Data Encryption Standard via Optimisation Heuristics. IJCSNS 6(1B) (January 2006)Google Scholar
- 11.Kumar, A., Kumar, A.: Development of New Cryptographic Construct using Palmprint Based Fuzzy voult. EURASIP Journal on Adv. in Signal Processing 21, 234–238 (2009)Google Scholar
- 12.Wang, B., Wu, Q., Hu, Y.: A Knapsack Based Probabilistic Encryption Scheme (March 2007), www.citeseer.ist.psu.edu
- 13.Bluekrypt 2009: Cryptographic Key length Recommendations Google Scholar