Loading

Public Key Cryptography using Genetic Algorithm
Swati Mishra1, Siddharth Bali2

1Swati Mishra, Department of Computer Engineering, Delhi Technological University, Delhi, India.
2Siddharth Bali, Department of Computer Engineering, Delhi Technological University, Delhi, India.

Manuscript received on 08 May 2013 | Revised Manuscript received on 15 May 2013 | Manuscript published on 30 May 2013 | PP: 150-154 | Volume-2 Issue-2, May 2013 | Retrieval Number: B0634052213/2013©BEIESP
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Cryptography is an imperative tool for protecting and securing data. Security provides safety and reliability. Genetic Algorithm (GA) is typically used to obtain solution for optimization and search problems. This paper presents application of GA in the field of cryptography. Key Selection in public key cryptography is a selection process in which keys can be categorized on the basis of their fitness, making GA a good candidate for key generation. Primary goals of our algorithm was to provide fast and improved performance results having practical and feasible implementation. GA correlates nature to a great extent and produce population of keys such that keys with higher fitness value is replicated often. Good Fitness function helps in exploring search space more efficiently and effectively while bad fitness function traps GA operating in local optimum solution and losing its discovery power. Pearson’s Coefficient of auto-correlation was used to calculate the fitness of keys. Ranking of keys was performed to find the best fit key. The private key generated cannot be derived from public key. The key samples satisfy gap and frequency test. Thus, purely random and non-repeating final keys were obtained by application of GA which increased the keys strength and security.
Keywords: About Four Key Words or Phrases In Alphabetical Order, Separated By Commas.

Scope of the Article: Cryptography and Applied Mathematics