scholarly journals Features of genetic algorithm for plain text encryption

Author(s):  
Riyadh Bassil Abduljabbar ◽  
Oday Kamil Hamid ◽  
Nazar Jabbar Alhyani

The data communication has been growing in present day. Therefore, the data encryption became very essential in secured data transmission and storage and protecting data contents from intruder and unauthorized persons. In this paper, a fast technique for text encryption depending on genetic algorithm is presented. The encryption approach is achieved by the genetic operators Crossover and mutation. The encryption proposal technique based on dividing the plain text characters into pairs, and applying the crossover operation between them, followed by the mutation operation to get the encrypted text. The experimental results show that the proposal provides an important improvement in encryption rate with comparatively high-speed Processing.

2013 ◽  
Vol 6 (2) ◽  
pp. 311-316 ◽  
Author(s):  
Mittapalli Indrasena Reddy ◽  
V. Uday Kumar ◽  
K. Subba Reddy ◽  
P. Venkat Vijay Kumar

Steganography and cryptographic methods are used together with wavelets to increase the security of the data while transmitting through networks. Another technology, the digital watermarking is the process of embedding information into a digital (image) signal. Before embedding the plain text into the image, the plain text is encrypted by using Data Encryption Standard (DES) algorithm. The encrypted text is embedded into the LL subband of the wavelet decomposed image using Least Significant Bit (LSB) method. Then the inverse wavelet transform is applied and the resultant image is transmitted to the receiver. The receiver will perform the same operations in reverse order.


2012 ◽  
Vol 479-481 ◽  
pp. 65-70
Author(s):  
Xiao Hui Zhang ◽  
Liu Qing ◽  
Mu Li

Based on the target detection of alignment template, the paper designs a lane alignment template by using correlation matching method, and combines with genetic algorithm for template stochastic matching and optimization to realize the lane detection. In order to solve the real-time problem of lane detection algorithm based on genetic algorithm, this paper uses the high performance multi-core DSP chip TMS320C6474 as the core, combines with high-speed data transmission technology of Rapid10, realizes the hardware parallel processing of the lane detection algorithm. By Rapid10 bus, the data transmission speed between the DSP and the DSP can reach 3.125Gbps, it basically realizes transmission without delay, and thereby solves the high speed transmission of the large data quantity between processor. The experimental results show that, no matter the calculated lane line, or the running time is better than the single DSP and PC at the parallel C6474 platform. In addition, the road detection is accurate and reliable, and it has good robustness.


2021 ◽  
Vol 2113 (1) ◽  
pp. 012065
Author(s):  
Yu Gu ◽  
Mengqi Fan ◽  
Chuanqian Tang ◽  
Guojing Zhang ◽  
Xiaodan Zhang

Abstract Since the study in the field of fusion has gradually developed toward the long-pulse experiment mode, long-pulse data has gradually become one of the main data types for pulsed experiments in the field of fusion. For long-pulse data, which is a kind of pulse-type data, it will be more difficult to transmit and store than short-pulse data because of its significant characteristics. In addition, in the design of data acquisition and control system (DACS) in fusion field, Experimental Physics and Industrial Control System (EPICS) has now gradually become the main framework of experimental control system to meet the diversity of devices and complexity of subsystems in large experimental system. However, due to the limitation of EPICS, its effectiveness in handling data transmission and storage under high speed data acquisition is not satisfactory. To solve the data transmission and storage under high-speed sampling, this paper proposes a data transmission and storage solution based on TCP/IP protocol and MDSplus database, which is designed with the concept of segmentation, i.e., data generated from experiments longer than 100 seconds are uploaded and stored in a segmented form. Currently, this system has been tested and applied, and the test result shows that the solution is feasible and the overall test system operates stably and reliably.


10.28945/3032 ◽  
2006 ◽  
Author(s):  
Ayodeji Oluwatope ◽  
Bamidele Ojo ◽  
G. Adesola Aderounmu ◽  
Matthew Adigun

Since the advent of data communication over networks, it has become imperative to ensure security of information. Cryptography is a technique that is being employed. This paper takes a look at an important aspect of the public key encryption scheme, the modular exponentiation technique, with the view of optimizing it. Taking a look at some public key encryption schemes, it would be observed that the modular exponentiation process is primal to achieving high speed algorithms in data encryption. With special emphasis on the Montgomery exponentiation algorithm, a blend of this algorithm with the sliding window method of exponentiation is proposed. A detailed complexity analysis of the proposed and selected algorithms was carried out. Both algorithms were implemented and simulated using MATLAB 6.5. While the proposed algorithm did not prove to be faster than the classical Montgomery exponentiation algorithm, it was rather observed that it makes lesser number of calls to the Montgomery reduction sub-function. This means 10% lesser number of loops during execution and thus better optimized for lower memory applications.


Author(s):  
El-Sayed M. El-Alfy

Protecting confidentiality of sensitive data is growing in importance in many personal, commercial, governmental, medical and military applications. Data encryption remains the most prevalent mechanism for this goal in cybersecurity to store and communicate data in unintelligible form. However, images are known to have intrinsic characteristics different from text, which limit the applicability of conventional cryptographic algorithms. This chapter provides a review of the work related to image cryptosystems based on chaos theory and biologically-inspired algorithms. Then, a case study is presented using ideas from genetic crossover and mutation to confuse and diffuse images to generate secure cipher images with very low correlation between pixels.


2011 ◽  
Vol 341-342 ◽  
pp. 682-684
Author(s):  
Hui Xin Zhang ◽  
Ying Ping Hong ◽  
Kai Li Li

Aiming at the LVDS high speed data communication used on long distance, this paper designed the method of data reading and status monitoring of the recorder during the experiment. The transferring cables are twisted-pair, its transferring distance is 100m and the data transmission speed is 12Mbytes/s. With the method introduced in this paper, great deal of time is saved during the data retrieving process. It also increases the efficiency of the experiment, even better, the transmission medium is cheaper, more simply, and easier to be achieved than the optical fiber and coaxial cables.


Author(s):  
Amit Dengre ◽  
A.D. Gawande

The growth of high speed computer networks and that of the Internet, in particular, has increased the ease of Information Communication. Ironically, the cause for the development is also of the apprehension - use of digital formatted data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. But this type advancement in the field of data communication in other sense has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. So, Information Security is becoming an inseparable part of Data Communication. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. In the current internet community, secure data transfer is limited due to its attack made on data communication. So more robust methods are chosen so that they ensure secured data transfer. One of the solutions which came to the rescue is the audio Steganography. But existing audio steganographic systems have poor interface, very low level implementation, difficult to understand and valid only for certain audio formats with restricted message size. Enhanced Audio Steganography (EAS) is one proposed system which is based on audio Steganography and cryptography & watermarking, ensures secure data transfer between the source and destination.


2011 ◽  
Vol 2011 ◽  
pp. 1-7 ◽  
Author(s):  
Maria Angelova ◽  
Tania Pencheva

Fermentation processes by nature are complex, time-varying, and highly nonlinear. As dynamic systems their modeling and further high-quality control are a serious challenge. The conventional optimization methods cannot overcome the fermentation processes peculiarities and do not lead to a satisfying solution. As an alternative, genetic algorithms as a stochastic global optimization method can be applied. For the purpose of parameter identification of a fed-batch cultivation ofS. cerevisiaealtogether four kinds of simple and four kinds of multipopulation genetic algorithms have been considered. Each of them is characterized with a different sequence of implementation of main genetic operators, namely, selection, crossover, and mutation. The influence of the most important genetic algorithm parameters—generation gap, crossover, and mutation rates has—been investigated too. Among the considered genetic algorithm parameters, generation gap influences most significantly the algorithm convergence time, saving up to 40% of time without affecting the model accuracy.


Sign in / Sign up

Export Citation Format

Share Document