Features of genetic algorithm for plain text encryption

نویسندگان

چکیده

The data communication has been growing in present day. Therefore, the encryption became very essential secured transmission and storage protecting contents from intruder unauthorized persons. In this paper, a fast technique for text depending on genetic algorithm is presented. approach achieved by operators Crossover mutation. proposal based dividing plain characters into pairs, applying crossover operation between them, followed mutation to get encrypted text. experimental results show that provides an important improvement rate with comparatively high-speed Processing.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Text Encryption Algorithm

The encryption/decryption processes is applied to text. Both algorithms involved the use of the associative models, in particular we propose the Alpha-Beta associative memories. The original text is divide in sets of 9 elements, and together with a secret key they build an associative memory which represents the encrypted text. The advantage of our proposal is the cyphertext does not have the s...

متن کامل

Cyclic-Shift Chaotic Medical Image Encryption Algorithm Based on Plain Text Key-Stream

With the growing popularity of the Internet and the fast expanding to a variety of medical equipment, medical imaging technology has become increasingly sophisticated, especially the telemedicine is increasing rapidly. Therefore, in the process of transmission and storage of medical image, it is very important to encrypt it. However, compared with ordinary images, medical images contain patient...

متن کامل

the impact of skopos on syntactic features of the target text

the present study is an experimental case study which investigates the impacts, if any, of skopos on syntactic features of the target text. two test groups each consisting of 10 ma students translated a set of sentences selected from advertising texts in the operative and informative mode. the resulting target texts were then statistically analyzed in terms of the number of words, phrases, si...

15 صفحه اول

Plain Text Zero Knowledge Watermarking Detection Based on Asymmetric Encryption

Digital watermarking technology plays an important role in the areas of copyright protection and identity tracing for owners of digital mediums. At present, the security of the watermarking scheme is facing a great threat. However, the existing Zero knowledge-based watermark detection scheme (ZKWD) are still facing some challenging problems, such as ambiguity attacks. In this paper, a public ZK...

متن کامل

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Power Electronics and Drive Systems

سال: 2021

ISSN: ['2722-2578', '2722-256X']

DOI: https://doi.org/10.11591/ijece.v11i1.pp434-441