Published February 29, 2020 | Version v1
Journal article Open

Pseudorandom Numbered Hybrid Crypto-Algorithm with Two Bit Crossover and Boundary Mutation

Authors/Creators

  • 1. Yogi Vemana University, Kadapa, Andhra Pradesh, India.
  • 1. Publisher

Description

In spite of all the advantages while using networks in any form, there are large numbers of possible security issues that are rising with networking. To sort the security issues network security is the action that is intended to safe guard the resources and integrity of network and data. At work stations there are filters, firewall to protect. But while data in transmission security services are needed and frequent change in methods are to be developed to counter threats. In this work different methods like pseudorandom generation and multiple genetic algorithms are used that resembles quite different in nature. This proposed hybrid algorithm can be used in small business applications where they are frequently hacked. Small organizations that cannot afford to build a strong security system can use such hybrid systems.

Files

C5365029320.pdf

Files (426.9 kB)

Name Size Download all
md5:21e8005012729b3b2d163676896c157e
426.9 kB Preview Download

Additional details

Related works

Is cited by
Journal article: 2249-8958 (ISSN)

Subjects

ISSN
2249-8958
Retrieval Number
C5365029320 /2020©BEIESP