Journal article Open Access

Cryptosystem using Crossover Function and Logical Operators

B. Reddaiah


DataCite XML Export

<?xml version='1.0' encoding='utf-8'?>
<resource xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://datacite.org/schema/kernel-4" xsi:schemaLocation="http://datacite.org/schema/kernel-4 http://schema.datacite.org/meta/kernel-4.1/metadata.xsd">
  <identifier identifierType="URL">https://zenodo.org/record/5596365</identifier>
  <creators>
    <creator>
      <creatorName>B. Reddaiah</creatorName>
      <affiliation>Yogi Vemana University, Kadapa, Andhra Pradesh, India.</affiliation>
    </creator>
  </creators>
  <titles>
    <title>Cryptosystem using Crossover Function and  Logical Operators</title>
  </titles>
  <publisher>Zenodo</publisher>
  <publicationYear>2019</publicationYear>
  <subjects>
    <subject>Security mechanisms, Security attack, Encryption, Decryption, Genetic algorithms, Crossover Function</subject>
    <subject subjectScheme="issn">2249-8958</subject>
    <subject subjectScheme="handle">B3296129219/2019©BEIESP</subject>
  </subjects>
  <contributors>
    <contributor contributorType="Sponsor">
      <contributorName>Blue Eyes Intelligence Engineering  &amp; Sciences Publication (BEIESP)</contributorName>
      <affiliation>Publisher</affiliation>
    </contributor>
  </contributors>
  <dates>
    <date dateType="Issued">2019-12-30</date>
  </dates>
  <language>en</language>
  <resourceType resourceTypeGeneral="JournalArticle"/>
  <alternateIdentifiers>
    <alternateIdentifier alternateIdentifierType="url">https://zenodo.org/record/5596365</alternateIdentifier>
  </alternateIdentifiers>
  <relatedIdentifiers>
    <relatedIdentifier relatedIdentifierType="ISSN" relationType="IsCitedBy" resourceTypeGeneral="JournalArticle">2249-8958</relatedIdentifier>
    <relatedIdentifier relatedIdentifierType="DOI" relationType="IsIdenticalTo">10.35940/ijeat.B3296.129219</relatedIdentifier>
  </relatedIdentifiers>
  <rightsList>
    <rights rightsURI="https://creativecommons.org/licenses/by/4.0/legalcode">Creative Commons Attribution 4.0 International</rights>
    <rights rightsURI="info:eu-repo/semantics/openAccess">Open Access</rights>
  </rightsList>
  <descriptions>
    <description descriptionType="Abstract">&lt;p&gt;As technology is growing faster and exchanging of data is mostly carried through internet different mechanisms are being developed to counter unwanted access to the data. By introducing the web and pay out programs, it becomes very difficult to protect the data even with more mechanisms. It is becoming a big concern and worry in securing individuals data. These types of problems can be solved with cryptography and data can be secured in the network. In developing security systems Genetic algorithms are playing important role. In this proposed work crossover function from Genetic algorithms along with bitwise logical operations are used together to build a hybrid cryptosystem.&lt;/p&gt;</description>
  </descriptions>
</resource>
17
19
views
downloads
Views 17
Downloads 19
Data volume 13.8 MB
Unique views 17
Unique downloads 19

Share

Cite as