Journal article Open Access

Cryptosystem using Crossover Function and Logical Operators

B. Reddaiah


JSON Export

{
  "files": [
    {
      "links": {
        "self": "https://zenodo.org/api/files/330ac49e-1a43-4ebc-be50-3fe95dbd27b0/B3296129219.pdf"
      }, 
      "checksum": "md5:ccb5804d83eb83b78f2e9d009710c445", 
      "bucket": "330ac49e-1a43-4ebc-be50-3fe95dbd27b0", 
      "key": "B3296129219.pdf", 
      "type": "pdf", 
      "size": 724987
    }
  ], 
  "owners": [
    251627
  ], 
  "doi": "10.35940/ijeat.B3296.129219", 
  "stats": {
    "version_unique_downloads": 19.0, 
    "unique_views": 17.0, 
    "views": 17.0, 
    "version_views": 17.0, 
    "unique_downloads": 19.0, 
    "version_unique_views": 17.0, 
    "volume": 13774753.0, 
    "version_downloads": 19.0, 
    "downloads": 19.0, 
    "version_volume": 13774753.0
  }, 
  "links": {
    "doi": "https://doi.org/10.35940/ijeat.B3296.129219", 
    "latest_html": "https://zenodo.org/record/5596365", 
    "bucket": "https://zenodo.org/api/files/330ac49e-1a43-4ebc-be50-3fe95dbd27b0", 
    "badge": "https://zenodo.org/badge/doi/10.35940/ijeat.B3296.129219.svg", 
    "html": "https://zenodo.org/record/5596365", 
    "latest": "https://zenodo.org/api/records/5596365"
  }, 
  "created": "2021-10-25T11:49:47.433770+00:00", 
  "updated": "2021-10-26T13:48:43.781030+00:00", 
  "conceptrecid": "5596364", 
  "revision": 2, 
  "id": 5596365, 
  "metadata": {
    "access_right_category": "success", 
    "doi": "10.35940/ijeat.B3296.129219", 
    "description": "<p>As technology is growing faster and exchanging of data is mostly carried through internet different mechanisms are being developed to counter unwanted access to the data. By introducing the web and pay out programs, it becomes very difficult to protect the data even with more mechanisms. It is becoming a big concern and worry in securing individuals data. These types of problems can be solved with cryptography and data can be secured in the network. In developing security systems Genetic algorithms are playing important role. In this proposed work crossover function from Genetic algorithms along with bitwise logical operations are used together to build a hybrid cryptosystem.</p>", 
    "contributors": [
      {
        "affiliation": "Publisher", 
        "type": "Sponsor", 
        "name": "Blue Eyes Intelligence Engineering  & Sciences Publication (BEIESP)"
      }
    ], 
    "title": "Cryptosystem using Crossover Function and  Logical Operators", 
    "license": {
      "id": "CC-BY-4.0"
    }, 
    "journal": {
      "volume": "9", 
      "issue": "2", 
      "pages": "55-59", 
      "title": "International Journal of Engineering and Advanced Technology (IJEAT)"
    }, 
    "relations": {
      "version": [
        {
          "count": 1, 
          "index": 0, 
          "parent": {
            "pid_type": "recid", 
            "pid_value": "5596364"
          }, 
          "is_last": true, 
          "last_child": {
            "pid_type": "recid", 
            "pid_value": "5596365"
          }
        }
      ]
    }, 
    "language": "eng", 
    "subjects": [
      {
        "term": "ISSN", 
        "scheme": "issn", 
        "identifier": "2249-8958"
      }, 
      {
        "term": "Retrieval Number", 
        "scheme": "handle", 
        "identifier": "B3296129219/2019\u00a9BEIESP"
      }
    ], 
    "keywords": [
      "Security mechanisms, Security attack, Encryption, Decryption, Genetic algorithms, Crossover Function"
    ], 
    "publication_date": "2019-12-30", 
    "creators": [
      {
        "affiliation": "Yogi Vemana University, Kadapa, Andhra Pradesh, India.", 
        "name": "B. Reddaiah"
      }
    ], 
    "access_right": "open", 
    "resource_type": {
      "subtype": "article", 
      "type": "publication", 
      "title": "Journal article"
    }, 
    "related_identifiers": [
      {
        "scheme": "issn", 
        "identifier": "2249-8958", 
        "relation": "isCitedBy", 
        "resource_type": "publication-article"
      }
    ]
  }
}
17
19
views
downloads
Views 17
Downloads 19
Data volume 13.8 MB
Unique views 17
Unique downloads 19

Share

Cite as