DOI: 10.29007/zd9h
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Text Encryption and Decryption Scheme using the Genetic Algorithm and Residual Numbers

Abstract: Data Security is a major concern for both individuals and organisations that are engaged in one form of communication or the other, especially in the cyberspace as a result of the emergence of digital computing and communication. In this paper, we present a novel three-layered text encryption and decryption scheme that is capable of encrypting and decrypting any character or symbol using Genetic Algorithm (GA) and some inherent properties from the Residue Number System (RNS). Simulated results of the proposed … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Publication Types

Select...
5
1

Relationship

2
4

Authors

Journals

citations
Cited by 7 publications
(11 citation statements)
references
References 11 publications
(14 reference statements)
0
9
0
Order By: Relevance
“…The algorithm for this proposed scheme in shown in Algorithm 1. It employs the text encryption and decryption from [14] and that for the image from [29]. This is further elaborated using a flowchart in Fig.…”
Section: A Algorithm For the Proposed Schemementioning
confidence: 99%
See 1 more Smart Citation
“…The algorithm for this proposed scheme in shown in Algorithm 1. It employs the text encryption and decryption from [14] and that for the image from [29]. This is further elaborated using a flowchart in Fig.…”
Section: A Algorithm For the Proposed Schemementioning
confidence: 99%
“…It is worthy of note that, there exist some works that have employed either the GA or RNS with other methods in some instances, or only the GA or RNS in some other instances in cryptography [14]. Similarly, existing works on steganography includes the one in [15], which proposed a steganographic method for hiding information in 3D images using the RNS with three moduli sets, [16] also proposed an image steganographic scheme to hide image information within another image using RNS.…”
Section: Introductionmentioning
confidence: 99%
“…In this paper , we propose an efficient scheme that can detect and correct both single and multiple errors during computation and transmission of encoded data provided the redundant moduli are sufficient for cryptographic and steganographic schemes. The proposed scheme will also clearly show both the forward and reverse conversion processes as well as a step by step procedure to detecting and correcting possible errors in cryptographic and steganographic schemes such as the scheme by [24] with emphasis on recovering the exact original data.…”
Section: Literature Reviewmentioning
confidence: 99%
“…This includes the redundant moduli so that possible errors in the encoding process can be detected and corrected during decoding. For the chosen moduli set, any legitimate binary number X, which is (3n − 1)-bits wide, [24] can be partitioned into three sub-blocks for easy implementation as…”
Section: Forward Conversionmentioning
confidence: 99%
“…The best solution for keeping safe data transfer is the use of cryptography as a technique for encrypting and decrypting messages soany body can not interpret it, only the message sender and the receiver can. Consequently, data encryption has become an inevitable and integral part of any application in e-commerce [4][5][6]. Therefore, it is very important to encrypt data using a robust and fast encryption algorithm in order to make sure of secret transmission and data delivery to protect it from any intruder.…”
Section: Introductionmentioning
confidence: 99%