Loading

Pseudorandom Numbered Hybrid Crypto-Algorithm with Two Bit Crossover and Boundary Mutation
B. Reddaiah

Reddaiah Buduri*, Yogi Vemana University, Kadapa, Andhra Pradesh, India.

Manuscript received on February 06, 2020. | Revised Manuscript received on February 10, 2020. | Manuscript published on February 30, 2020. | PP: 1243-1246 | Volume-9 Issue-3, February, 2020. | Retrieval Number: C5365029320/2020©BEIESP | DOI: 10.35940/ijeat.C5365.029320
Open Access | Ethics and Policies | Cite | Mendeley
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: n spite of all the advantages while using networks in any form, there are large numbers of possible security issues that are rising with networking. To sort the security issues network security is the action that is intended to safe guard the resources and integrity of network and data. At work stations there are filters, firewall to protect. But while data in transmission security services are needed and frequent change in methods are to be developed to counter threats. In this work different methods like pseudorandom generation and multiple genetic algorithms are used that resembles quite different in nature. This proposed hybrid algorithm can be used in small business applications where they are frequently hacked. Small organizations that cannot afford to build a strong security system can use such hybrid systems.
Keywords: Security attacks, Pseudorandom numbers, Encryption, Decryption, Crossover Function, Mutation.