2019
DOI: 10.5815/ijisa.2019.11.01
|View full text |Cite
|
Sign up to set email alerts
|

Bat-Genetic Encryption Technique

Abstract: Nowadays, the security of confidential data is the vital issue in the digital world. Information security becomes even more essential in storing and transmitting data while online. For protecting digital data and achieving security and confidentiality over an insecure internet, the iterative Bat-Genetic Encryption Technique (B-GET) is proposed. The main stages of B-GET are preprocessing, encryption process, bat algorithm steps, and genetic processes. B-GET also comprises an arithmetic and logical operators tha… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(7 citation statements)
references
References 21 publications
0
7
0
Order By: Relevance
“…When dealing with finding optimal solutions and stochastic search [15], then genetic algorithm is the best bet. These algorithms relies on the combination of chromosome populations, selection, crossover, and mutation [16] to produce new offspring. [17] summarizes the steps followed by GA to arrive at optimal solutions as follows:…”
Section: Genetic Algorithmmentioning
confidence: 99%
“…When dealing with finding optimal solutions and stochastic search [15], then genetic algorithm is the best bet. These algorithms relies on the combination of chromosome populations, selection, crossover, and mutation [16] to produce new offspring. [17] summarizes the steps followed by GA to arrive at optimal solutions as follows:…”
Section: Genetic Algorithmmentioning
confidence: 99%
“…On the other hand, a technique that uses GA along with Random Number System (RNS) for encryption and decryption of data was implemented the same year [5]. Another technique that customizes GA along with some arithmetic and logical operators to secure the data has proved to be very effective [14].…”
Section: Genetic Algorithm (Ga) In Cryptographymentioning
confidence: 99%
“…The best solution for keeping safe data transfer is the use of cryptography as a technique for encrypting and decrypting messages soany body can not interpret it, only the message sender and the receiver can. Consequently, data encryption has become an inevitable and integral part of any application in e-commerce [4][5][6]. Therefore, it is very important to encrypt data using a robust and fast encryption algorithm in order to make sure of secret transmission and data delivery to protect it from any intruder.…”
Section: Introductionmentioning
confidence: 99%