Hybrid Method for Encoding of Genetic and RC4 Algorithms
DOI:
https://doi.org/10.61841/xnqtyt77Keywords:
Coding, RC4, Genetic Algorithms,, Voice, Hash Algorithm.Abstract
In this paper, the proposed new method used is to generate the encryption key used in the RC4 algorithm by using the genetic algorithm by randomly generating it using the Rand function, and then subjecting it to the randomized conditions approved. If a match is used for coding, otherwise the genetic algorithm will be used to generate the random genetic key, which is along the length of the text to be encrypted.The proposed method used a new structure to hide the encrypted key within the transferred text, in addition to the integrity of the transferred key (integrity) was confirmed by using a simple flux function.
Downloads
References
1. R. V Ericson, Crime in an insecure world. Polity, 2007.
2. D. H. Flaherty, “Protecting privacy in police information systems: data protection in the Canadian Police Information Centre,” Univ. Tor. Law J., vol. 36, no. 2, pp. 116–148, 1986.
3. M. Deng, K. Wuyts, R. Scandariato, B. Preneel, and W. Joosen, “A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements,” Requir. Eng., vol. 16, no. 1, pp. 3–32, 2011.
4. E. McFadzean, J. Ezingeard, and D. Birchall, “Perception of risk and the strategic impact of existing IT on information security strategy at board level,” Online Inf. Rev., 2007.
5. S. Glass, T. Hiller, S. Jacobs, and C. Perkins, “Mobile IP authentication, authorization, and accounting requirements,” Work Prog., 2000.
6. R. M. Sharma and P. Choudhary, “Synthesis and Simulation of FPGA Based RC4 Encryption Method,” Synthesis (Stuttg)., vol. 5, no. 4, 2016.
7. A. A. Alhijaj and M. Kamil Hussein, “Stereo Images Encryption by OSA & RSA Algorithms,” J. Phys. Conf. Ser., vol. 1279, no. 1, 2019.
8. G. S. Basheer, “Application of Polyalphabetic Substitution Cipher using Genetic Algorithm,” AL- Rafidain J. Comput. Sci. Math., vol. 5, no. 1, pp. 57–68, 2008.
9. A. Gorodilov and V. Morozenko, “Genetic Algorithm for finding the Key’s length and Cryptanalysis of the Permutation Cipher,” 2008.
10. R. Toemeh and S. Arumugam, “Breaking transposition cipher with genetic algorithm,” Elektron. ir Elektrotechnika, vol. 79, no. 7, pp. 75–78, 2007.
11. A. Dimovski and D. Gligoroski, “Attacks on the transposition ciphers using optimization heuristics,” Proc. ICEST, pp. 1–4, 2003.
12. M. K. Hussein and A. A. Alhijaj, “TDL and ron rivest, adi shamir and leonard adleman in stereo images encrypt,” J. Adv. Res. Dyn. Control Syst., vol. 11, no. 1 Special Issue, pp. 1811–1817, 2019.
13. F. J. Kherad, H. R. Naji, M. V Malakooti, and P. Haghighat, “A new symmetric cryptography algorithm to secure e-commerce transactions,” in 2010 International Conference on Financial Theory and Engineering, 2010, pp. 234–237.
14. A. Maximov, Some words on cryptanalysis of stream ciphers. Citeseer, 2006.
15. D. Eastlake and T. Hansen, “US secure hash algorithms (SHA and HMAC-SHA).” RFC 4634, July, 2006.
16. R. Patel and N. Chaudhary, “Analyzing Digital Signature Robustness with Message Digest Algorithms,” Comput. Appl. Commun. Secur., 2012.
17. I. Mironov, “Hash functions: Theory, attacks, and applications,” Microsoft Res. Silicon Val. Campus.
Noviembre, 2005.
18. N. Ferguson et al., “The Skein hash function family,” Submiss. to NIST (round 3), vol. 7, no. 7.5, p. 3, 2010.
19. R. S. McIntyre et al., “Cognitive deficits and functional outcomes in major depressive disorder: determinants, substrates, and treatment interventions,” Depress. Anxiety, vol. 30, no. 6, pp. 515–527, 2013.
20. C. Neudecker, N. Mewes, A. K. Reimers, and A. Woll, “Exercise interventions in children and adolescents with ADHD: a systematic review,” J. Atten. Disord., vol. 23, no. 4, pp. 307–324, 2019.
Downloads
Published
Issue
Section
License

This work is licensed under a Creative Commons Attribution 4.0 International License.
You are free to:
- Share — copy and redistribute the material in any medium or format for any purpose, even commercially.
- Adapt — remix, transform, and build upon the material for any purpose, even commercially.
- The licensor cannot revoke these freedoms as long as you follow the license terms.
Under the following terms:
- Attribution — You must give appropriate credit , provide a link to the license, and indicate if changes were made . You may do so in any reasonable manner, but not in any way that suggests the licensor endorses you or your use.
- No additional restrictions — You may not apply legal terms or technological measures that legally restrict others from doing anything the license permits.
Notices:
You do not have to comply with the license for elements of the material in the public domain or where your use is permitted by an applicable exception or limitation .
No warranties are given. The license may not give you all of the permissions necessary for your intended use. For example, other rights such as publicity, privacy, or moral rights may limit how you use the material.