z-logo
open-access-imgOpen Access
Pseudorandom Numbered Hybrid Crypto Algorithm with Two Bit Crossover and Boundary Mutation
Author(s) -
B. Reddaiah
Publication year - 2020
Publication title -
international journal of engineering and advanced technology
Language(s) - English
Resource type - Journals
ISSN - 2249-8958
DOI - 10.35940/ijeat.c5365.029320
Subject(s) - firewall (physics) , computer science , guard (computer science) , crossover , pseudorandom number generator , computer security , network security , sort , distributed computing , theoretical computer science , computer network , algorithm , entropy (arrow of time) , physics , extremal black hole , quantum mechanics , artificial intelligence , information retrieval , programming language , charged black hole
In spite of all the advantages while using networks in any form, there are large numbers of possible security issues that are rising with networking. To sort the security issues network security is the action that is intended to safe guard the resources and integrity of network and data. At work stations there are filters, firewall to protect. But while data in transmission security services are needed and frequent change in methods are to be developed to counter threats. In this work different methods like pseudorandom generation and multiple genetic algorithms are used that resembles quite different in nature. This proposed hybrid algorithm can be used in small business applications where they are frequently hacked. Small organizations that cannot afford to build a strong security system can use such hybrid systems.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here