Computer Science – Cryptography and Security
Scientific paper
2010-05-09
Computer Science
Cryptography and Security
This is unpublished work and has no references because the work has been purely based on my own research and I have used no ot
Scientific paper
The evolution of encryption algorithms have led to the development of very complicated and highly versatile algorithms that sacrifice efficiency for better and harder to decrypt results. But by the application of a genetic schema to the encryption of data, a new structure can be created. Genetic methods and procedures are lethal in the way they handle and manipulate data. The RAmM algorithm uses four genetic operations that have been developed specifically for encryption of data. The operations are Replication, Augmentation, Mutation and Multiplication. The proper application of these methods according to the rules that have been found to be the best for getting optimal and correct results produces a "fingerprint" that is unique to a pair of . This means that every single data entry can only be decrypted by using the correct set of key. The application of the RAmM algorithm is in the field of image encryption and restoration. The boundary and the pixel values are separately encrypted to produce a very genuine sequence that is never understood to be an image. The beauty of the procedure is that the entire image can be reproduced without any color loss or loss of pixel quality.
No associations
LandOfFree
RAmM Algorithm(Simplex) does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with RAmM Algorithm(Simplex), we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and RAmM Algorithm(Simplex) will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-626695