@incollection{, CBB396208477806C705CAA6FC9255322 , author={{Dr. LavkushSharma} and {Dr. LavkushSharma} and {ram gopalsharma} and {FET RBS COLLEGE ,AGRA}}, journal={{Global Journal of Computer Science and Technology}}, journal={{GJCST}}0975-41720975-435010.34257/gjcst, address={Cambridge, United States}, publisher={Global Journals Organisation}1255559 } @incollection{b0, , title={{Genetic algorithm Attack on Simplified Data Encryption Standard Algorithm}} , author={{ GargPoonam }} , journal={{International journal Research in Computing Science}} , year={2006} } @incollection{b1, , title={{Cryptanalysis of S-DES via Optimization heuristics}} , author={{ Nalini }} , journal={{International Journal of Computer Sciences and network security}} 6 1B , year={Jan 2006} } @incollection{b2, , title={{Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms}} , author={{ RSpillman }} , journal={{Cryptologia XVII}} 4 , year={1993} } @incollection{b3, , title={{Use of A Genetic Algorithm in the Cryptanalysis of simple substitution Ciphers}} , author={{ RSpillman } and { MJanssen } and { BNelson } and { MKepner }} , journal={{Cryptologia XVII}} 1 , year={1993} } @incollection{b4, , title={{Optimisation Heuristics for the Automated Cryptanalysis of Classical Ciphers}} , author={{ ClarkA } and { DawsonEd }} , journal={{Journal of Combinatorial Mathematics and Combinatorial Computing}} 28 , year={1998} } @incollection{b5, , title={{Linear cryptanalysis method for DES cipher}} , author={{ MMatsui }} , journal={{Lect. Notes Comput. Sci}} 765 , year={1994} } @book{b6, , title={{Cryptography and Network Security Principles and Practices, Third Edition}} , author={{ WilliamStallings }} , year={2003} , publisher={Pearson Education Inc} } @incollection{b7, , title={{Cryptanalysis of SDES Using Genetic Algorithm}} , author={{ MR LVimalathithan } and { Valarmathi }} , journal={{International Journal of Recent Trends in Engineering}} 2 4 , year={November 2009} } @incollection{b8, , title={{A Simplified Data Encryption Standard Algorithm}} , author={{ ESchaefer }} , journal={{Cryptologia}} 20 1 , year={1996} } @book{b9, , title={{A Novel Crossover Operator for Genetic Algorithms: Ring Crossover}} , author={{ Y?lmazKaya } and { MuratUyar } and { RamazanTekdn }} } @book{b10, , title={{Handbook of Genetic Algorithm}} , author={{ LDavis }} , year={1991} , publisher={Van Nostrand Reinhold} , address={New York} } @book{b11, , title={{Genetic algorithms in search. Optimization and Machine Learning}} , author={{ DEGoldberg }} , editor={Reading. M.A. addison -Wesley} , year={1989} } @incollection{b12, , title={{Evolutionary optimization of constrained problems}} , author={{ A } and { Michalewiez } and { NAttia }} , booktitle={{InProc.3rd annu. Conf. on Evolutionary Programming}} , year={1994} } @book{b13, , title={{Genetic algorithms+ Data structures = Evolution programs}} , author={{ ZMichalewicz }} , year={1996} , publisher={springer} , address={New York} , note={3rd ed} } @book{b14, , title={{A Course on number theory and cryptography}} , author={{ NKoblitz }} , year={1994} , publisher={Springer-Verlag New York,Inc} } @incollection{b15, , title={{}} , author={{ JAlfred } and { Menezes } and { Menezes }} , journal={{Alfred J. Handbook of Applied Cryptography}} , year={1997} , publisher={CRC} } @book{b16, , title={{Breaking Transposition Cipher with Genetic Algorithhm Electronics and Electrical Engineering}} , author={{ RToemeh } and { SArumugam }} , year={2007} } @book{b17, , title={{Multi-objective Optimization using Evolutionary Algorithms}} , author={{ KalyanmoyDeb }} , year={2001} , publisher={John Wiley and Sons} } @incollection{b18, , title={{Studying chaos via 1-Dmaps-atutorial}} , author={{ CWWu } and { NFRulkov }} , journal={{IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications}} 40 10 , year={1993} }