Pattern Recognition Letters 133 (2020) 341–348 Contents lists available at ScienceDirect Pattern Recognition Letters journal homepage: www.elsevier.com/locate/patrec Genetic algorithm based key sequence generation for cipher system K.B. Sudeepa a, , Ganesh Aithal b , V. Rajinikanth c , Suresh Chandra Satapathy d a Department of Computer Science and Engineering, NMAM Institute of Technology, Nitte, Karnataka, India b Shri Madhwa Vadiraja Institute of Technology and Management, Bantakal, Karnataka, India c Department of Electronics and Instrumentation Engineering, St. Joseph’s College of Engineering, Chennai 600 119 Tamilnadu, India d School of Computer Engineering, Kalinga Institute of Industrial Technology (Deemed to Be University), Bhubaneswar, 751024, Odisha, India a r t i c l e i n f o Article history: Received 23 September 2019 Revised 28 February 2020 Accepted 9 March 2020 Available online 12 March 2020 Keywords: Feedback shift register Genetic algorithm Stream cipher system Pseudo random number generator Cross over Mutation a b s t r a c t Stream cipher system seems to be one of the best alternatives in order to provide confidentiality and security in an on line and high-speed transmission. Cryptography is required to secure the secret infor- mation transmitting over the communication channel. Day by day the importance of security increases due to increase of online transaction processing and e-commerce. As well as encryption / decryption algorithm, randomness characteristics of key sequences prove the strength of the stream cipher. In this work the Linear Feedback Shift Register (LFSR) is used to produce non binary pseudo random key sequence. The length of the sequence has been enhanced by designing hybrid model using LFSR and Ge- netic Algorithm (GA). Achieving the length more than the maximum length of LFSR is the primary inten- tion of this work. The statistical tests is conducted to assess the randomness of key sequence generated from hybrid model. Generated key sequences are used as key sequences in cryptographic applications and results are analyzed. © 2020 Elsevier B.V. All rights reserved. 1. Introduction As present days the demand for the internet access is increas- ing, securing the data from the unauthorised users over the in- ternet is a major concern. It is very much needed to control the accessing of the valuable information by the unauthorised users. Problems of confidentiality and authentications are solved by the cryptographic operations. The confidentiality helps to prevent the access of original data over the internet from unauthorised users, and authentication helps to prevent the unauthorised users from sending the messages. It confirms that the message is sent by the genuine sender. To provide confidentiality, a perfect security system is needed. Shannon [1] defines the perfect security as, it should have individ- ual unique key is used for each data element to encrypt. This is possible only by one-time pad indicating a large sequence of non- repetition of sequence is required. Also, the efficiency of stream cipher system increases as the generated key sequence satisfies the randomness properties to the maximum extent. Especially the length of the sequence plays major role. This paper works on designing hybrid system to generate non binary key sequence using existing LFSR system and GA, such that Corresponding author. E-mail address: sudeepa@nitte.edu.in (K.B. Sudeepa). it extends length of key sequence which is long enough to have one-time pad for any given system. Before going to the work, it is necessary to discuss a bit of random numbers. The generator of random numbers classified into two cate- gories; (i) True random number and (ii) Pseudo random number. A number generated based on a real-world situation is called true random number. Entropy of real-world situations will be very high, and its prediction will be very difficult [2]. Number generator that does not depend upon the real-world scenario is called Pseudoran- dom Number Generators (PRNGs). Such generator produces num- ber by mathematical functions or by an algorithm that appear ran- dom. [3]. Even though these Pseudorandom Number Generators of binary nature is used more in the application, it will have a drawback of dependency of the randomness for the strength of the cryptography. This can be overcome by introduction of non- binary cryptographic techniques. In this case the strength depends on the algorithm of encryption and the strength of the PRN se- quence generated. Next, we discuss some of the literature based on non-binary oriented pseudo random numbers, which will assist this work. The related work is discussed below. 1.1. Related works Lehrer [4] presented the linear congruential technique to pro- duce pseudo random number where a new number (X n+1 ) ob- https://doi.org/10.1016/j.patrec.2020.03.015 0167-8655/© 2020 Elsevier B.V. All rights reserved.