International Journal of Innovative Technology and Exploring Engineering (IJITEE) ISSN: 2278-3075, Volume-8 Issue-12, October 2019 2467 Published By: Blue Eyes Intelligence Engineering & Sciences Publication Retrieval Number: L34231081219/2019©BEIESP DOI: 10.35940/ijitee.L3423.1081219 Abstract: —In today’s world, secured communication is what every field wants. But due to the escalation of theft and unauthorized access to the data, the need for new encryption algorithms has also gone high. This paper proposed a hybrid encryption scheme which uses ElGamal key exchange algorithm and Genetic algorithms. In this scheme, the users share seventeen 16-bit keys, random in nature, using the ElGamal algorithm, which is used to calculate a shared key. Along with this shared key and MAC(Medium Access Control) addresses of both sender and receiver(MAC is used as it is a unique identifier attached to a network adapter or system), a final key is generated through a 10-round algorithm. Further, this final key is used for data encryption using Genetic algorithms. A new key is generated for each communication session between sender and receiver. The proposed technique shows that it is resistant to most of today’s known and common attacks. Keywords: Identity-Based Encryption, Genetic Algorithm, Mutation, Crossover. I. INTRODUCTION The information security has become a crucial, important and imperative issue in applications of information exchange. It is becoming more important due to the increase in laptops and other computing devices, growth and advancement in technologies, various network technologies and huge quantity of data in the form of digital information. Therefore, to shield the valuable information from unauthorized users’ various varieties of cryptanalytic schemes are developed and applied in existing systems. Cryptography,’kryptos’ in Greek, means ’Secret Writing’. It is defined as the art (sometimes as science) of transforming messages into unreadable form to make them secure and immune to various attacks. The original message, which is willing to send by sender from its end is plain text while the coded or encrypted message is cipher text, send to receiver. The method used to change the plain text to encoded/cipher message is ciphering or encryption while the reverse is called as deciphering or decryption method. The led of study belons these techniques to ensure the security of Revised Manuscript Received on October 05, 2019. * Correspondence Author Darpan Anand*, Associate Professor, Department of Computer Science Engineering Chandigarh University, Chandigarh, India. Email: darpan.anand.agra@gmail.com Jeetendra Pande, Assistant Professor, Department of Computer Science, Uttarakhand Open University, Haldwani-263139, India. Email: jpande@uou.ac.in Udit Maheshwari, Hindustan Institute of Technology and Management, India. Email: maheshwariudit29@gmail.com the message is called as cryptography. The major types of cryptography techniques are public key cryptography, key escrow cryptography, translucent cryptography, symmetric key cryptography, and ID-Based Cryptography. One of the vulnerabilities of these techniques are due to the key, which is used for encryption and decryption. [1]-[3] Shamir introduced the solution to handle the problem of key by the concept of identity-based(Id-Based) cryptography [4]. In this technique, the person is able to deduce the public from the public information of user which are uniquely identified like email, phone number, SSN(In case of USA, etc.), AADHAR(in case of India). The major benefit of using Id-based Encryption(IBE) is that it does not need any certificates to bind the users’ names with their public keys. The first practical and provably secure ID-based encryption scheme was proposed by Boneh and Franklin in 2001 [5]. Since then, IBE has undergone quite rapid development and a lot of schemes have been proposed [6]-[9]. The most difficult or most vulnerable area in information security is identity of the entity. Generally, string based pass phrases are being used to ensure the authentication and securing the identity of the user. These is problem with these pass phrases is the key-logging because the pass-phrase can be sniffed through a key logger software. Therefore, in place of pass phrases, the hardware dependent unique information can be used to ensure the security of the identity of the entity. As we know, every network device is equipped with a unique address called as MAC address which is globally unique. This address can be considered as the deriving entity to deduce the public key in ID-Based cryptography as it is unmodifiable and globally unique hardwired value. This is also called as physical network address and it is of 12 hexadecimal numbers, 48 bits in length and the format of this number is as: MM:MM:MM:SS:SS:SS or MM-MM-MM-SS-SS-SS. The MAC address consists two identities as half part is addressing the identity of the manufacturer of the device and rest half part is addressing the serial number or identity of the hardware. The best thing to pick the MAC address as the seed for ID-Based cryptography is that, no active device can change its MAC address, along with the permission given by the wireless gateway. Because the authorized and registered MAC address requests can only be allowed to communicate [10]. Spoofing a MAC address is basically identity theft and denotes the altering of the MAC on a NIC. Therefore, many approaches have been introduced to generate NIC ngerprints [11].3 Identity-Based Encryption Algorithm using Hybrid Encryption and MAC Address for Key Generation Darpan Anand, Jeetendra Pande, Udit Maheshwari