On the Fitness Functions Involved in Genetic Algorithms and the Cryptanalysis of Block Ciphers

被引:2
|
作者
Tito-Corrioso, Osmani [1 ]
Borges-Quintana, Mijail [2 ]
Borges-Trenard, Miguel A. [3 ]
Rojas, Omar [4 ,5 ]
Sosa-Gomez, Guillermo [4 ]
机构
[1] Univ Matanzas, Fac Ingn Ind, Dept Matemat Fis Aplicada, Autopista Varadero km 3 5, Matanzas 40100, Cuba
[2] Univ Oriente, Fac Ciencias Nat & Exactas, Dept Matemat, Ave Patricio Lumumba S-N, Santiago De Cuba 90500, Cuba
[3] Univ Antonio Narino, Math Educ, Bogota 111321, Colombia
[4] Univ Panamer, Fac Ciencias Econ & Empresariales, Alvaro Portillo 49, Zapopan 45010, Mexico
[5] Univ Airlangga, Fac Econ & Business, Jl Airlangga 4-6, Surabaya 60286, Indonesia
关键词
genetic algorithm; fitness function; block ciphers; cryptography; optimization;
D O I
10.3390/e25020261
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
There are many algorithms used with different purposes in the area of cryptography. Amongst these, Genetic Algorithms have been used, particularly in the cryptanalysis of block ciphers. Interest in the use of and research on such algorithms has increased lately, with a special focus on the analysis and improvement of the properties and characteristics of these algorithms. In this way, the present work focuses on studying the fitness functions involved in Genetic Algorithms. First, a methodology was proposed to verify that the closeness to 1 of some fitness functions' values that use decimal distance implies decimal closeness to the key. On the other hand, the foundation of a theory is developed in order to characterize such fitness functions and determine, a priori, if one method is more effective than another in the attack to block ciphers using Genetic Algorithms.
引用
收藏
页数:13
相关论文
共 50 条
  • [31] Weakness of lightweight block ciphers mCrypton and LED against biclique cryptanalysis
    Kitae Jeong
    HyungChul Kang
    Changhoon Lee
    Jaechul Sung
    Seokhie Hong
    Jong In Lim
    Peer-to-Peer Networking and Applications, 2015, 8 : 716 - 732
  • [32] Rotational-XOR Cryptanalysis of Simon-Like Block Ciphers
    Lu, Jinyu
    Liu, Yunwen
    Ashur, Tomer
    Sun, Bing
    Li, Chao
    INFORMATION SECURITY AND PRIVACY, ACISP 2020, 2020, 12248 : 105 - 124
  • [33] On a structure of block ciphers with provable security against differential and linear cryptanalysis
    Matsui, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 1999, E82A (01) : 117 - 122
  • [34] Comprehensive Neural Cryptanalysis on Block Ciphers Using Different Encryption Methods
    Jeong, Ongee
    Ahmadzadeh, Ezat
    Moon, Inkyu
    MATHEMATICS, 2024, 12 (13)
  • [35] Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
    Cao, Wenqin
    Zhang, Wentao
    CYBERSECURITY, 2021, 4 (01)
  • [36] Generalized Meet in the Middle Cryptanalysis of Block Ciphers With an Automated Search Algorithm
    Ahmadi, Siavash
    Aref, Mohammad Reza
    IEEE ACCESS, 2020, 8 (08): : 2284 - 2301
  • [37] Provable security of block ciphers against linear cryptanalysis: a mission impossible?
    Piret, Gilles
    Standaert, Francois-Xavier
    DESIGNS CODES AND CRYPTOGRAPHY, 2009, 50 (03) : 325 - 338
  • [38] Security Evaluation of Lightweight Block Ciphers Against Mixture Differential Cryptanalysis
    Geng, Jiayue
    Ling, Chen
    Liu, Jinyu
    Qiao, Kexin
    Yi, Xiangjian
    Zhu, Liehuang
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (12): : 22116 - 22127
  • [39] Multidimensional linear cryptanalysis with key difference invariant bias for block ciphers
    Wenqin Cao
    Wentao Zhang
    Cybersecurity, 4
  • [40] Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT
    Ozen, Onur
    Varici, Kerem
    Tezcan, Cihangir
    Kocair, Celebi
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 90 - +