Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitution Cipher

被引:0
|
作者
Mudgal, Piyush Kumar [1 ]
Purohit, Rajesh [1 ]
Sharma, Rajesh [1 ]
Jangir, Mahendra Kumar [2 ]
机构
[1] Jai Narain Vyas Univ, Dept Comp Sci & Engn, Jodhpur, Rajasthan, India
[2] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi, India
关键词
Genetic algorithm; Ciphers; Encryption; Roulette wheel selection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute-force method). Genetic algorithms are considered to be a tool for meta heuristic applications. In this work an attempt is made to carry out cryptanalysis, through genetic algorithms. In this, mono-alphabetic substitution cipher technique is considered. The experiment is carried out for four key samples, and attempt to break with variations in genetic operators i.e. selection, crossover and mutation. Regarding variations, for selection- random with elitism, roulette wheel and tournament options are used, for crossover - 1-point, 2-point and Uniform options are used, with interchanging mutation.
引用
收藏
页码:400 / 405
页数:6
相关论文
共 50 条
  • [1] Genetic Algorithm in Stream Cipher Cryptanalysis
    Polak, Iwona
    Boryczka, Mariusz
    COMPUTATIONAL COLLECTIVE INTELLIGENCE (ICCCI 2015), PT II, 2015, 9330 : 149 - 158
  • [2] Genetic Algorithm with Elitism for Cryptanalysis of Vigenere Cipher
    Bhateja, Aditi
    Kumar, Shailender
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON ISSUES AND CHALLENGES IN INTELLIGENT COMPUTING TECHNIQUES (ICICT), 2014, : 373 - 377
  • [3] Cryptanalysis of a Hill Cipher using Genetic algorithm
    Al-Khalid, Ali S.
    Al-Khfagi, Alaa O.
    2015 WORLD SYMPOSIUM ON COMPUTER NETWORKS AND INFORMATION SECURITY (WSCNIS), 2015,
  • [4] Genetic algorithm cryptanalysis of a Feistel type block Cipher
    Albassal, AMB
    Wahdan, AMA
    ICEEC'04: 2004 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONIC AND COMPUTER ENGINEERING, PROCEEDINGS, 2004, : 217 - 221
  • [5] Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
    Song, Jun
    Yang, Fan
    Wang, Maocai
    Zhang, Huanguo
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2008, 5370 : 795 - +
  • [6] Genetic Algorithm Cryptanalysis of a Substitution Permutation Network
    Brown, Joseph Alexander
    Houghten, Sheridan
    Ombuki-Berman, Beatrice
    IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY, 2009, : 115 - 121
  • [7] Mono-alphabetic poly-semanticism for high resolution radar signal design
    Moinuddin, Mohd. Moazzam
    Mallikarjuna Reddy, Y.
    Pasha, I.A.
    Lal Kishore, K.
    International Journal of Signal Processing, Image Processing and Pattern Recognition, 2010, 3 (03) : 49 - 70
  • [8] Mono-alphabetic Poly-semanticism for High Resolution Radar Signal Design
    Moinuddin, Mohd. Moazzam
    Reddy, Mallikarjuna Y.
    Pasha., I. A.
    Kishore, Lal K.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2010, 4 (03): : 17 - 34
  • [9] Cryptanalysis of Substitution Cipher Chaining mode (SCC)
    El-Fotouh, Mohamed Abo
    Diepold, Klaus
    2009 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-8, 2009, : 779 - 784
  • [10] Mono-alphabetic Signal Design for Improved Target Detection in High Resolution Radar Systems
    Moinuddin, Mohd. Moazzam
    Reddy, Mallikarjuna Y.
    Pasha, I. A.
    Kishore, Lal K.
    2009 ANNUAL IEEE INDIA CONFERENCE (INDICON 2009), 2009, : 229 - +