Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitution Cipher

被引:0
|
作者
Mudgal, Piyush Kumar [1 ]
Purohit, Rajesh [1 ]
Sharma, Rajesh [1 ]
Jangir, Mahendra Kumar [2 ]
机构
[1] Jai Narain Vyas Univ, Dept Comp Sci & Engn, Jodhpur, Rajasthan, India
[2] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi, India
关键词
Genetic algorithm; Ciphers; Encryption; Roulette wheel selection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute-force method). Genetic algorithms are considered to be a tool for meta heuristic applications. In this work an attempt is made to carry out cryptanalysis, through genetic algorithms. In this, mono-alphabetic substitution cipher technique is considered. The experiment is carried out for four key samples, and attempt to break with variations in genetic operators i.e. selection, crossover and mutation. Regarding variations, for selection- random with elitism, roulette wheel and tournament options are used, for crossover - 1-point, 2-point and Uniform options are used, with interchanging mutation.
引用
收藏
页码:400 / 405
页数:6
相关论文
共 50 条
  • [31] Improved Markov Chain Monte Carlo method for cryptanalysis substitution-transposition cipher
    Fathi-Vajargah, Behrouz
    Kanafchian, Mohadeseh
    MONTE CARLO METHODS AND APPLICATIONS, 2016, 22 (04): : 323 - 335
  • [32] Cryptanalysis of MRVLK Using Genetic Algorithm
    Mirvaziri, Hamid
    JOURNAL OF APPLIED SECURITY RESEARCH, 2018, 13 (04) : 489 - 501
  • [33] Breaking transposition cipher with genetic algorithm
    Toemeh, R.
    Arumugam, S.
    ELEKTRONIKA IR ELEKTROTECHNIKA, 2007, (07) : 75 - 78
  • [34] A Binomial Crossover Based Artificial Bee Colony Algorithm for Cryptanalysis of Polyalphabetic Cipher
    Sabonchi, Arkan Kh Shakr
    Akay, Bahriye
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2020, 27 (06): : 1825 - 1835
  • [35] An application of Euclidean algorithm in cryptanalysis of RSA
    Poulakis, Dimitrios
    ELEMENTE DER MATHEMATIK, 2020, 75 (03) : 114 - 120
  • [36] Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
    Eskandari, Zahra
    Bafghi, Abbas Ghaemi
    ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2020, 12 (01): : 1 - 12
  • [37] Provable Security against Impossible Differential Cryptanalysis Application to CS-Cipher
    Roche, Thomas
    Gillard, Roland
    Roch, Jean-Louis
    MODELLING, COMPUTATION AND OPTIMIZATION IN INFORMATION SYSTEMS AND MANAGEMENT SCIENCES, PROCEEDINGS, 2008, 14 : 597 - +
  • [38] A genetic algorithm for cryptanalysis of DES-8
    Research Development Center National Defense Council, Nasr City, Cairo, Egypt
    不详
    不详
    不详
    不详
    Int. J. Netw. Secur., 2007, 2 (213-219):
  • [39] An Efficient Stream Cipher using Genetic Algorithm
    Kumar, Ankit
    Chatterjee, Kakali
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 2322 - 2326
  • [40] A Cryptanalysis Method based on Niche Genetic Algorithm
    Li, Tao
    Li, Jiguo
    Zhang, Jing
    APPLIED MATHEMATICS & INFORMATION SCIENCES, 2014, 8 (01): : 279 - 285