Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitution Cipher

被引:0
|
作者
Mudgal, Piyush Kumar [1 ]
Purohit, Rajesh [1 ]
Sharma, Rajesh [1 ]
Jangir, Mahendra Kumar [2 ]
机构
[1] Jai Narain Vyas Univ, Dept Comp Sci & Engn, Jodhpur, Rajasthan, India
[2] Jawaharlal Nehru Univ, Sch Comp & Syst Sci, New Delhi, India
关键词
Genetic algorithm; Ciphers; Encryption; Roulette wheel selection;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute-force method). Genetic algorithms are considered to be a tool for meta heuristic applications. In this work an attempt is made to carry out cryptanalysis, through genetic algorithms. In this, mono-alphabetic substitution cipher technique is considered. The experiment is carried out for four key samples, and attempt to break with variations in genetic operators i.e. selection, crossover and mutation. Regarding variations, for selection- random with elitism, roulette wheel and tournament options are used, for crossover - 1-point, 2-point and Uniform options are used, with interchanging mutation.
引用
收藏
页码:400 / 405
页数:6
相关论文
共 50 条
  • [41] A DNA sticker algorithm for bit-substitution in a block cipher
    Geng, Xiutang
    Pan, Linqiang
    Xu, Jin
    JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING, 2008, 68 (09) : 1201 - 1206
  • [42] An Image Encryption Algorithm Based on Trivium Cipher and Random Substitution
    Alghamdi Y.
    Munir A.
    SN Computer Science, 4 (6)
  • [43] Cryptanalysis of genetic algorithm-based encryption scheme
    Wong, Kuan-Wai
    Yap, Wun-She
    Wong, Denis C-K
    Phan, Raphael C-W
    Goi, Bok-Min
    MULTIMEDIA TOOLS AND APPLICATIONS, 2020, 79 (35-36) : 25259 - 25276
  • [44] Cryptanalysis of genetic algorithm-based encryption scheme
    Kuan-Wai Wong
    Wun-She Yap
    Denis C.-K. Wong
    Raphael C.-W. Phan
    Bok-Min Goi
    Multimedia Tools and Applications, 2020, 79 : 25259 - 25276
  • [45] Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher
    Ahmad, Musheer
    Ahmad, Faiyaz
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 481 - 488
  • [46] Application of substitution box of present cipher for automated detection of snoring sounds
    Dogan, Sengul
    Akbal, Erhan
    Tuncer, Turker
    Acharya, U. Rajendra
    ARTIFICIAL INTELLIGENCE IN MEDICINE, 2021, 117
  • [47] Cryptanalysis of Four-Round DES Based on Genetic Algorithm
    Song, Jun
    Zhang, Huanguo
    Meng, Qingshu
    Wang, Zhangyi
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2326 - 2329
  • [48] An Enhanced Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm
    Garg, Poonam
    Shastri, Aditya
    Agarwal, D. C.
    PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 12, 2006, 12 : 145 - +
  • [49] Dynamic Key Matrix of Hill Cipher Using Genetic Algorithm
    Putera, Andysah
    Siahaan, Utama
    Rahim, Robbi
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (08): : 173 - 180
  • [50] A COMPOSITE IMAGE CIPHER USING DNA SEQUENCE AND GENETIC ALGORITHM
    Saranya, M. R.
    Mohan, Arun K.
    Anusudha, K.
    2014 INTERNATIONAL CONFERENCE ON CONTEMPORARY COMPUTING AND INFORMATICS (IC3I), 2014, : 1022 - 1026