Differential Evolution for the Cryptanalysis of Transposition Cipher

被引:0
|
作者
Wulandari, Gia S. [1 ]
Rismawan, Wahyu [1 ]
Saadah, Siti [1 ]
机构
[1] Telkom Univ, Sch Comp, Bandung, Indonesia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Transposition cipher is a class of hystorical encryption algorithms that rearrange positions in plaintext based on some fixed permutation which is its secret key. In this research Differential Evolution was used to attack the transposition cipher, which is a permutation of integer problem. Despite the fact that Differential Evolution mostly used for problem with real numbers; this paper shows that Differential Evolution could be used to correctly decrypt ciphertext that has up to permutation length of 9, but started to have half of incorrect answers in 10 simulations done to permutation length of 10.
引用
收藏
页码:45 / 48
页数:4
相关论文
共 50 条
  • [1] Cryptanalysis of Polyalphabetic Cipher Using Differential Evolution Algorithm
    Sabonchi, Arkan Kh Shakr
    Akay, Bahriye
    TEHNICKI VJESNIK-TECHNICAL GAZETTE, 2020, 27 (04): : 1101 - 1107
  • [2] Cryptanalysis of columnar transposition cipher with long keys
    Lasry, George
    Kopal, Nils
    Wacker, Arno
    CRYPTOLOGIA, 2016, 40 (04) : 374 - 398
  • [3] Cryptanalysis of Transposition Cipher Using Evolutionary Algorithms
    Boryczka, Urszula
    Dworak, Kamil
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, ICCCI 2014, 2014, 8733 : 623 - 632
  • [4] DIFFERENTIAL CRYPTANALYSIS OF A SIMPLE BLOCK CIPHER
    YANG Junhui(Computing Center
    SystemsScienceandMathematicalSciences, 1994, (02) : 128 - 132
  • [5] Differential Cryptanalysis of K-Cipher
    Mahzoun, Mohammad
    Kraleva, Liliya
    Posteuca, Raluca
    Ashur, Tomer
    2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
  • [6] Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
    Song, Jun
    Yang, Fan
    Wang, Maocai
    Zhang, Huanguo
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2008, 5370 : 795 - +
  • [7] Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review
    Jain, Ashish
    Sharma, Prakash C.
    Vishwakarma, Santosh K.
    Gupta, Nirmal K.
    Gandhi, Vaibhav C.
    SMART SYSTEMS: INNOVATIONS IN COMPUTING (SSIC 2021), 2022, 235 : 467 - 478
  • [8] Impossible Differential Cryptanalysis of the FBC Block Cipher
    Lu, Jiqiang
    Zhang, Xiao
    INFORMATION SECURITY, ISC 2023, 2023, 14411 : 372 - 391
  • [9] Impossible Differential Cryptanalysis of LiCi Block Cipher
    Wei Y.
    Shi J.
    Li L.
    Dianzi Yu Xinxi Xuebao/Journal of Electronics and Information Technology, 2019, 41 (07): : 1610 - 1617
  • [10] Truncated Differential Cryptanalysis of the SPRING Block Cipher
    Zhou, Wenchang
    Lu, Jiqiang
    CRYPTOLOGY AND NETWORK SECURITY, PT II, CANS 2024, 2025, 14906 : 240 - 264