Genetic Algorithm Cryptanalysis of a Substitution Permutation Network

被引:0
|
作者
Brown, Joseph Alexander [1 ]
Houghten, Sheridan [1 ]
Ombuki-Berman, Beatrice [1 ]
机构
[1] Brock Univ, Dept Comp Sci, St Catharines, ON L2S 3A1, Canada
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We provide a preliminary exploration of the use of Genetic Algorithms (GA) upon a Substitution Permutation Network (SPN) cipher. The purpose of the exploration is to determine how to find weak keys. The size of the selected SPN created by Stinson[1] gives a sample for showing the methodology and suitability of an attack using GA. We divide the types of keys into groups, each of which is analyzed to determine which groups are weaker. Simple genetic operators are examined to show the suitability of GA when applied to this problem. Results show the potential of GA to provide automated or computer assisted breaking of ciphers. The GA broke a subset of the keys using small input texts.
引用
收藏
页码:115 / 121
页数:7
相关论文
共 50 条
  • [31] Impossible Differential Cryptanalysis and Integral Cryptanalysis of the ACE-Class Permutation
    Ye, Tao
    Wei, Yongzhuang
    Li, Lingcheng
    Pasalic, Enes
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2021, 2021, 13107 : 306 - 326
  • [32] Implementation White Box Cryptography in Substitution-Permutation network
    Levina, Alla
    Kamnev, Ivan
    Zikratov, Igor
    2020 9TH MEDITERRANEAN CONFERENCE ON EMBEDDED COMPUTING (MECO), 2020, : 621 - 623
  • [33] Key Based S-Box Selection and Key Expansion Algorithm for Substitution-Permutation Network Cryptography
    Nayaka, Raja Jitendra
    Biradar, R. C.
    2013 ANNUAL INTERNATIONAL CONFERENCE ON EMERGING RESEARCH AREAS & 2013 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, COMMUNICATIONS & RENEWABLE ENERGY (AICERA/ICMICR), 2013,
  • [34] Cryptanalysis of Image Encryption Based on Permutation-Substitution Using Chaotic Map and Latin Square Image Cipher
    Ahmad, Musheer
    Ahmad, Faiyaz
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON FRONTIERS OF INTELLIGENT COMPUTING: THEORY AND APPLICATIONS (FICTA) 2014, VOL 1, 2015, 327 : 481 - 488
  • [35] Cryptanalysis of Four-Round DES Based on Genetic Algorithm
    Song, Jun
    Zhang, Huanguo
    Meng, Qingshu
    Wang, Zhangyi
    2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2326 - 2329
  • [36] Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
    Song, Jun
    Yang, Fan
    Wang, Maocai
    Zhang, Huanguo
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2008, 5370 : 795 - +
  • [37] New secure and efficient substitution and permutation method for audio encryption algorithm
    Albahrani, Ekhlas Abbas
    Alshekly, Tayseer Karam
    Lafta, Sadeq H.
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (15): : 16616 - 16646
  • [38] New secure and efficient substitution and permutation method for audio encryption algorithm
    Ekhlas Abbas Albahrani
    Tayseer Karam Alshekly
    Sadeq H. Lafta
    The Journal of Supercomputing, 2023, 79 : 16616 - 16646
  • [39] Hybrid constrained permutation algorithm and genetic algorithm for process planning problem
    Abdullah Falih
    Ahmed Z. M. Shammari
    Journal of Intelligent Manufacturing, 2020, 31 : 1079 - 1099
  • [40] A genetic algorithm for cryptanalysis with application to DES-like systems
    Research Development Center, National Defense Council, Cairo, Egypt
    不详
    不详
    不详
    不详
    Int. J. Netw. Secur., 2009, 2 (177-188):