Swarm Intelligence Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review

被引:0
|
作者
Jain, Ashish [1 ]
Gupta, Nirmal K. [1 ]
Vishwakarma, Santosh K. [1 ]
Sharma, Prakash C. [1 ]
机构
[1] Manipal Univ Jaipur, Sch Comp & Informat Technol, Jaipur, Rajasthan, India
关键词
SEARCH;
D O I
10.1007/978-981-16-2877-1_29
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Between the year 2003 and 2018, a considerable new and different swarm intelligence techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This paper compares the performance of these new and different swarm intelligence techniques. Three main comparison measures are considered to assess the performance of presented swarm intelligence techniques: efficiency, effectiveness, and success rate. It is noteworthy that among the presented swarm intelligence techniques the performance of cuckoo search technique is best with respect to all the measures.
引用
收藏
页码:321 / 331
页数:11
相关论文
共 50 条
  • [1] Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review
    Jain, Ashish
    Sharma, Prakash C.
    Vishwakarma, Santosh K.
    Gupta, Nirmal K.
    Gandhi, Vaibhav C.
    SMART SYSTEMS: INNOVATIONS IN COMPUTING (SSIC 2021), 2022, 235 : 467 - 478
  • [2] Differential Evolution for the Cryptanalysis of Transposition Cipher
    Wulandari, Gia S.
    Rismawan, Wahyu
    Saadah, Siti
    2015 3RD INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOICT), 2015, : 45 - 48
  • [3] Cryptanalysis of columnar transposition cipher with long keys
    Lasry, George
    Kopal, Nils
    Wacker, Arno
    CRYPTOLOGIA, 2016, 40 (04) : 374 - 398
  • [4] Cryptanalysis of Transposition Cipher Using Evolutionary Algorithms
    Boryczka, Urszula
    Dworak, Kamil
    COMPUTATIONAL COLLECTIVE INTELLIGENCE: TECHNOLOGIES AND APPLICATIONS, ICCCI 2014, 2014, 8733 : 623 - 632
  • [5] Automated cryptanalysis of transposition ciphers
    Giddy, J.P.
    Safavi-Naini, R.
    Computer Journal, 1994, 37 (05): : 429 - 436
  • [6] AUTOMATED CRYPTANALYSIS OF TRANSPOSITION CIPHERS
    GIDDY, JP
    SAFAVINAINI, R
    COMPUTER JOURNAL, 1994, 37 (05): : 429 - 436
  • [7] Cryptanalysis on classical cipher based on Indonesian language
    Marwati, R.
    Yulianti, K.
    4TH INTERNATIONAL SEMINAR OF MATHEMATICS, SCIENCE AND COMPUTER SCIENCE EDUCATION, 2018, 1013
  • [8] Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
    Song, Jun
    Yang, Fan
    Wang, Maocai
    Zhang, Huanguo
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2008, 5370 : 795 - +
  • [9] Automated ciphertext-only cryptanalysis of the Bifid cipher
    Machiavelo, Antonio
    Reis, Rogerio
    CRYPTOLOGIA, 2007, 31 (02) : 112 - 124
  • [10] Solving the Olum 2 cipher: a new approach to cryptanalysis of transposition ciphers
    Relkin, Paul W.
    CRYPTOLOGIA, 2023, 47 (01) : 38 - 47