A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem

被引:0
|
作者
Mohamed Abdel-Basset
Doaa El-Shahat
Ibrahim El-henawy
Arun Kumar Sangaiah
Syed Hassan Ahmed
机构
[1] Zagazig University,Faculty of Computers and Informatics, Department of Operations Research
[2] Zagazig University,Computer Science Department, Faculty of Computers and Informatics
[3] School of Computing Science and Engineering,Department of Electrical and Computer Engineering
[4] Vellore Institute of Technology,undefined
[5] University of Central Florida,undefined
来源
关键词
Whale optimization algorithm; Knapsack cipher; Subset sum problem; Public key cryptosystem; Merkle-Hellman Cryptosystem; Cryptanalysis;
D O I
暂无
中图分类号
学科分类号
摘要
With the advance of the communication technology and the massive flow of information across the internet, it is becoming urgent to keep the confidentiality of the transmitted information. Using the internet has been extended to several fields such as e-mail, e-commerce, e-learning, health and medicine, shopping, and so on. Cryptography is the study of different techniques for securing the communication between the sender and the receiver. One of the most known cryptosystems is Merkle–Hellman Knapsack Cryptosystem (MHKC). It is one of the earliest Public Key Cryptosystem (PKC) that is used to secure the messages between the sender and the receiver. Developing a powerful cryptosystem comes after studying the fragility points of the current cryptosystems. The Whale Optimization Algorithm (WOA) is one of the most recent nature-inspired meta-heuristic optimization algorithms, which simulates the social behavior of humpback whales. WOA has validated excellent performance in solving the continuous problems and the engineering optimization problems. This paper introduces a novel Modified version of WOA (MWOA) for cryptanalysis of MHKC. The sigmoid function is used to map the continuous values into discrete one. A penalty function is added to the evaluation function to deal with the infeasible solutions. The mutation operation is employed for improving the solutions. The results show that MWOA is more effective and robust than other algorithms in the literature.
引用
收藏
页码:723 / 733
页数:10
相关论文
共 50 条
  • [1] A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem
    Abdel-Basset, Mohamed
    El-Shahat, Doaa
    El-henawy, Ibrahim
    Sangaiah, Arun Kumar
    Ahmed, Syed Hassan
    [J]. MOBILE NETWORKS & APPLICATIONS, 2018, 23 (04): : 723 - 733
  • [2] A Novel Public Key Cryptosystem based on Merkle-Hellman Knapsack Cryptosystem
    Thangavel, M.
    Varalakshmi, P.
    [J]. 2016 EIGHTH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING (ICOAC), 2017, : 117 - 122
  • [3] Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
    Kantour, Nedjmeddine
    Bouroubi, Sadek
    [J]. MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 211 - 222
  • [4] Cryptanalysis of Merkle-Hellman Cipher Using Parallel Genetic Algorithm
    Nedjmeddine Kantour
    Sadek Bouroubi
    [J]. Mobile Networks and Applications, 2020, 25 : 211 - 222
  • [5] Merkle-Hellman revisited: A cryptanalysis of the Qu-Vanstone cryptosystem based on group factorizations
    Nguyen, P
    Stern, J
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 198 - 212
  • [7] Encrypting Messages using the Merkle-Hellman Knapsack Cryptosystem
    Agarwal, Ashish
    [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2011, 11 (05): : 12 - 14
  • [8] An Improved Attack on the Basic Merkle-Hellman Knapsack Cryptosystem
    Liu, Jiayang
    Bi, Jingguo
    Xu, Songyan
    [J]. IEEE ACCESS, 2019, 7 : 59388 - 59393
  • [9] A Modified Technique for Reliable Image Encryption Method using Merkle-Hellman Cryptosystem and Rsa Algorithm
    Lokeshwari, G.
    Susarla, Sreevidya
    Kumar, S. Udaya
    [J]. JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2015, 18 (03): : 293 - 300
  • [10] Cryptanalyzing Merkle-Hellman Public Key Cryptosystem with Artificial Neural Networks
    Khan, Ahmad Neyaz
    Fan, Ming Yu
    Malik, Asad
    Husain, Mohammed A. Slam
    [J]. 2019 IEEE 5TH INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2019,