Cryptanalysis of cipher text using evolutionary algorithm has gained much interest in the last decade. In this paper, cryptanalysis of SDES has been performed using Genetic Algorithm with Ring Crossover operator. Cryptography has been prone to many attacks but the scope of this paper is limited only to the cipher text attack. Different combinations of keys are generated using the Genetic Algorithm and hence it is concluded that Genetic Algorithm is a better approach than the Brute Force for analyzing SDES.
Published in | American Journal of Networks and Communications (Volume 4, Issue 3) |
DOI | 10.11648/j.ajnc.20150403.12 |
Page(s) | 32-36 |
Creative Commons |
This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited. |
Copyright |
Copyright © The Author(s), 2015. Published by Science Publishing Group |
Cryptanalysis, Cipher Text Attack, SDES, Genetic Algorithm, Brute Force, Key Search Space
[1] | G Poonam, Memetic Algorithm Attack on Simplified Data Encryption Standard algorithm, proceeding of International Conference on Data Management, February 2008, pg 1097-1108. |
[2] | Garg Poonam, Genetic algorithm Attack on Simplified Data Encryption Standard Algorithm, International journal Research in Computing Science, ISSN1870-4069, 2006. |
[3] | Nalini, Cryptanalysis of S-DES via Optimization heuristics, International Journal of Computer Sciences and network security, vol 6, No 1B, Jan 2006. |
[4] | Spillman, R.: Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms.Cryptologia XVII(4), 367– 377 (1993) |
[5] | Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of A Genetic Algorithm in the Cryptanalysis of simple substitution Ciphers. Cryptologia XVII(1), 187–201 (1993) |
[6] | Clark A and Dawson Ed, “Optimisation Heuristics for the Automated Cryptanalysis of Classical Ciphers”, Journal of Combinatorial Mathematics and Combinatorial Computing, Vol.28,pp. 63-86, 1998. |
[7] | M. Matsui, Linear cryptanalysis method for DES cipher, Lect. Notes Comput. Sci. 765 (1994) 386– 397. |
[8] | William Stallings, Cryptography and Network Security Principles and Practices, Third Edition, Pearson Education Inc., 2003. |
[9] | Vimalathithan.R, M.L.Valarmathi, “Cryptanalysis of SDES Using Genetic Algorithm”, International Journal of Recent Trends in Engineering, Vol2, No.4, November 2009, pp.76-79. |
[10] | Schaefer E, “A Simplified Data Encryption Standard Algorithm”, Cryptologia, Vol .20, No.1, pp. 77-84, 1996. |
[11] | Yılmaz Kaya, Murat Uyar, Ramazan Tekdn,” A Novel Crossover Operator for Genetic Algorithms: Ring Crossover”. |
[12] | Davis,L. “Handbook of Genetic Algorithm”,Van Nostrand Reinhold, New York,1991. |
[13] | D. E. Goldberg,"Genetic algorithms in search. Optimization and Machine Learning.Reading. M.A. addison -Wesley.1989. |
[14] | A, Michalewiez and N. Attia." Evolutionary optimization of constrained problems." InProc.3rd annu. Conf. on Evolutionary Programming. 1994.pp 98-108 |
[15] | Z. Michalewicz. "Genetic algorithms+ Data structures = Evolution programs 3rd Ed. New York. Springer,1996. |
[16] | N.Koblitz, “A Course on number theory and cryptography”, Springer-Verlag New York,Inc., 1994. |
[17] | Alfred J. Menezes. Menezes, Alfred J. Handbook of Applied Cryptography, CRC, 1997. |
[18] | R. Toemeh, S. Arumugam, Breaking Transposition Cipher with Genetic Algorithhm Electronics and Electrical Engineering,ISSN 1392 – 1215 2007. No. 7(79). |
[19] | Lavkush Sharma , Bhupendra Kumar Pathak & Ramgopal Sharma Breaking of Simplified Data Encryption Standard Using Genetic Algorithm |
[20] | Kalyanmoy Deb, Multi-objective Optimization using Evolutionary Algorithms, John Wiley and Sons, 2001. |
[21] | C.W. Wu and N. F. Rulkov, Studying chaos via 1-Dmaps—atutorial, IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications, vol. 40, no. 10, pp. 707–721, 1993. |
[22] | http://www.hindawi.com/journals/mse/2009/540895/fig1/ |
[23] | http://www.decodesystems.com/mt/98oct/crypt.html. |
APA Style
Purvi Garg, Shivangi Varshney, Manish Bhardwaj. (2015). Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm. American Journal of Networks and Communications, 4(3), 32-36. https://doi.org/10.11648/j.ajnc.20150403.12
ACS Style
Purvi Garg; Shivangi Varshney; Manish Bhardwaj. Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm. Am. J. Netw. Commun. 2015, 4(3), 32-36. doi: 10.11648/j.ajnc.20150403.12
AMA Style
Purvi Garg, Shivangi Varshney, Manish Bhardwaj. Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm. Am J Netw Commun. 2015;4(3):32-36. doi: 10.11648/j.ajnc.20150403.12
@article{10.11648/j.ajnc.20150403.12, author = {Purvi Garg and Shivangi Varshney and Manish Bhardwaj}, title = {Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm}, journal = {American Journal of Networks and Communications}, volume = {4}, number = {3}, pages = {32-36}, doi = {10.11648/j.ajnc.20150403.12}, url = {https://doi.org/10.11648/j.ajnc.20150403.12}, eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20150403.12}, abstract = {Cryptanalysis of cipher text using evolutionary algorithm has gained much interest in the last decade. In this paper, cryptanalysis of SDES has been performed using Genetic Algorithm with Ring Crossover operator. Cryptography has been prone to many attacks but the scope of this paper is limited only to the cipher text attack. Different combinations of keys are generated using the Genetic Algorithm and hence it is concluded that Genetic Algorithm is a better approach than the Brute Force for analyzing SDES.}, year = {2015} }
TY - JOUR T1 - Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm AU - Purvi Garg AU - Shivangi Varshney AU - Manish Bhardwaj Y1 - 2015/04/27 PY - 2015 N1 - https://doi.org/10.11648/j.ajnc.20150403.12 DO - 10.11648/j.ajnc.20150403.12 T2 - American Journal of Networks and Communications JF - American Journal of Networks and Communications JO - American Journal of Networks and Communications SP - 32 EP - 36 PB - Science Publishing Group SN - 2326-8964 UR - https://doi.org/10.11648/j.ajnc.20150403.12 AB - Cryptanalysis of cipher text using evolutionary algorithm has gained much interest in the last decade. In this paper, cryptanalysis of SDES has been performed using Genetic Algorithm with Ring Crossover operator. Cryptography has been prone to many attacks but the scope of this paper is limited only to the cipher text attack. Different combinations of keys are generated using the Genetic Algorithm and hence it is concluded that Genetic Algorithm is a better approach than the Brute Force for analyzing SDES. VL - 4 IS - 3 ER -