Proposed Hybrid Technique in Cryptanalysis of Cryptosystem Based on PSO and SA

نویسندگان

چکیده

Modern ciphers are one of the more difficult to break cipher systems because these high security, speed, non - propagation error and difficulty in breaking it. One most important weaknesses stream is a matching or correlation between output key-stream shift registers. This work considers new investigation methods for cryptanalysis using ciphertext only attack depending on Particle Swarm Optimization (PSO) automatic extraction key. It also introduces system based PSO with suggestion enhancement performance PSO, by Simulated Annealing (SA). Additionally, it presents comparison results that were obtained proposed technique, which called Modified (MPSO) classical GA. These algorithms can be used reducing number attempts trials key space, needed reach optimal solution (the exact initial setting Linear Feedback Shift Register (LFSR)),and increase speed search process find best solution. Based results, shown effective at finding MPSO method operates better compared term time accuracy. Well known attacked two soft computing as cases study, Geffe , Brȕer Shrinking systems.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of a Public Key Cryptosystem Proposed at ACISP 2000

At ACISP 2000, Yoo et al proposed a fast public key cryptosystem using matrices over a ring. The authors claim that the security of their system is based on the RSA problem. In this paper we present a heuristic attack that enables us to recover the private key from the public key. In particular, we show that breaking the system can be reduced to finding a short vector in a lattice which can be ...

متن کامل

Cryptanalysis of the Cryptosystem Based on DLP gamma = alphaabetab

A critique of the proposed encryption scheme based on the DLP γ = αβ is provided. It is described how a plaintext can be obtained from a valid ciphertext by computing a single traditional discrete logarithm in a cyclic group. Furthermore, it is shown that the proposed encryption scheme is in fact equivalent to the ElGamal encryption scheme.

متن کامل

Cryptanalysis of a New Chaotic Cryptosystem Based on Ergodicity∗

This paper analyzes the security of a recent cryptosystem based on the ergodicity property of chaotic maps. It is shown how to obtain the secret key using a chosenciphertext attack. Some other design weaknesses are also shown.

متن کامل

Cryptanalysis of a Cryptosystem based on Drinfeld modules

A public key cryptosystem based on Drinfeld modules has been proposed by Gillard, Leprevost, Panchishkin and Roblot. The paper shows how an adversary can directly recover a private key using only the public key, and so the cryptosystem is insecure.

متن کامل

the comparative impact of prompts and recasts in processing instruction versus meaningful output-based instruction on efl learners’ writing accuracy

the purpose of the present study was to see which one of the two instruction-processing instruction (pi) and meaningful output based instruction (mobi) accompanied with prompt and recast- is more effective on efl learners’ writing accuracy. in order to homogenize the participants in term of language proficiency a preliminary english test (pet) was administrated between 74 intermediate students ...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Iraqi journal of science

سال: 2022

ISSN: ['0067-2904', '2312-1637']

DOI: https://doi.org/10.24996/ijs.2022.63.10.37