Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm

نویسندگان

  • Morteza Heydari
  • Mahdieh Nadi Senejani
چکیده

An approach of information security is Cryptography.Cryptanalysis is the science study to break cryptography without the encryption key. The present paper shows the benefits of the implementation of a novel genetic algorithm, the "Cuckoo Search" Algorithm (CSA) with new fitness function for the cryptanalysis of transposition cipher. The fitness function is evaluated based on the most common bigrams and trigrams. Results show that the algorithm proposed in this paper is effective for cryptanalysis of transposition cipher with long key lengths up to 30 due to its strong reliability and fast convergence speed. Corresponding Author: Morteza Heydari, Department of Computer Engineering, Ashtian Branch, Islamic Azad University, Ashtian, Iran. E-mail: [email protected] phone numbers:+9809133612974 Morteza Heydari et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.1, January2014, pg. 140-149 © 2014, IJCSMC All Rights Reserved 141

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptanalysis of Substitution Ciphers Using Scatter Search

This paper presents an approach for the automated cryptanalysis of substitution ciphers based on a recent evolutionary metaheuristic called Scatter Search. It is a population-based metaheuristic founded on a formulation proposed two decades ago by Fred Glover. It uses linear combinations on a population subsets to create new solutions while other evolutionary approaches like genetic algorithms ...

متن کامل

A Search-Based Tool for the Automated Cryptanalysis of Classical Ciphers

The field of classical cryptography encompasses various forms of simple pen-and-paper ciphers that were in widespread use until the early 20th century. Although these ciphers have long been surpassed by modern cryptographic systems, they can still be challenging to break using manual methods alone. Indeed, there exist several well-known classically-encrypted cryptograms which, at present, remai...

متن کامل

Automated Cryptanalysis of Monoalphabetic Substitution Ciphers Using Stochastic Optimization Algorithms

All forms of symmetric encryption take a key shared between a small group of people and encode data using this key so that only those with the key are able to decrypt it. Encryption algorithms tend to rely on problems that are computationally intractable for security, but even more generally these algorithms rely on a fundamental assumption: that the number of potential keys is so large that it...

متن کامل

Cryptanalysis of Transposition Ciphers with Long Key Lengths Using an Improved Genetic Algorithm

In Today's world, with increasing usage of computer networks and internet, the importance of network, computer and information security is obvious. One of the widely used approaches for information security is Cryptography. Cryptanalysis is a way to break cryptography without having the encryption key. This paper presents an approach to the cryptanalysis of transposition ciphers using an improv...

متن کامل

Genetic Algorithms, Tabu Search and Simulated Annealing: a Comparison between Three Approaches for the Cryptanalysis of Transposition Cipher

Due to increasing incidents of cyber attacks, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on genetic algorithm, tabu search & simulated annealing to break a transposition ci...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014