Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm
نویسندگان
چکیده
An approach of information security is Cryptography.Cryptanalysis is the science study to break cryptography without the encryption key. The present paper shows the benefits of the implementation of a novel genetic algorithm, the "Cuckoo Search" Algorithm (CSA) with new fitness function for the cryptanalysis of transposition cipher. The fitness function is evaluated based on the most common bigrams and trigrams. Results show that the algorithm proposed in this paper is effective for cryptanalysis of transposition cipher with long key lengths up to 30 due to its strong reliability and fast convergence speed. Corresponding Author: Morteza Heydari, Department of Computer Engineering, Ashtian Branch, Islamic Azad University, Ashtian, Iran. E-mail: [email protected] phone numbers:+9809133612974 Morteza Heydari et al, International Journal of Computer Science and Mobile Computing, Vol.3 Issue.1, January2014, pg. 140-149 © 2014, IJCSMC All Rights Reserved 141
منابع مشابه
Cryptanalysis of Substitution Ciphers Using Scatter Search
This paper presents an approach for the automated cryptanalysis of substitution ciphers based on a recent evolutionary metaheuristic called Scatter Search. It is a population-based metaheuristic founded on a formulation proposed two decades ago by Fred Glover. It uses linear combinations on a population subsets to create new solutions while other evolutionary approaches like genetic algorithms ...
متن کاملA Search-Based Tool for the Automated Cryptanalysis of Classical Ciphers
The field of classical cryptography encompasses various forms of simple pen-and-paper ciphers that were in widespread use until the early 20th century. Although these ciphers have long been surpassed by modern cryptographic systems, they can still be challenging to break using manual methods alone. Indeed, there exist several well-known classically-encrypted cryptograms which, at present, remai...
متن کاملAutomated Cryptanalysis of Monoalphabetic Substitution Ciphers Using Stochastic Optimization Algorithms
All forms of symmetric encryption take a key shared between a small group of people and encode data using this key so that only those with the key are able to decrypt it. Encryption algorithms tend to rely on problems that are computationally intractable for security, but even more generally these algorithms rely on a fundamental assumption: that the number of potential keys is so large that it...
متن کاملCryptanalysis of Transposition Ciphers with Long Key Lengths Using an Improved Genetic Algorithm
In Today's world, with increasing usage of computer networks and internet, the importance of network, computer and information security is obvious. One of the widely used approaches for information security is Cryptography. Cryptanalysis is a way to break cryptography without having the encryption key. This paper presents an approach to the cryptanalysis of transposition ciphers using an improv...
متن کاملGenetic Algorithms, Tabu Search and Simulated Annealing: a Comparison between Three Approaches for the Cryptanalysis of Transposition Cipher
Due to increasing incidents of cyber attacks, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on genetic algorithm, tabu search & simulated annealing to break a transposition ci...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2014