Swarm Intelligence and Evolutionary Computation based Cryptography and Cryptanalysis of 4-round DES algorithm

نویسندگان

  • Anjali Dadhich
  • Surendra Kumar Yadav
چکیده

Over the past decade, there has been an increasing research in the application of Fuzzy Logic and Evolutionary Computation methods to problems in the field of cryptography and cryptanalysis. This is primarily due to the effectiveness of application of these methods to handle hard problems, and to the resulting automated designs pertaining to cryptanalysis of cryptosystems. This paper begins with a brief introduction to cryptography and fuzzy-evolutionary computation methods. A short survey of the applications of these computational intelligence techniques to cryptographic problems follows, and then our contribution is presented. Specifically, we have viewed some cryptographic problems as discrete/continuous optimization problems and are addressed using Evolutionary Computation methods, particularly swarm intelligence and particle swarm optimization. Furthermore, the effectiveness of Swarm Intelligence to optimize the search space of some of the cryptographic functions is studied. Finally, theoretical issues of image cryptography are presented. The experimental results suggest that the discrete optimization problem formulation and representation are critical factors that determine the performance of Evolutionary Computation methods to cryptography. Moreover, strong cryptosystems must not reveal the inherent patterns of the encrypted messages, their decryption keys and the encryption algorithm structure, it is reported that swarm intelligence and evolutionary computation methods constitute a strong measure of the cryptosystems’ security. Keywords— Cryptography, cryptanalysis, cryptosystem, evolutionary computation, computational intelligence, encryption, decryption, swarm intelligence.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

Application of Binary Particle Swarm Optimization in Cryptanalysis of DES

Feistel cipher based cryptographic algorithms like DES are very hard for the cryptanalysts as their internal structures are based on high nonlinearity and low autocorrelation. It has been shown that the traditional and brute-force type attacks are insignificant for the cryptanalysis of this type of algorithms. Swarm intelligence is an exciting new research field and shown their effectiveness, r...

متن کامل

Adaptive Rule-Base Influence Function Mechanism for Cultural Algorithm

This study proposes a modified version of cultural algorithms (CAs) which benefits from rule-based system for influence function. This rule-based system selects and applies the suitable knowledge source according to the distribution of the solutions. This is important to use appropriate influence function to apply to a specific individual, regarding to its role in the search process. This rule ...

متن کامل

MOUTH BROODING FISH ALGORITHM FOR COST OPTIMIZATION OF REINFORCED CONCRETE ONE-WAY RIBBED SLABS

In this paper, the optimum design of a reinforced concrete one-way ribbed slab, is presented via recently developed metaheuristic algorithm, namely, the Mouth Brooding Fish (MBF). Meta-heuristics based on evolutionary computation and swarm intelligence are outstanding examples of nature-inspired solution techniques. The MBF algorithm simulates the symbiotic interaction strategies adopted by org...

متن کامل

Research of Blind Signals Separation with Genetic Algorithm and Particle Swarm Optimization Based on Mutual Information

Blind source separation technique separates mixed signals blindly without any information on the mixing system. In this paper, we have used two evolutionary algorithms, namely, genetic algorithm and particle swarm optimization for blind source separation. In these techniques a novel fitness function that is based on the mutual information and high order statistics is proposed. In order to evalu...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014