Swarm Intelligence and Evolutionary Computation based Cryptography and Cryptanalysis of 4-round DES algorithm
نویسندگان
چکیده
Over the past decade, there has been an increasing research in the application of Fuzzy Logic and Evolutionary Computation methods to problems in the field of cryptography and cryptanalysis. This is primarily due to the effectiveness of application of these methods to handle hard problems, and to the resulting automated designs pertaining to cryptanalysis of cryptosystems. This paper begins with a brief introduction to cryptography and fuzzy-evolutionary computation methods. A short survey of the applications of these computational intelligence techniques to cryptographic problems follows, and then our contribution is presented. Specifically, we have viewed some cryptographic problems as discrete/continuous optimization problems and are addressed using Evolutionary Computation methods, particularly swarm intelligence and particle swarm optimization. Furthermore, the effectiveness of Swarm Intelligence to optimize the search space of some of the cryptographic functions is studied. Finally, theoretical issues of image cryptography are presented. The experimental results suggest that the discrete optimization problem formulation and representation are critical factors that determine the performance of Evolutionary Computation methods to cryptography. Moreover, strong cryptosystems must not reveal the inherent patterns of the encrypted messages, their decryption keys and the encryption algorithm structure, it is reported that swarm intelligence and evolutionary computation methods constitute a strong measure of the cryptosystems’ security. Keywords— Cryptography, cryptanalysis, cryptosystem, evolutionary computation, computational intelligence, encryption, decryption, swarm intelligence.
منابع مشابه
A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm
For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...
متن کاملApplication of Binary Particle Swarm Optimization in Cryptanalysis of DES
Feistel cipher based cryptographic algorithms like DES are very hard for the cryptanalysts as their internal structures are based on high nonlinearity and low autocorrelation. It has been shown that the traditional and brute-force type attacks are insignificant for the cryptanalysis of this type of algorithms. Swarm intelligence is an exciting new research field and shown their effectiveness, r...
متن کاملAdaptive Rule-Base Influence Function Mechanism for Cultural Algorithm
This study proposes a modified version of cultural algorithms (CAs) which benefits from rule-based system for influence function. This rule-based system selects and applies the suitable knowledge source according to the distribution of the solutions. This is important to use appropriate influence function to apply to a specific individual, regarding to its role in the search process. This rule ...
متن کاملMOUTH BROODING FISH ALGORITHM FOR COST OPTIMIZATION OF REINFORCED CONCRETE ONE-WAY RIBBED SLABS
In this paper, the optimum design of a reinforced concrete one-way ribbed slab, is presented via recently developed metaheuristic algorithm, namely, the Mouth Brooding Fish (MBF). Meta-heuristics based on evolutionary computation and swarm intelligence are outstanding examples of nature-inspired solution techniques. The MBF algorithm simulates the symbiotic interaction strategies adopted by org...
متن کاملResearch of Blind Signals Separation with Genetic Algorithm and Particle Swarm Optimization Based on Mutual Information
Blind source separation technique separates mixed signals blindly without any information on the mixing system. In this paper, we have used two evolutionary algorithms, namely, genetic algorithm and particle swarm optimization for blind source separation. In these techniques a novel fitness function that is based on the mutual information and high order statistics is proposed. In order to evalu...
متن کامل