[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2523514.2527010acmotherconferencesArticle/Chapter ViewAbstractPublication PagessinConference Proceedingsconference-collections
short-paper

Nature inspired heuristics for attack of simplified DES algorithm

Published: 26 November 2013 Publication History

Abstract

Modern ciphers constitute a challenge task for cryptanalysis algorithms due to their diversity and nonlinearity. This problem can be formulated as NP-Hard. It has long been subject to various attacks; available results, emerged many years ago remain insufficient when handling large instances due to resources requirement which increase with the size of the problem. On another side, computational intelligence represents a set of methodologies used to solve difficult optimization problems. This is mainly due to their ability to converge with acceptable resource consumption. The purpose of this paper is to provide a more detailed study of the performance of three computational metaheuristics: Particle swarm optimization, differential evolution and for a first time, genetic programing for cryptanalysis of a simplified variant of Data encryption standard algorithm. Experiments were performed to study the effectiveness of these algorithms in solving the considered problem and underline the difficulties encountered.

References

[1]
Srinivasa Rao, K. V., Rama Krishna, M. and Bujji B. D. 2009. Cryptanalysis of a Feistel Type Block Cipher by Feed Forward Neural Network Using Right Sigmoidal Signals. Int. J. of Soft Computing. 4, 3 (2009), 136--135.
[2]
Labed, S., Gherboudj, A. and Chikhi, S. 2011. A modified HPSO Algorithms for Knapsack Problem. Int. J. of Computer applications. 34, 2 (Nov. 2011), 41--47.
[3]
Shahzad, W., Siddiqui, A. B.and Khan, F. A. 2009. Cryptanalysis of Four-Rounded DES using Binary Particle Swarm Optimization. In Proceeding of the Genetic and Evolutionary Computation Conference (July 8--12, 2009). ACM, NY, 1757--1758.
[4]
Wafaa, G. A. and al. 2011. Known-Plaintext Attack of DES-16 Using Particle Swarm Optimization. In Proceeding of The 3rd World Congress on Nature and Biologically Inspired Computing (NaBIC2011), 12--16.
[5]
Vimalathithan, R., Valarmathi, M. L. 2011. Cryptanalysis of DES using Computational Intelligence. European Journal of Scientific Research, 55, 2 (2011), 237--244.
[6]
Jadon, S. S. and al. 2011. Application of Binary Particle Swarm Optimization in Cryptanalysis of DES. In Proceeding of the International Conference on Soft Computing for Problem Solving, (Dec. 20--22, 2011), 1061--1071.
[7]
Pandey, S., Mishra, M. Particle Swarm Optimization in Cryptanalysis of DES, Int. J. of Advanced Research in Computer Engineering & Technology1, 4 (June 2012), 379--381.
[8]
Laskari, E. C. and al. 2007. Applying evolutionary computation methods for cryptanalysis of Feistel ciphers, J. Applied Math. And Computation.184 (2007), 63--72.
[9]
Laskari, E. C. and al. 2007, Cryptography and cryptanalysis through computational intelligence. J. Studies in Computational Intelligence, 57 (2007), 1--49.
[10]
Awad, W. S. 2011. Designing Stream Cipher Systems Using Genetic Programming. In Proceeding of the 5th Int. Conf. on Learning and Intelligent Optimization. LNCS, Springer, Heidelberg, 6683, 308--320, 2011.
[11]
Olamaei, J., Nikam, T. and Garehpetian, G. B. 2008. Application of particle swarm optimization for distribution feeder reconfiguration considering distributed generators, J. AMC. 201, 1--2 (2008), 575--586.
[12]
Eberhart, R., Kennedy, J. 1995. A new optimizer using particles swarm theory. In Proceeding of the 6-th symposium on micro-machine and human science (Nagoya, Japan). IEEE, NJ, 39--43.
[13]
Storn, R., Price, K. 1997. Differential evolution -- a simple and efficient heuristic for global optimization over continuous spaces. J. of Global Optimization. 11 (1997), 341--359.
[14]
Koza, J. R. 1992. Genetic Programming: On the Programming of Computers by Means of Natural Selection. MIT Press Cambridge, MA, 1992.
[15]
Banzhaf, W. and al. 1998. Genetic Programming--An Introduction: On the Automatic Evolution of Computer Programs and its Application. Morgan Kaufmann, San Francisco, CA.
[16]
Stallings, W. 2006. Cryptography and Network Security Principles and Practices. Ed. Printice Hall.
[17]
Schaefer, E. F. 1996. A Simplified Data Encryption Standard Algorithm. Cryptologia, 20, 1 (1996), 77--84.
[18]
Nelson, G., Wallis, G. and Bas, A. 2000. Exploring Natural Languag: Working with the British Component of the International Corpus of English. John Benjamins Publishing Company, Amsterdam.
[19]
Beker, H. and Piper, F. 1982. Cipher Systems: The Protection of Communications. John Wiley & Sons.
[20]
Jakobsen, T. and Knudsen, L. R. 2001. Attacks on block ciphers of low algebraic degree', J. of Cryptology. 14, 3 (Jan 2001), 197--210.
[21]
Verma, A. K., Dave, M. and Joshi. R. C. 2007. Genetic Algorithm and Tabu Search Attack on the MonoAlphabetic Subsitution Cipher in Adhoc Networks. Journal of Computer Science. 3 (3), 134--137.
[22]
Bansal, J. C. and al. 2011. Inertia Weight Strategies in Particle Swarm Optimization. In Proceeding of The 3rd World Congress on Nature and Biologically Inspired Computing (Salamanca, Spain, Oct 19--21, 2011), 633--640.
[23]
Pedersen, M. E. H. 2010. Good parameters for particle swarm optimization. Technical Report HL1001, Hvass Laboratories.
[24]
Singh, S. 1999. The code book: The Evolution of Secrecy from Mary, Queen of Scots, to Quantum Cryptography. Doubleday, New York, NY, USA, 1st edition.

Cited By

View all
  • (2021)Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic ReviewArtificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities10.1007/978-3-030-72236-4_18(449-467)Online publication date: 1-Jun-2021

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
SIN '13: Proceedings of the 6th International Conference on Security of Information and Networks
November 2013
483 pages
ISBN:9781450324984
DOI:10.1145/2523514
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Macquarie U., Austarlia
  • MNIT: Malaviya National Institute of Technology
  • Aksaray Univ.: Aksaray University
  • SFedU: Southern Federal University

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 November 2013

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Feistel ciphers
  2. cryptanalysis
  3. data encryption standard
  4. heuristics

Qualifiers

  • Short-paper

Conference

SIN '13
Sponsor:
  • MNIT
  • Aksaray Univ.
  • SFedU

Acceptance Rates

Overall Acceptance Rate 102 of 289 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)1
Reflects downloads up to 18 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2021)Metaheuristic Techniques in Attack and Defense Strategies for Cybersecurity: A Systematic ReviewArtificial Intelligence for Cyber Security: Methods, Issues and Possible Horizons or Opportunities10.1007/978-3-030-72236-4_18(449-467)Online publication date: 1-Jun-2021

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media