Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing

Conference paper

DOI: 10.1007/978-81-322-2220-0_23

Part of the Advances in Intelligent Systems and Computing book series (AISC, volume 336)
Cite this paper as:
Mishra G., Kaur S. (2015) Cryptanalysis of Transposition Cipher Using Hill Climbing and Simulated Annealing. In: Das K., Deep K., Pant M., Bansal J., Nagar A. (eds) Proceedings of Fourth International Conference on Soft Computing for Problem Solving. Advances in Intelligent Systems and Computing, vol 336. Springer, New Delhi

Abstract

The need of an efficient encryption process has always been felt to hide the information from others during communication. In earlier days, the method of encryption was using paper and pen only and the term used for these encryption techniques was classical ciphers. Transposition cipher is one of the most popular classical ciphers. This is also called a permutation cipher where characters in the plain text are reshuffled to form a ciphertext according to a given permutation key. Various techniques apart from brute-force have been used to break transposition ciphers in ciphertext-only attack mode. These techniques mainly involve combinatorial optimization-based techniques such as hill climbing, simulated annealing, genetic algorithms and tabu search. In this paper, we have used hill climbing, simulated annealing and combination of these two for breaking transposition ciphers in ciphertext-only attack mode.

Keywords

Combinatorial optimization Cryptanalysis Cryptography Transposition cipher 

Copyright information

© Springer India 2015

Authors and Affiliations

  1. 1.SAGDefence R&D OrganizationDelhiIndia

Personalised recommendations