Abstract
The nature-inspired computational field is now being popularized as Computational Swarm Intelligence in research communities and gives a new insight in the amalgamation of nature and science. Computational swarm intelligence has also been used to solve many practical and difficult continuous and discrete optimization problems. The past decade has witnessed a lot of interest in applying computational swarm intelligence for solving crypto problems. This review paper introduces some of the theoretical aspects of Swarm Intelligence and gives a description about the various swarm based techniques and their applications for solving crypto problems.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Beni, G., Wang, J.: Swarm intelligence in cellular robotics systems. In: Proceedings of NATO Advanced Workshop on Robots and Biological System (1989)
Millonas, M.: Swarms, Phase Transitions, and Collective Intelligence. Addison-Wesley (1994)
Bela, M., Gaber, J., El-Sayed, H., Almojel, A.: Swarm Intelligence in Handbook of Bio-inspired Algorithms and Applications. Series: CRC Computer & Information Science, vol. 7. Chapman & Hall (2006). ISBN 1-58488-477-5
Menzes, A., Oorschot, V., Vanstone, S.: Handbook of Applied Cryptography. CRC Press (1996)
Stinson, D.R.: Cryptography: Theory and Practice. 3rd edn. Chapman & Hall/CRC Publication (2013)
Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Evolutionary computing based cryptanalysis—a first study. Non Linear Anal. 63(5–7), 823–830 (2005)
Blum, C., Merkle, D.: Swarm Intelligence—Introduction and Applications. Natural Computing. Springer, Berlin (2008)
Lim, C.P., Jain, L.C., Dehuri, S.: Innovations in Swarm Intelligence. Springer (2009)
Panigrahi, B.K., Shi, Y., Lim, M.H.: Handbook of Swarm Intelligence Series: Adaptation, Learning, and Optimization, vol. 7. Springer, Heidelberg (2011)
Yang, X.S., Deb, S.: Nature-Inspired Meta-Heuristic Algorithms, 2nd edn. Luniver Press, United Kingdom (2010)
Yang, X.S., Cui, Z., Xiao, R., Gandomi, A.H.: Swarm Intelligence and Bio-Inspired Computations: Theory and Applications. Elsevier (2013)
Kennedy, J., Eberhart, R.C.: A discrete binary version of the particle swarm optimization. IEEE Magazine, 4104–4108 (1997)
Khanesar, M.A.: A novel binary particle swarm optimization. In: Proceedings of 15th Mediterranean Conference on Control and Automation, Athens, Greece (2007)
Nalini, N., Rao, G.R.: Cryptanalysis of block ciphers via improvised particle swarm optimization and extended simulated annealing techniques. Int. J. Netw. Secur. 6(3), 342–353 (2008)
Yang, X.S., Deb, S.: Cuckoo search via Levy flights. In: Proceedings of World Congress on Nature & Biologically Inspired Computing (NaBIC), India. IEEE Publications, USA, pp. 210–214 (2009)
Yang, X.S., Deb, S.: Engineering optimization by cuckoo search. Int. J. Math. Modeling Numer. Optim. 1(4), 330–343 (2010)
Rajabioun, R.: Cuckoo optimization algorithm. Appl. Soft Comput. 11, 5508–5518 (2011)
Milan, T.: Cuckoo search optimization meta-heuristic adjustment. Recent Advances in Knowledge Engineering and System Science (2013). ISBN 978-1-61804-162-3
Ouaarab, A., Ahiod, B., Yang, X.S.: Discrete cuckoo search algorithm for the travelling salesman problem. Neural Comput. Appl. 24(7), 1659–1669 (2014). Springer
Sharma, T.K., Millie, Pant.: Differential operators embedded artificial bee colony algorithm. Int. J. Appl. Evol. Comput. (IJAEC), 2(3), 1–14 (2011)
Bansal, J.C., Sharma, H., Nagar, A., Arya, K.V.: Balanced artificial bee colony algorithm. Int. J. AI Soft Comput. 3(3), 222–243 (2013)
Sharma, T.K.: Performance optimization of the paper mill using opposition based shuffled frog-leaping algorithm. Int. J. Comput. Inf. Syst. Ind. Manag. Appl. 9, 173–180 (2017)
Rajpurohit, J., Sharma, T.K., Abraham, A., Vaishali: Glossary of metaheuristic algorithms. Int. J. Comput. Inf. Syst. Ind. Manag. Appl. 9, 181–205 (2017)
Stallings, W.: Cryptography and Network Security. Pearson Publications, London (2012)
Klein, A.: Stream Ciphers. Springer, London (2013)
Din, M., et al.: Cryptanalysis of geffe generator using genetic algorithm. In: Proceedings of International Conference SocProS-2013, AISC-258, pp. 509–516. Springer (2014). ISBN 978-81-322-1601-8
Ahmad, B.B., Aizaini Mohd, M.B.: Cryptanalysis using biological inspired computing approaches. Postgraduate Annual Research Seminar (2006)
Danziger, M., Henriques, M.A.: Computational Intelligence Applied on Cryptology—A Brief Review. CIBSI, Bucaramanga, Colombia (2011)
Heydari, M., Senejani, M.N.: Automated cryptanalysis of transposition ciphers using cuckoo search algorithm. Int. J. Comput. Sci. Mobile Comput. 3(1), 140–149 (2014)
Bhateja, A.K., et al.: Cryptanalysis of Vigenere cipher using cuckoo search. Appl. Soft Comput. 26, 315–324 (2015). Elsevier
Wafaa, G.A., Ghali, N.I., Hassanien, A.E., Abraham, A.: Known-plaintext attack of DES using particle swarm optimization. nature and biologically inspired computing (NaBIC). In: Third World Congress, pp. 12–16. IEEE (2011)
Din, M., et al.: Applying cuckoo search in analysis of LFSR based cryptosystem communicated to Elsevier journal. Perspect. Sci. 8, 435–439 (2016)
Sarkar, A., Mandal, J.K.: Swarm intelligence based faster public key cryptography in wireless communication (SIFPKC). Int. J. Comput. Sci. Eng.Technol. 3(7), 267–273 (2012)
Jhajharia, S., Mishra, S., Bali, S.: Public key cryptography using particle swarm optimization and genetic algorithms. Int. J. Adv. Res. Comput. Sci. Softw. Eng. 3(6), 832–839 (2013)
Sai, G.J., George Amalarethinam, D.I.: ABCRNG—swarm intelligence in public key cryptography for random number generation. Int. J. Fuzzy Math. Arch. 6(2), 177–186 (2015). ISSN 2320 –3242 (P)
Singh, A.P., Pal, S.K., Bhatia, M.P.S.: The firefly algorithm and application in cryptanalysis of mono-alphabetic substitution cipher. 1, 33–52 (2013)
Ali, N., Othaman, M.A., Hussain, M.N., Misran, M.H.: A review of firefly algorithm. ARPN J. Eng. Appl. Sci. 9(10), 1732–1736 (2014)
Pal, S.K., Rai, C.S., Singh, A.P.: Comparative study of firefly algorithm and PSO algorithm for noisy non-linear optimization problems. Int. J. Intell. Syst. Appl. 10, 50–57 (2012)
Mishra, M., Chaturvedi, U., Pal, S.K.: A multithreaded bound varying chaotic firefly algorithm for prime factorization. In: Proceedings of International Conference on IACC-2014, pp. 1322–1325. IEEE Explore (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Din, M., Pal, S.K., Muttoo, S.K. (2019). A Review of Computational Swarm Intelligence Techniques for Solving Crypto Problems. In: Ray, K., Sharma, T., Rawat, S., Saini, R., Bandyopadhyay, A. (eds) Soft Computing: Theories and Applications. Advances in Intelligent Systems and Computing, vol 742. Springer, Singapore. https://doi.org/10.1007/978-981-13-0589-4_18
Download citation
DOI: https://doi.org/10.1007/978-981-13-0589-4_18
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-13-0588-7
Online ISBN: 978-981-13-0589-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)