Abstract
This paper shows how evolutionary algorithms (EAs) can be used to speed up the process of cryptanalysis. The purpose of this study is to demonstrate that evolutionary algorithms can effectively be used for cryptanalysis attacks in order to obtain major speed and memory optimization. A classical transposition cipher was applied in all of the research tests in order to prove this hypothesis. All ciphertexts will be subject to cryptanalysis attacks extended by EAs.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Alba, E., Cotta, C.: Evolutionary Algorithms. Chapman & Hall/CRC, Boca Raton (2006)
Bauer, F.L.: Decrypted Secrets. Methods and Maxims of Cryptology. Springer, Heidelberg (2002)
Clark, A.J.: Optimisation Heuristics for Cryptology. PhD thesis, Information Research Centre Faculty of Information Technology Queensland (1998)
Delman, B.: Genetic Algorithms in Cryptography. Rochester Institute of Technology, Rochester (2004)
Goldberg, D.E.: Genetic Algorithms in Search Optimization, and Machine Learning. Addison-Wesley, Boston (1989)
Kahn, D.: The Code-breakers. Scribner, New York (1996)
Kenan, K.: Cryptography in the databases. The Last Line of Defense. Addison Wesley Publishing Company (2005)
Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs. Springer, London (1996)
Mishra, S., Bali, S.: Public Key Cryptography Using Genetic Algorithm. International Journal of Recent Technology and Engineering 2(2) (2013)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley (1996)
Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of a Genetic Algorithm in the Cryptanalysis of Simple Substitution Cipher. Cryptologia (January 1993)
Song, J., Yang, F., Wang, M., Zhang, H.: Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm. China University of Geosciences, China
Stinson, D.S.: Cryptography. Theory and Practice. Chapman & Hall/CRC, Taylor & Francis Group, Boca Raton (2006)
Toemeh, R., Arumugam, S.: Breaking Transposition Cipher with Genetic Algorithm. Electronics and Electrical Engineering (7(79)) (2007) ISSN 1392-1215
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this paper
Cite this paper
Boryczka, U., Dworak, K. (2014). Genetic Transformation Techniques in Cryptanalysis. In: Nguyen, N.T., Attachoo, B., Trawiński, B., Somboonviwat, K. (eds) Intelligent Information and Database Systems. ACIIDS 2014. Lecture Notes in Computer Science(), vol 8398. Springer, Cham. https://doi.org/10.1007/978-3-319-05458-2_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-05458-2_16
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05457-5
Online ISBN: 978-3-319-05458-2
eBook Packages: Computer ScienceComputer Science (R0)