CFP last date
20 January 2025
Reseach Article

The Applicability of Genetic Algorithm in Cryptanalysis: A Survey

by Asif Hameed Khan, Auqib Hamid Lone, Firdoos Ahmad Badroo
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 130 - Number 9
Year of Publication: 2015
Authors: Asif Hameed Khan, Auqib Hamid Lone, Firdoos Ahmad Badroo
10.5120/ijca2015907118

Asif Hameed Khan, Auqib Hamid Lone, Firdoos Ahmad Badroo . The Applicability of Genetic Algorithm in Cryptanalysis: A Survey. International Journal of Computer Applications. 130, 9 ( November 2015), 42-46. DOI=10.5120/ijca2015907118

@article{ 10.5120/ijca2015907118,
author = { Asif Hameed Khan, Auqib Hamid Lone, Firdoos Ahmad Badroo },
title = { The Applicability of Genetic Algorithm in Cryptanalysis: A Survey },
journal = { International Journal of Computer Applications },
issue_date = { November 2015 },
volume = { 130 },
number = { 9 },
month = { November },
year = { 2015 },
issn = { 0975-8887 },
pages = { 42-46 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume130/number9/23240-2015907118/ },
doi = { 10.5120/ijca2015907118 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:24:57.840586+05:30
%A Asif Hameed Khan
%A Auqib Hamid Lone
%A Firdoos Ahmad Badroo
%T The Applicability of Genetic Algorithm in Cryptanalysis: A Survey
%J International Journal of Computer Applications
%@ 0975-8887
%V 130
%N 9
%P 42-46
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

The Cryptanalysis has been the most fascinating area for science fraternity. The application of Genetic Algorithm (GAs) to the field of cryptanalysis is rather unique as no robust model for cryptanalysis using Genetic Algorithm exists. Genetic Algorithm (GAs) are the class of heuristic algorithm which are known for optimization and search problem. The paper presents the systematic review of Genetic Algorithm applied to the Cryptanalysis.

References
  1. Schneier,B.1996. Applied Cryptography,Second Edition:Protocols,Algorithms and Source Code in C.
  2. Delman,B.2004. Genetic Algorithm in Cryptography.Doctorol thesis,Rochester Institute of Technology.
  3. Holland,J.H.1992. Adaptation in Natural and Artificial Systems.
  4. M.Milanovic,"Solving the generalised vertex cover problem by Genetic Algorithm", Computing and Informatics,2010.
  5. H.Bhasin,M.Amini,"The applicability of Genetic Algorithm to Vertex cover", International Journal of Computer Application,2015.
  6. Bazgan,C.,Luchian,H.1995. A genetic Algorithm for maximal Clique Problem. In proceeding of the International Conference in Ales,France.
  7. H.Bhasin et al,"Hybrid Genetic algorithm for Maximum Clique Problem", International Journal of Application of Innovation in Engineering & Management,2013.
  8. H.Bhasin,Manoj,"Regression testing using Coupling and Genetic Algorithms", International Journal of Computer Science and Information Technologies,2012.
  9. H.Bhasin,N.Singla,"Genetic based algorithm for N-Puzzle problem", International Journal of Computer Application,2012.
  10. Y.Liao et al,"Evolutionary algorithm to Traveling Salesman Problems", Computer & Mathematics with Applications,2012.
  11. Kitchenham,B. et al, ”systematic literature review in software engineering”, Information and Software technology, Elsevier,2008.
  12. Bhasin,H.2015.Algorithms: Design and Analaysis.
  13. Alander.1992. On optimal population size of genetic algorithm. In Proceedings of the IEEE computer systems and software engineering.
  14. Diaz-Gomaz, Hougen.2007. Initial population for genetic algorithms: A metrics approach. In proceedings of 2007 International conference of Genetic and Evolutionary Methods.
  15. Piszcz, Soule.2006. Genetic Programming: optimal population sizes for varying complexity problems. In Proceedings of the Genetic and Evolutionary Computation Conference.
  16. Koumousis and Katsaras, “ Asaw tooth Genetic Algorithm combining the effects of variable population size and re-initialization to enhance performance”, IEEE Transaction on evolutionary computation,2006.
  17. Goldberg,D.E et al.2000. Bayesuan Optimization Algorithm, population sizing and time to convergence, University of Illinois,USA.
  18. Melanie,M.1996. An introduction to a Genetic Algorithm:MIT press paperback edition.
  19. R.Spillman etal,"Use of Genetic algorithm in the cryptanalysis of simple substitution ciphers", Cryptologia,1993.
  20. A.J.R.Matthews,"The Use of Genetic Algorithim in Crytanalysis," Cryptologia,1993.
  21. R.Spillman,"Cryptanalysis of Knapsack Ciphers using Genetic Algorithim", Cryptologia,1993.
  22. Clark,A.1994. Modern optimisation Algorithims for Cryptanalysis. In proceedings of the second Australian and New Zealand Conference on Intelligent Information Systems.
  23. Lin,F.1995. A Genetic Algorithim for Ciphertext-only attack in cryptanalysis. In proceeding of the IEEE International Conference on systems,Man and Cybernetics.
  24. A.Clark etal,"Combinational Optimization and Knapsack Cipher",Cryptologia,1996.
  25. Clark,A.etal.1996. Cryptanalysis of Polyalphabetic Substitution Ciphers using a Parallel Genetic Algorithim.In proceedings of IEEE International Symposium on Information and its Application.
  26. A.Clark,E.Dawson, "Parallel Genetic Algorithm for cryptanalysis of the polyalphabetic substitution cipher", Cryptologia,1997.
  27. Kolodziejczyk.1997. The Application of Genetic algorithm in cryptnalaysis opf Knapsack cipher. In proceeeding of the Fourth International Conference on Pattern Recognition and Information Processing.
  28. A.Clark,E.Dawson, "Optimization Heuristics for the automated cryptanalysis of classical ciphers", Journal of Combinatorial Mathematics and Combinatorial Computing,1998.
  29. Yaseen,I.F.T., Sahasrabuddhe,H.V.1998. A Genetic Algorithm for the cryptanalysis of Chor-rivest knapsack public key cryptosystem(PKC). In proceeding of the third International Conference on Computational Intelligence and Multimedia Applications
  30. Grundlingh, R.W, Vuuren, V.H.J, "Using Genetic Algorithm to break a simple cryptographic cipher", Retrieved from http://dip.sun.ac.za/nvuuren/abstracts/abstr-genetic,htm ,2003
  31. E.Ma, C.Obimbo,"An Evolutionary Computation Attack on One Round TEA",Elsevier,2011.
  32. N.Nalini, G.R.Raghavendra,"Attacks of simple block ciphers via efficient heuristics",Elsevier,2007.
  33. H.C.J.Castro, I.P.Vinuela,"New result on the genetic cryptanalysis of TEA and reduced-round versions od XTEA",New Generation Computing,2005.
  34. Song, J.et al.2007.Cryptanalysis of the two-round DES using Genetic algorithm. In proceedings of the second international conference on Advances in computation and intelligence.
  35. Bergmann, P.K.2008. Cryptanalysis using Genetic algorithm. In proceeding of tenth annual Conference on Evolutionary Computation.
  36. Oranchak,D.2008. Evolutionary algorithm for decryption of Monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems. In proceeding of the tenth annual Conference on Genetic and Evolutionary Computation.
  37. Song,J.et al.2008. Cryptanalysis of Transposition cipher using Simulated Annealing Genetic Algorithm. In proceeding of third International Symposium on Advances in Computation and Intelligence.
  38. Mekhaznia,T.2013. Nature inspired heuristics for attack of simplified DES algorithm. In proceeding of the sixth International Conference on Security of Information and Networks.
  39. R.Vimalathithan,L.M.Valarmathi, "Cryptanalysis of simplified-DES using computational intelligence",WSEAS Transactions on Computers,2011.
  40. Bhateja,A.,Kumar,S.2014. Genetic Algorithm with elitism for cryptanalysis of Vignere cipher. In proceeding of International Conference on issues and challenges in Intelligent Computing Techniques(ICICT).
  41. Luthra,J.,Pal,S.K.2011. A Hybrid Firefly algorithm using Genetic operators for the cryptanalysis of monoalphabetic substitution cipher. In proceeding of World Congress on information and Communication Technologies(WICT).
  42. Song,J.et al.2007. Cryptanalysis of Four-round DES based on Genetic Algorithm. In proceeding of International Conference on Wireless Communications, Networking and Mobile Computing.
  43. Brown,J.A.et al.2009. Genetic algorithm cryptanalysis of a substitution permutation network. In proceeding of IEEE Symposium on Computational Intelligence in Cyber Security(CICS).
  44. Omran,S,S.et al.2011. A Cryptanalytic attack on Vignere cipher using Genetic Algorithm. In proceeding of conference on Open Systems(ICOS).
  45. Omran,S.S.et al.2010. Using Genetic Algorithm to break a mono-alphabetic substitution cipher. In proceeding of IEEE Conference on Open Systems(ICOS).
  46. Nalini,N.,Rao,G.R.2006. Cryptanalysis of simplified Data Encryption Standard via optimization Heuristics. In proceeding of Third International Conference on Intelligent Sensing and information Processing(ICISIP).
  47. Li,Y.H.et al.2005. Heuristics cryptanalysis pof classical and modern ciphers. In proceeding of jointly held with IEEE Seventh Malaysia International Conference on Communication and IEEE Thirteenth International Conference on Networks.
  48. Goldberg,D.E.1989. Genetic Algorithm in search, optimization and machine learning.
Index Terms

Computer Science
Information Sciences

Keywords

Cryptanalysis Genetic Algorithm (GAs) Cryptography.