CFP last date
20 December 2024
Reseach Article

Decipherment of Substitution Cipher using Enhanced Probability Distribution

by Pratap Reddy L, Vishnu Vardhan B, Bhadri Raju MSVS, Apparao Naidu G
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 5 - Number 8
Year of Publication: 2010
Authors: Pratap Reddy L, Vishnu Vardhan B, Bhadri Raju MSVS, Apparao Naidu G
10.5120/958-1335

Pratap Reddy L, Vishnu Vardhan B, Bhadri Raju MSVS, Apparao Naidu G . Decipherment of Substitution Cipher using Enhanced Probability Distribution. International Journal of Computer Applications. 5, 8 ( August 2010), 34-40. DOI=10.5120/958-1335

@article{ 10.5120/958-1335,
author = { Pratap Reddy L, Vishnu Vardhan B, Bhadri Raju MSVS, Apparao Naidu G },
title = { Decipherment of Substitution Cipher using Enhanced Probability Distribution },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 5 },
number = { 8 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 34-40 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume5/number8/958-1335/ },
doi = { 10.5120/958-1335 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:53:45.113270+05:30
%A Pratap Reddy L
%A Vishnu Vardhan B
%A Bhadri Raju MSVS
%A Apparao Naidu G
%T Decipherment of Substitution Cipher using Enhanced Probability Distribution
%J International Journal of Computer Applications
%@ 0975-8887
%V 5
%N 8
%P 34-40
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Information theoretic approach for decipherment problems is the recent trend in cryptanalysis. The behavioral transformation of message units is addressed upto certain extent in the encryption process. However the amount of confusion and diffusion in terms of statistical distribution parameters between message and cipher text is a point of interest for cryptanalyst. In the present work we addressed this issue with the help of enhanced probability distribution function. The basic units of any message text are observed to be heuristic in nature depending on the sample. Averaging function is adopted while evaluating the enhanced probabilities of message units. The retrieved efficiency of cipher text only attack on samples of English, Hindi Telugu, Kannada is presented in this paper.

References
  1. Michael J. Wiener.: The Full Cost of Cryptanalytic Attacks. J. Cryptology Vol. 17, pp 105–124 (2004).
  2. C. E. Shannon.: A Mathematical Theory of Communication. The Bell System Technical Journal, Vol. 27, pp. 379–423, 623–656 (1948).
  3. Francois-Xavier Standaert, Gilles Piret, Jean-Jacques Quisquater. : Cryptanalysis of Block Ciphers: A Survey. UCL Crypto group Technical report, CG2003/2 pp. 1-25 (2003).
  4. B. Carter and T. Magoc.: Classical Ciphers and Cryptanalysis. Technical Report (2007).
  5. Nalini N.: Cryptanalysis of Block Ciphers via improved Simulated Annealing Technique. In proceedings of 9th International Conference on Information Technology (ICIT'06), pp 182-185 (2006).
  6. Nalini N.: Cryptanalysis of Block Ciphers via improved Simulated Annealing Technique. In proceedings of 9th International Conference on Information Technology (ICIT'06), pp 182-185 (2006).
  7. Albassall A.M.B., Wahdan A.: Genetic Algorithm cryptanalysis of a Fiestal type block cipher. Proceedings of ICEEC '04, pp. 217-221(2004).
  8. Joe Goester.: Solving Substitution Ciphers with Genetics Algorithm. A Technical Report submitted to university of Rochester, pp 1-8 (2003).
  9. Carlisle Adams.: Designing against a class of algebraic attacks on symmetric block ciphers. J. Applicable Algebra in Engineering, Communication and Computing Vol. 17, pp. 17–27 (2006).
  10. Sean Simmons.: Algebraic Cryptanalysis of Simplified AES. In J. Cryptologia, Vol. 33, pp 305–314 (2009).
  11. Ali Aydın Selçuk.: On Probability of Success in Linear and Differential Cryptanalysis. In J. Cryptology Vol. 21, pp. 131–147 (2008).
  12. Bárbara E. Sánchez Rinza, Diana Alejandra, Bigurra Zavala, Alonso Corona Chavez.: De-encryption of a text in spanish using probability and statistics. In proceedings of 18th International Conference on Electronics, Communications and Computers IEEE 2008, pp 75-77 (2008).
  13. Samuel W. Hasinoff.: Solving Substitution Ciphers. A Technical Report, University of Toronto (2003).
  14. Sujith Ravi and Kevin Knight.: Probabilistic Methods for a Japanese Syllable Cipher. In proceedings of the 22nd International Conference on Computer Processing of Oriental Languages, Lecture Notes in Artificial Intelligence Vol. 5459, pp. 270-281 (2009).
  15. Kevin Knight, Anish Nair, Nishit Rathod.: Unsupervised Analysis for Decipherment Problems. In proceedings of the COLING/ACL ,pp 499-506 (2006).
  16. Thomas Jacobsen.: A fast method for the crypt analysis of substitution ciphers. In J.Cryptologia Vol.19, Issue 3, pp 265-274 (1995).
  17. G.W.Hart.: To decode short cryptograms. In communications of ACM, Vol. 37, Issue 9, pp. 102-108 (1994).
  18. K.W. Lee, C.E. Teh, Y.L. Tan.: Decrypting English Text using enhanced frequency Analysis. In proceedings of National Seminar on Science, Technology and Social Sciences 2006 pp. 1-7 (2006)
  19. Sujith Ravi and Kevin Knight.: Attacking Decipherment Problems Optimally with Low-order N-gram Models. In proceedings of the conference on Empirical Methods in Natural Language Processing, pp. 812-819 (2009)
  20. Sujith Ravi, Kevin Knight.: Attacking Letter Substitution Ciphers with Integer Programming. In J. Cryptologia Vol. 33, Issue 4, pp. 321-334 (2009)
  21. C. E. Shannon.: Prediction and Entropy of Printed English. In the Bell System Technical Journal pp. 53-64(1951)
  22. H Yamamoto.: Information theory in cryptology. J. IEICE transactions, Vol. E 74, No.9, pp. 2456-2464 (1991)
  23. Martin E Hellman.: An Extension of the Shannon Theory Approach to Cryptography. IEEE Transactions on Information Theory, Vol. IT-23, NO. 3, pp. 289-294 (1977)
  24. Yuri Borissov and Moon Ho Lee.: Bounds on Key Appearance Equivocation for Substitution Ciphers. IEEE Transactions on Information Theory Vol. 53, No.6, pp. 2294-2296 (2007).
  25. Zhaozhi Zhang.: A Simplified Method for Computing the Key Equivocation for Additive-Like Instantaneous Block Encipherers In J. Electronic Notes in Discrete Mathematics, 21 pp. 389–391(2005)
  26. M.S.V.S.Bhadri Raju et al.: A Noval Security Model for Indic Scripts – A Case Study on Telugu. International Journal of Computer Science and Security (IJCSS, Malasya), Vol. 3, Issue 4, pp. 303-313 (2009)
  27. M.S.V.S.Bhadri Raju et al. : Effect of Language complexity on Deciphering Substitution Ciphers - A case study on Telugu. International Journal of Security and its applications (IJSIA), Vol. 4 , Issue 1, Science and Engineering Research Society(SERSC), Korea, pp. 11-20 (2010)
Index Terms

Computer Science
Information Sciences

Keywords

Cryptanalysis probability distribution Conditional probability distribution Enhanced probability distribution