Cryptanalysis of Simplified-DES using Computational Intelligence

نویسنده

  • M. L. VALARMATHI
چکیده

Cryptanalysis with Computational Intelligence has gained much interest in recent years. This paper presents an approach for breaking the key used in Simplified-Data Encryption Standard (S-DES) using Genetic algorithm (GA), Particle Swarm Optimization (PSO) and a novel approach called Genetic Swarm Optimization (GSO) obtained by combining the effectiveness of GA and PSO. Ciphertext-only attack is embraced here and an optimum key is produced based on Letter Frequency analysis as Cost function. The key is optimized using the capabilities of Computational Intelligence and the experimental results indicate GSO is an effective tool which runs through less time to break the key used in S-DES and reduces the search space nearly by a factor of 6. Key-Words: Cryptanalysis, ciphertext-only attack, Genetic Algorithm, Particle Swarm Optimization , Genetic Swarm Optimization , cost, plaintext and ciphertext.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparative Analysis of DES and S-DES Encryption Algorithm Using Verilog Coding

Abstract: This paper we present a comparative analysis of Data Encryption Standard and Simplified Data Encryption Standard Algorithm and compare the result of DES and SDES encryption for improve the algorithm performance. The Xilinx Tool is used to synthesize DES and simplified DES algorithm. The performance in terms of delay, power and area of DES and Simplified DES analysed using Cadence Enc...

متن کامل

Swarm Intelligence and Evolutionary Computation based Cryptography and Cryptanalysis of 4-round DES algorithm

Over the past decade, there has been an increasing research in the application of Fuzzy Logic and Evolutionary Computation methods to problems in the field of cryptography and cryptanalysis. This is primarily due to the effectiveness of application of these methods to handle hard problems, and to the resulting automated designs pertaining to cryptanalysis of cryptosystems. This paper begins wit...

متن کامل

Overview of Linear Cryptanalysis on S-DES and Block Ciphers using Hill Cipher Method

In this paper presents the Linear Cryptanalysis on S-DES and Symmetric Block Ciphers Using Hill Cipher Method. As a vehicle of demonstration of this concept, choose simple yet representative block ciphers such as computationally tractable versions of S-DES, for the studies. The attack presented in this paper is applicable to block structure independently of the key scheduling. The attack needs ...

متن کامل

Comparative Cryptanalysis of Simplified-Data Encryption Standard Using Tabu Search and Simulated Annealing Methods

This paper presents an approach for the comparative cryptanalysis of Simple Data Encryption Standard (S-DES) using Tabu Search and Simulated Annealing methods. In this paper, cipher text only attack is adopted and varieties of optimum keys are generated based on the cost function values. The goal of this paper is three fold. First we want to make a study about how evolutionary computation techn...

متن کامل

A Performance Survey of Meta-Heuristic And Brute-Force Search Algorithms to Cryptanalysis The SDES Encryption Algorithm

For many years, cryptanalysis has been considered as an attractive topic in jeopardizing the security and resistance of an encryption algorithm. The SDES encryption algorithm is a symmetric cryptography algorithm that performs a cryptographic operation using a crypt key. In the world of encryption, there are many search algorithms to cryptanalysis. In these researches, brute force attack algori...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011