An Evolutionary Approach for the Playfair Cipher Cryptanalysis

نویسنده

  • G. Negara
چکیده

In this paper we describe the Playfair substitution cipher and we propose an evolutionary algorithm for Playfair’s cryptanalysis. The structural properties of the cipher and its enciphering rules determine the suitability of an evolutionary, genetic-like approach for the cipher’s cryptanalysis. Classical cryptographic ciphers like Playfair are no longer used in practice, but evolutionary approaches as the one we propose can be used for modern cryptographic ciphers/algorithms analysis in order to study cryptographic operations, components or modules and for avoiding time consuming approaches like exhaustive enumerations of search spaces (e.g. keys spaces).

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Novel Approach to Security using Extended Playfair Cipher

The well known multiple letter encryption cipher is the Playfair cipher. Here the digrams in the plaintext are treated as single units and converted into corresponding cipher text digrams. However because of the drawbacks inherent in the 5*5 Playfair cipher which adversely affects the security we proposed an 8*8 Playfair cipher. For details one can refer to [1]. This paper analyses the new prop...

متن کامل

Analysis of Modified Substitution Encryption Techniques

-In this paper we present some new approach for security enhancement of well known classical substitution cipher (Playfair and Hill cipher). Some drawback inherent the 5x5 Playfair cipher which adversely affect the security of this cipher and also Hill Cipher that succumbs to the known-plaintext attack .It is clear from above line due to some serious security reasons we cannot use these well kn...

متن کامل

Improving Security Using Refined 16 X 16 Playfair Cipher for Enhanced Advanced Encryption Standard (AES)

The conventional playfair cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. This work proposes an improved playfair encryption and decryption that will be hard to break by brute force procedure. It uses a 16 X 16 arrays of ASCII characters ensuring relevance in all computing fields instead of the conventional 26 upper case alphabets substi...

متن کامل

Impossible Differential Cryptanalysis on Deoxys-BC-256

Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round...

متن کامل

Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher

Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012