Cryptanalysis of SDES Using Genetic and Memetic Algorithms

被引:7
作者
Dworak, Kamil [1 ,3 ]
Nalepa, Jakub [2 ,3 ]
Boryczka, Urszula [1 ]
Kawulok, Michal [2 ,3 ]
机构
[1] Univ Silesia, Sosnowiec, Poland
[2] Silesian Tech Univ, Gliwice, Poland
[3] Future Proc, Gliwice, Poland
来源
RECENT DEVELOPMENTS IN INTELLIGENT INFORMATION AND DATABASE SYSTEMS | 2016年 / 642卷
关键词
Memetic algorithm; Genetic algorithm; Cryptanalysis; SDES;
D O I
10.1007/978-3-319-31277-4_1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
In this paper, we exploit evolutionary algorithms for cryptanalysis and we focus on a chosen-plaintext attack model, in which the attacker is able to access both the ciphertext and the plaintext. The aim of this attack is to determine the decryption key for the Simplified Data Encryption Standard, so that other encrypted texts can be easily deciphered. We propose to extract the key using genetic and memetic algorithms (the latter being a hybrid of the evolutionary techniques and some refinement procedures). An extensive experimental study, coupled with the sensitivity analysis on method components and statistical tests, show the convergence capabilities of our approaches and prove they are very competitive compared with other state-of-the-art algorithms.
引用
收藏
页码:3 / 14
页数:12
相关论文
共 21 条
[1]  
[Anonymous], CRYPTOLOGIA
[2]  
Boryczka U, 2014, LECT NOTES COMPUT SC, V8733, P623, DOI 10.1007/978-3-319-11289-3_63
[3]  
Boryczka U, 2014, LECT NOTES ARTIF INT, V8398, P147, DOI 10.1007/978-3-319-05458-2_16
[4]   Truck Loading Schedule Optimization Using Genetic Algorithm for Yard Management [J].
Cekala, Tadeusz ;
Telec, Zbigniew ;
Trawinski, Bogdan .
INTELLIGENT INFORMATION AND DATABASE SYSTEMS, PT I, 2015, 9011 :536-548
[5]  
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[6]   A Multi-Facet Survey on Memetic Computation [J].
Chen, Xianshun ;
Ong, Yew-Soon ;
Lim, Meng-Hiot ;
Tan, Kay Chen .
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION, 2011, 15 (05) :591-607
[7]  
Dworak K., 2015, LNCS IN PRESS
[8]  
Garg P., 2009, CORR
[9]  
Garici MA, 2005, LECT NOTES COMPUT SC, V3562, P31
[10]  
Kawulok M, 2012, LECT NOTES COMPUT SC, V7626, P557, DOI 10.1007/978-3-642-34166-3_61