Genetic Algorithm Cryptanalysis of a Substitution Permutation Network

被引:0
作者
Brown, Joseph Alexander [1 ]
Houghten, Sheridan [1 ]
Ombuki-Berman, Beatrice [1 ]
机构
[1] Brock Univ, Dept Comp Sci, St Catharines, ON L2S 3A1, Canada
来源
IEEE SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE IN CYBER SECURITY | 2009年
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
We provide a preliminary exploration of the use of Genetic Algorithms (GA) upon a Substitution Permutation Network (SPN) cipher. The purpose of the exploration is to determine how to find weak keys. The size of the selected SPN created by Stinson[1] gives a sample for showing the methodology and suitability of an attack using GA. We divide the types of keys into groups, each of which is analyzed to determine which groups are weaker. Simple genetic operators are examined to show the suitability of GA when applied to this problem. Results show the potential of GA to provide automated or computer assisted breaking of ciphers. The GA broke a subset of the keys using small input texts.
引用
收藏
页码:115 / 121
页数:7
相关论文
共 50 条
  • [41] A genetic algorithm for cryptanalysis with application to DES-like systems
    Research Development Center, National Defense Council, Cairo, Egypt
    不详
    不详
    不详
    不详
    Int. J. Netw. Secur., 2009, 2 (177-188):
  • [42] An improved genetic algorithm for robust permutation flowshop scheduling
    Liu, Qiong
    Ullah, Saif
    Zhang, Chaoyong
    INTERNATIONAL JOURNAL OF ADVANCED MANUFACTURING TECHNOLOGY, 2011, 56 (1-4) : 345 - 354
  • [43] Hybrid genetic algorithm for optimization problems with permutation property
    Wang, HF
    Wu, KY
    COMPUTERS & OPERATIONS RESEARCH, 2004, 31 (14) : 2453 - 2471
  • [44] Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm
    Song, Jun
    Yang, Fan
    Wang, Maocai
    Zhang, Huanguo
    ADVANCES IN COMPUTATION AND INTELLIGENCE, PROCEEDINGS, 2008, 5370 : 795 - +
  • [45] Improved genetic algorithm for the permutation flowshop scheduling problem
    Iyer, SK
    Saxena, B
    COMPUTERS & OPERATIONS RESEARCH, 2004, 31 (04) : 593 - 606
  • [46] Genetic Cryptanalysis
    Mesleh, Abdelwadood
    Zahran, Bilal
    Al-Abadi, Anwar
    Hamed, Samer
    Al-Zabin, Nawal
    Bargouthi, Heba
    Maharmeh, Iman
    NETWORKED DIGITAL TECHNOLOGIES, PT 1, 2010, 87 : 321 - 332
  • [47] Multiprogramming genetic algorithm for optimization problems with permutation property
    Xing, Li-Ning
    Chen, Ying-Wu
    Shen, Xue-Shi
    APPLIED MATHEMATICS AND COMPUTATION, 2007, 185 (01) : 473 - 483
  • [48] Hybrid constrained permutation algorithm and genetic algorithm for process planning problem
    Abdullah Falih
    Ahmed Z. M. Shammari
    Journal of Intelligent Manufacturing, 2020, 31 : 1079 - 1099
  • [49] A Color Image Encryption Technique Based on a Substitution-Permutation Network
    Mastan, J. Mohamedmoideen Kader
    Sathishkumar, G. A.
    Bagan, K. Bhoopathy
    ADVANCES IN COMPUTING AND COMMUNICATIONS, PT 4, 2011, 193 : 524 - +
  • [50] Enhancing PRESENT-80 and Substitution-Permutation Network Cipher Security with Dynamic "Keyed" Permutation Networks
    Lewandowski, Matthew
    Katkoori, Srinivas
    2021 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2021), 2021, : 350 - 355