Attacking Transposition Cipher Using Improved Cuckoo Search Ahmed Tariq Sadiq 1,a,Laith Ali 2,b Hashim Kareem 3,c

Size: px
Start display at page:

Download "Attacking Transposition Cipher Using Improved Cuckoo Search Ahmed Tariq Sadiq 1,a,Laith Ali 2,b Hashim Kareem 3,c"

Transcription

1 Attacking Transposition Cipher Using Improved Cuckoo Search Ahmed Tariq Sadiq 1,a,Laith Ali 2,b Hashim Kareem 3,c 1 Computer Science Department, University of Technology, Baghdad, Iraq 2 Electrical Eng. Department, University of Babylon, Babylon, Iraq 3 Computer Network Department, University of Babylon, Babylon,Iraq , a drahmaed_tark@yahoo.com b drlaithanzy@yahoo.com c aljobori1965@yahoo.com Article Info Received: 25 th December 2013 Accepted: 29 th January 2014 Published online:1 st March 2014 e-issn: ABSTRACT This paper presents an improved cuckoo search algorithm for automatic cryptanalysis of transposition ciphers. Transposition ciphers are a class of ciphers In which, a plaintext block is encrypted into a ciphertext block using a fixed permutation. The Improved cuckoo search(ics) algorithm is done by adding a procedure to cuckoo search(cs) steps utilizing the similarities between population strings to find the global maxima of a cost function to find the secret key. The experiments show that for lower length of ciphertext there are cases that the secret key cannot be correctly found. This is the expected behavior of all cryptanalysis methods. Experimental results showed the ability of the proposed algorithm to attack 95% of encrypted messages with different key length using transposition cipher and gave better results compare with the traditional cuckoo algorithm on the amount of key recovery and time complexity. Keywords: Transposition cipher, Cryptanalysis, Improved Cuckoo Search 1. Introduction Cryptography is the art and science of making secure communication systems. The term is derived from the Greek words: kryptos means hidden and graphos. Cryptanalysis is derived from the Greek words: kryptos, and analyein, means "to loosen" or "to untie" (Stallings 1999). It is the study of methods for obtaining the meaning of encrypted information, without access to the secret information which is normally required to do so. Cryptanalysis is the flip-side of cryptography. It is the science of cracking codes, decoding secrets (Menzes et. al. 1996). Cryptography and Cryptanalysis comprise Cryptology. In past years.many researchers in the field of cryptology and intelligent computing are interested in developing automated attacks on transposition cipher. In the literature, lot of studies can be found in this regard. However, all those works made cryptanalysis either by using classical heuristic search algorithms or by using a slightly modified/ improved version

2 of those algorithms. The property which make this cipher vulnerable, is that it is not sophisticated enough to hide the inherent properties or statistics of the language (Dimovski & Gligoroski 2003). Stochastic Optimization Algorithms (often referred to as metaheuristics") employ randomization to find near-optimal solutions to computationally intractable problems (Yang 2008). It's reasonable to assume that any problem solvable by an evolutionary algorithm can also be solved by another metaheuristic. Recently, a novel metaheuristic technique, called Cuckoo Search (CS), based on cuckoo bird s behavior has been developed by Yang and Deb 2009 (Yang & Deb 2009). CS algorithm was developed to solve unconstrained optimization problems, where its performance was compared with the performance of the genetic algorithm (GA) and particle swarm optimization (PSO). Simulations and comparison have shown that CS is superior to these algorithms for multimodal objective functions (Brajevic, et. al. 2012). This article presents the automatic cryptanalysis of typical transposition Cipher based on improved cuckoo search algorithm by adding a new sub procedure to cuckoo steps by exploiting the similarities between population vectors (nests). The paper is organized as follows. A brief introduction is given in section 1. A brief discussion of transposition cipher is given in section 2. Section 3 discusses the cryptanalysis, A discussion on related work presented in section 4. The details and a discussion of cuckoo search algorithm given in section 5. The proposed improved algorithm and results section 6 and 7 respectively, lastly the conclusion in the section Transposition Ciphers The concept of transposition is an important one and is widely used in the design of modern ciphers, as will be seen in subsequent sections. Note that the key must provide sufficient information to unscramble the ciphertext (Menzes et. al. 1996). A transposition or permutation cipher works by breaking a message into fixed size blocks, and then permuting the characters within each block according to a fixed permutation, say P. The key to the transposition cipher is simply the permutation P. So, the transposition cipher has the property that the encrypted message i.e. the ciphertext contains all the characters that were in the plaintext message. In other words, the unigram statistics for the message are unchanged by the encryption process (Giddy & Safavi-Naini 1994). The size of the permutation is known as the period. Let's consider an example of a transposition cipher with a period of six 6, and a key P={4,2,1,5,6,3}. In this case, the message is broken into blocks of six characters, and after encryption the fourth character in the block will be moved to position 1, the second remains in position 2, the first is moved to position 3, the fifth to position 4, the sixth to position 5 and the third to position 6. In fig.1 is shown the key and the encryption process of the previously described transposition cipher. It can be noticed that the random string "X" was appended to the end of the message to enforce a message length, which is a multiple of the block size. It is also clear that the decryption can be achieved by following the same process as encryption using the "inverse" of the encryption permutation. In this case the decryption key, P -1 is equal to {3,2,6,1,4,5}. 23

3 KEY: Plaintext: Ciphertext: ENCRYPTION: Position: Plaintext: HOW_ARE_YOUX Ciphertext _OHARWO_RUXY Fig. 1: Example Of Transposition Cipher Encryption And Decryption Process 3. Cryptanalysis for Classical Cipher The study of principles and methods of transforming an unintelligible message back into an intelligible message without knowledge of the key, also called code breaking. The previous studies show that Each language has characteristics that aid successful cryptanalysis methods, for example each character in English language has specific probability on the text. in most languages letters are not equally common e is by far the most common letter requencies On the basis of the probabilities, Baker and Piper partition the 26 letters into five groups as follows (Dimovski & Gligoroski 2003) (Giddy & Safavi-Naini 1994): 1. E, having probability about T, A, O, I, N, S, H, R, each having probabilities between 0.06 and D, L, each having probabilities around C, U, M, W, F, G, Y, P, B, each having probabilities between and V, K, J, X, Q, Z, each having probabilities less than It also be useful to consider sequences of two or three consecutive letters called digrams and trigrams, respectively. The 30 most common digrams are (in decreasing order) TH, HE, IN, ER, AN, RE, ED, ON, ES, ST, EN, AT, TO, NT, HA, ND, OU, EA, NG, AS, OR, TI, IS, ET, IT, AR, TE, SE, HI, and OF Fig. 2 show digrams frequency in English language. The twelve most common trigrams are (in decreasing order) THE ING, AND, HER, ERE, ENT, THA, NTH, WAS, ETH, FOR, and DTH. BT: CG: TX: XW: ZE: CP: PB: PZ: GB: GS: RG: WZ: XA: XC: ZG: ZU: BX: ER: GX: JX: Fig. 2: Frequently Occurring Digrams In The Ciphertext One potential problem when using frequency analysis to score the fitness of candidate keys is the chance to encounter a local maximum. This can happen when a particular key's 24

4 decryption of a particular ciphertext resembles English to a certain extent, and every small mutation that would bring the key closer to the correct key would result in analysis-based fitness scores that are actually worse. The problem of local maxima Fig. 3, plagues much research with Stochastic Optimization Algorithms, and using them for cryptanalysis on transposition ciphers is no exceptions (Hilton 2012). Fig. 3: Local Maxima Illustration From A great deal of the work in the field of metaheursitics is an attempt to reduce or remove the problem of local maxima from the search process. Here in this work is good step toward reduce the local maxima. 4. Related Work Much research has already been done to investigate the efficiency of performing automated cryptanalysis against transposition ciphers or substitution cipher using Stochastic Optimization Algorithms. Though by no means exhaustive, below is a sampling of some of this work. In the literature, lot of studies can be found in this regard. However, all those works made cryptanalysis either by using classical heuristic search algorithms or by using a slightly modified/ improved version of those algorithms 1993 robert Mathews andrew clark &ts and sa 2003 dimovski 2003 ant colony russel 2005 scatter search garici 2007 toemeh. genetic algorithm.breaking transposition has been carried out by many researchers. Methew (Mathew 1993) presented an attack on transposition cipher using genetic algorithm. Giddy and Safavi-Naini (Giddy & Safavi-Naini 1994) have published an attack on the transposition cipher using simulated annealing. Russell (Russell et. al. 2003) presented an attack on transposition cipher using ant colony. Garg P. (Garg 2005) proposed a cryptanalysis method based on genetic algorithm, tabu search & simulated annealing to break a transposition cipher. Toemeh (Toemeh & Arumugam 2007) presented an attack on transposition cipher using genetic algorithm. Werner R. Grundlingh (2007) presented an 25

5 attack on the simple cryptographic cipher using genetic algorithm compare with (Toemeh, R. & Arumugam, S. 2007) (Uddin & Youssef 2006) (Dimovski & Gligoroski 2003), an improved particle swarms used in (Salih et. al. 2009) to cryptanalyse transposition ciphers. 5. Cuckoo Search Cuckoo search (CS) was inspired by the obligate brood parasitism of some cuckoo species by laying their eggs in the nests of other host birds (of other species). Some host birds can engage direct contest with the infringing cuckoos. For example, if a host bird discovers the eggs are not their own, it will either throw these alien eggs away or simply abandon its nest and build a new nest elsewhere. In addition, the timing of egg-laying of some species is also amazing. Parasitic cuckoos often choose a nest where the host bird just laid its own eggs. In general, the cuckoo eggs hatch slightly earlier than their host eggs. Once the first cuckoo chick is hatched, the first instinct action it will take is to evict the host eggs by blindly propelling the eggs out of the nest, which increases the cuckoo chick s share of food provided by its host bird. Studies also show that a cuckoo chick can also mimic the call of host chicks to gain access to more feeding opportunity (Yang & Deb 2009). In nature, animals search for food in a random manner. In general, the foraging path of an animal is effectively a random walk because the next move is based on the current location/state and the transition probability to the next location. Which direction it chooses depends implicitly on a probability which can be modeled mathematically. Various studies have shown that the flight behavior of many animals and insects has demonstrated the typical characteristics of Levy flights (Bacanin 2012). CS is based on three idealized rules (Bacanin 2012): -Each cuckoo lays one egg at a time, and dumps its egg in a randomly chosen nest. -The best nests with high quality of eggs will carry over to the next generation. -The number of available host nests is fixed, and the egg laid by a cuckoo is discovered by the host bird with a probability P a ϵ (0, 1) discovering operate on some set of worst nests, and discovered solutions dumped from further calculations. An important issue is the applications of Levy flights and random walks in the generic equation for generating new solutions. When generating new solutions : where α > 0 is the step size which should be related to the scales of the problem of interests. In most cases, we can use α = 1. The Levy flight essentially provides a random walk while the random step length is drawn from a Levy distribution. which has an infinite variance with an infinite mean. Here the steps essentially form a (1) (2) 26

6 random walk process with a power-law step-length distribution with a heavy tail. Some of the new solutions should be generated by Levy walk around the best solution obtained so far, this will speed up the local search. However, a substantial fraction of the new solutions should be generated by far field randomization and whose locations should be far enough from the current best solution, this will make sure the system will not be trapped in a local optimum (Hilton 2012). The basic steps of the Cuckoo Search (CS) can be summarized as the pseudo code shown as below (Yang & Deb 2009). Input: problem initial parameters Output: The best of solutions Start Objective function f(x), x= (x 1,x 2 x u ) T Generating initial population (pop) of n host nests x i (i=1,2, n) While (t<maxgenerations) and (!stop criterion) Get a cuckoo randomly via Lévy flights Evaluate its fitness F i If( f j > F i ) Replace j by the new solution; Fraction p ɑ of worse nests are abandoned and new nests are being built; Keep the best solutions or nests with quality solutions; Rank the solutions and find the current best End while Post process and visualize results End Here the consecutive jumps/steps of a cuckoo essentially form a random walk process which obeys a power-law step-length distribution with a heavy tail. In addition, a fraction p a of the worst nests can be abandoned so that new nests can be built at new locations by random walks and mixing. The mixing of the eggs/solutions can be performed by random permutation according to the similarity/difference to the host eggs (Yang & Deb 2009). 6. The Improved Cuckoo Search Algorithm (ICS) This section describes the improved optimization heuristics for attacks the transposition cipher using improved cuckoo search. Also, a method of evaluate intermediate solutions, in the search for the optimum, is discussed. Fig.5 show the steps of the improved cuckoo search 6.1 Representation of a Candidate Solution In this proposed attack of the transposition cipher, the solution key is permutation form, the position of a digit in the permutation means the order or sequence of the key is scheduled. The main emphasis is placed on how to develop an alternative method for the permutation key by utilizing the features of cuckoo search. The presented attack technique define the position vector of a egg represents a feasible solution, that is to say, the position vector means the permutation of the solution key and specifies the order of key to be executed. 27

7 For the purpose of this study, a key for decoding a cipher is given by an ordered list of the d digits to represent the key (permutation). 6.2 Fitness Function Assessment All metaheuristic search algorithm specially population based need fitness to help guide their search toward best new generations.here the fitness function derived from language statistics (Dimovski & Gligoroski 2003), where The candidate keys is to compare n-gram statistics of the decrypted message with those of the language (which are assumed known). Eq.3 is a general formula used to determine the suitability of a proposed key. (3) K is known as language statistics. In this paper English language is used. b and t are the bigram (2-gram)and trigram (3-gram) statistics. A denotes language alphabet (i.e. for English language A Z). D is the decrypted message statistics b and t are the bigram (2-gram) and trigram (3-gram) statistics. The values of and allow assigning of different weights to each of the two n-gram types (i.e. bigram and trigram). The range of and are [0, 100]. In the process of determining the cost associated with a transposition cipher key the proposed key (i.e. evaluate particle i) is used to decrypt the ciphertext and then the statistics of the decrypted message are then compared with statistics of the language. Where the unigram frequency are ignored when evaluating a key in Eq Improved Cuckoo Search pseudo code : The following steps represent the main steps of the improved Cuckoo Search algorithm: Input: problem initial parameters Output: The best of solutions Start Objective function f(x), x= (x 1,x 2 x u ) T Generating initial population (pop) of n host nests x i (i=1,2, n) While (t<maxgenerations) and (!stop criterion) Move a cuckoo randomly via Lévy flights Evaluate its fitness F i Randomly choose nest among n available nests (for example j) If( f j > F i ) Replace j by the new solution; Fraction p ɑ of worse nests are abandoned and new nests are being built; Keep the best solutions or nests with quality solutions; /* build the similarity matrix between nests */ MAT []=null; For each nest in pop 28

8 For each digit in nest Increase MAT[nest(k),sol(k+1)] by 1 End for Round last digit with first digit in current nest End for Best=[] For each row in MAT find the higher value and take its Indices i,j Best =Best best of MAT(i, j) End for Evaluate this best solution But the best in pop Rank the solutions and find the current best End while Post process and visualize results End For more illustration about similarity between nests and how it measure for example take the nests (keys) [6,3,5,2,4,1];[5,2,1,6,4,3];[3,1,5,2,6,4] note that the digit 5 follow by digit 2 on all nests here this mean the MAT[5,2]=3 it mean that digit 2 have high priority to come after digit 5 and so on. 7. Experimental Results Results of applying improved cuckoo search algorithm on cryptanalysis transposition cipher system are offered in this part. Mentioned algorithm is executed in a system, with CPU Core i3, 2.30GHz with 4GB RAM capacity, using Visual Basic.Net 2010 programming language, utilized results that come from ICS are compared with the same results in traditional CS. Different permutations (keys), ciphertexts with different lengths are experimented. The results show that the behavior of the improved algorithm increasing the convergence rate more than traditional cuckoo algorithm.. All Case studies s are executed in MCS and CS at the same conditions in 200 generations, and the best created amounts by them are compared. Superiority of improved cuckoo search and its stability comparing with CS can be seen Fig. 4. The parameters are set as follows: itermax=1000, p ɑ =0.25, σ=0.2,. To avoid the influence of random algorithm every experiment is run respectively 200 trials. Statistical results such as in table 1. Table 1 show Experimental results under different ciphertext sizes and corresponding key length. 29

9 Fig. 4: Average Fitness Function For CS & ICS Using Different Key Lengths For each key (nest) the Statistical Analys of letter frequencies of a decrypted ciphertext is done. Afterwards compare the letter frequencies with those of the English language ( target). Table.1: Solved Key Versus Amount of Ciphertext for Deferent Transposition Size Ciphertext Length Decryption key recovered Key length Characters The experiment showed also showed that the population must be increase with the key length. Table 2 show experiment when the cipher text size is stable and the population size variable. Table.2: Solved Keys Versus Population Size (Nests) for Stable Ciphertext Size Ciphertext Decryption key size recovered Length=2000 Key length Popsize

10 Thus the time cost increase with the largest secret keys Table 3 illustrate required time to break transposition cipher with 2000 letters for different sizes Table 3. Required Time to Break Transposition Cipher with 2000 Letters for Different Sizes Key length (Digits) Time (Seconds) Conclusions The paper introduce improved CS attack on the transposition cipher,similarity between keys are exploited to reduce local maxima and used to generate candidate secret keys and choice the correct one (secret key) to break the ciphertext and to recover the plaintext. Experimental results show that the improved cuckoo search is efficient in determining the optimal choice of key to find the plaintext. The number of possible visited keys required for breaking the key (i.e. recover plaintext) is less than the number of possible visited keys required in the Brute Force attack, because the number of possible visited keys possible keys for a transposition cipher with N key size is N factorial. Quick convergence toward the global optimum response, low possibility of difficulty in local optimum points, and general movement of population toward the better points via destroying the improper responses are some advantages of mentioned algorithm. improved cuckoo search can be utilized in future to attack another cipher systems and can be used to solve more general problems tsp problem variants. In summary, modified cuckoo search greatly facilities cryptanalysis of transposition ciphers and provides a potentially powerful method for analyzing more sophisticated ciphers. References Bacanin, N. (2012). Implementation and Performance of an Object-Oriented Software system for Cuckoo Search Algorithm, International journal of mathematics and computers in simulation Issue 1, Volume 6. Brajevic, I., Tuba, M. & Bacanin, N (2012). Multilevel Image Thresholding Selection Based on the Cuckoo Search Algorithm Advances in Sensors, Signals, Imaging and Simulation. Dimovski, A. & Gligoroski, D. (2003). Attacks on the Transposition Ciphers Using Optimization Heuristics, Proceedings of ICEST 2003, October 2003, Sofia, Bulgaria. Garg P, (2005) Genetic Algorithms, Tabu Search and Simulated Annealing: A Comparison between Three Approaches for the Cryptanalysis of Transposition Cipher,Journal of Theoretical and Applied Information Technology Giddy, J. P. & Safavi-Naini, R. (1994). Automated Cryptanalysis of Transposition Ciphers, the Computer Journal, Vol. 37, No. 5. Hilton, Rod (2012). Automated Cryptanalysis of Monoalphabetic Substitution Ciphers Using Stochastic Optimization Algorithms Menezes, A., Oorschot, P. Van & Vanstone, S. (1996). Handbook of Applied 31

11 Cryptography, CRC Press. Methew, R. (1993). The Use of Genetic Algorithms in Cryptanalysis, Cryptologia, Vol. 7, No. 4 April 1993, pp Russell, M. D., Clark, J. A. & Stepney, S. (2003). Making the Most of Two Heuristics: Breaking Transposition Ciphers with Ants Evolutionary Computation, CEC 03, Vol.4, Dec. 2003, pp Salih, Hilal Hadi. Sadiq, Ahmed Tariq. & Ali, Ismail Khalil. (2009). Attack on the Transposition Ciphers Using Particle Swarm Optimization, 1st Conference of Software Eng., University of Technology, Baghdad, Iraq. Solso, R., Barbuto, P. & Juel, C., (1979). Bigram and Trigram Frequencies and Versatilities in the English Language, Behavior Research Methods 11. Stallings, W. (1999). Cryptography and Network Security, 2 nd Edition, Prentice Hall. Toemeh, R. & Arumugam, S. (2007). Breaking Transposition Cipher with Genetic Algorithm, Electronics and Electrical Engineering, No. 7(79), pp Werner R. Grundlingh and Vuuren Jan H. Van(2007), Using genetic algorithms to break a simple cryptographic cipher, accessed in Uddin, M. F. & Youssef, A. M. (2006). Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization, IEEE Congress on Evolutionary Computation, Vancouver, BC, Canada, July Yang, X. (2008). Nature-Inspired Metaheuristic Algorithms, Luniver Press, UK. Yang, X. S. & Deb, S. (2009), Cuckoo Search via Lévy Flights, in Proc. of World Congress on Nature & Biologically Inspired Computing, pp

PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER

PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER Journal of Al-Nahrain University Vol13 (4), December, 2010, pp211-215 Science PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER Sarab M Hameed * and Dalal N Hmood ** * Computer

More information

GENETIC ALGORITHMS, TABU SEARCH AND SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER

GENETIC ALGORITHMS, TABU SEARCH AND SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER GENETIC ALGORITHMS, TABU SEARCH AND SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER POONAM GARG Institute of Management Technology, INDIA E-mail:

More information

CHAPTER 2 LITERATURE SURVEY

CHAPTER 2 LITERATURE SURVEY 27 CHAPTER 2 LITERATURE SURVEY 2.1 INTRODUCTION There have been many researches done on genetic algorithms and their application to various problems, there are relatively few papers that apply genetic

More information

An object-oriented software implementation of a novel cuckoo search algorithm

An object-oriented software implementation of a novel cuckoo search algorithm An object-oriented software implementation of a novel cuckoo search algorithm Nebojsa BACANIN Faculty of Computer Science University Megatrend Belgrade Bulevar umetnosti 29 SERBIA nbacanin@megatrend.edu.rs

More information

A Multi-objective Binary Cuckoo Search for Bicriteria

A Multi-objective Binary Cuckoo Search for Bicriteria I.J. Information Engineering and Electronic Business, 203, 4, 8-5 Published Online October 203 in MECS (http://www.mecs-press.org/) DOI: 0.585/ijieeb.203.04.02 A Multi-objective Binary Cuckoo Search for

More information

Automated Test Data Generation Using Cuckoo Search and Tabu Search (CSTS) Algorithm

Automated Test Data Generation Using Cuckoo Search and Tabu Search (CSTS) Algorithm J. Intell. Syst. 21 (2012), 195 224 DOI 10.1515/jisys-2012-0009 de Gruyter 2012 Automated Test Data Generation Using Cuckoo Search and Tabu Search (CSTS) Algorithm Praveen Ranjan Srivastava, Rahul Khandelwal,

More information

A COMPARISON OF MEMETIC & TABU SEARCH FOR THE CRYPTANALYSIS OF SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM

A COMPARISON OF MEMETIC & TABU SEARCH FOR THE CRYPTANALYSIS OF SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM 5-8 JATIT. All rights reserved. A COMPARISON OF MEMETIC & TABU SEARCH FOR THE CRYPTANALYSIS OF SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM Poonam Garg Associate Prof., Department of Information Technology,

More information

A Binary Model on the Basis of Cuckoo Search Algorithm in Order to Solve the Problem of Knapsack 1-0

A Binary Model on the Basis of Cuckoo Search Algorithm in Order to Solve the Problem of Knapsack 1-0 22 International Conference on System Engineering and Modeling (ICSEM 22) IPCSIT vol. 34 (22) (22) IACSIT Press, Singapore A Binary Model on the Basis of Cuckoo Search Algorithm in Order to Solve the Problem

More information

Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher

Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher Cihan University, First International Scientific conference 204 Cihan University. All Rights Reserved. Research Article Using Genetic Algorithm to Break Super-Pascal Knapsack Cipher Safaa S Omran, Ali

More information

Proposal of Tabu Search Algorithm Based on Cuckoo Search

Proposal of Tabu Search Algorithm Based on Cuckoo Search Proposal of Tabu Search Algorithm Based on Cuckoo Search Ahmed T. Sadiq Al-Obaidi Department of Computer Sciences University of Technology Baghdad, Iraq Ahmed Badre Al-Deen Majeed Quality Assurance Department

More information

Deciphering of Transposition Ciphers using Genetic Algorithm

Deciphering of Transposition Ciphers using Genetic Algorithm 41 Deciphering of Transposition Ciphers using Genetic Algorithm 1 Alok Singh Jadaun, 2 Vikas Chaudhary, 3 Lavkush Sharma, 4 Gajendra Pal Singh 1, 2 Department Of Computer Science & Engineering Bhagwant

More information

USING GENETIC ALGORITHMS TO BREAK A SIMPLE TRANSPOSITION CIPHER

USING GENETIC ALGORITHMS TO BREAK A SIMPLE TRANSPOSITION CIPHER USING GENETIC ALGORITHMS TO BREAK A SIMPLE TRANSPOSITION CIPHER A. S. AL-KHALID S. S. OMRAN Dalal. A. HAMMOOD mudariben@yahoo.com Omran_Safaa@ymail.Com Alsaady_Dalal@Yahoo.Com Foundation Of Technical Education

More information

Particle Swarm Optimization Artificial Bee Colony Chain (PSOABCC): A Hybrid Meteahuristic Algorithm

Particle Swarm Optimization Artificial Bee Colony Chain (PSOABCC): A Hybrid Meteahuristic Algorithm Particle Swarm Optimization Artificial Bee Colony Chain (PSOABCC): A Hybrid Meteahuristic Algorithm Oğuz Altun Department of Computer Engineering Yildiz Technical University Istanbul, Turkey oaltun@yildiz.edu.tr

More information

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái

Cryptography and Network Security 2. Symmetric Ciphers. Lectured by Nguyễn Đức Thái Cryptography and Network Security 2. Symmetric Ciphers Lectured by Nguyễn Đức Thái Outline Symmetric Encryption Substitution Techniques Transposition Techniques Steganography 2 Symmetric Encryption There

More information

Exploring Cryptography Using CrypTool

Exploring Cryptography Using CrypTool NEMATYC 2018 Exploring Cryptography Using CrypTool Valeria D Orazio Massachusetts Maritime Academy Importance of Cryptography 1998 Project start Originated as an internal business application for information

More information

A CRITICAL REASSESSMENT OF EVOLUTIONARY ALGORITHMS ON THE CRYPTANALYSIS OF THE SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM

A CRITICAL REASSESSMENT OF EVOLUTIONARY ALGORITHMS ON THE CRYPTANALYSIS OF THE SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM A CRITICAL REASSESSMENT OF EVOLUTIONARY ALGORITHMS ON THE CRYPTANALYSIS OF THE SIMPLIFIED DATA ENCRYPTION STANDARD ALGORITHM ABSTRACT Fabien Teytau and Cyril Fonlupt University Lille Nord de France, Calais,

More information

Computational Intelligence Applied on Cryptology: a Brief Review

Computational Intelligence Applied on Cryptology: a Brief Review Computational Intelligence Applied on Cryptology: a Brief Review Moisés Danziger Marco Aurélio Amaral Henriques CIBSI 2011 Bucaramanga Colombia 03/11/2011 Outline Introduction Computational Intelligence

More information

Hybrid Cuckoo Search Algorithm based on Powell Search for Constrained Engineering Design Optimization

Hybrid Cuckoo Search Algorithm based on Powell Search for Constrained Engineering Design Optimization Hybrid Cuckoo Search Algorithm based on Powell Search for Constrained Engineering Design Optimization WEN LONG Guizhou University of Finance and Economics Guizhou Key Laboratory of Economics System Simulation

More information

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES

International Journal for Research in Applied Science & Engineering Technology (IJRASET) Performance Comparison of Cryptanalysis Techniques over DES Performance Comparison of Cryptanalysis Techniques over DES Anupam Kumar 1, Aman Kumar 2, Sahil Jain 3, P Kiranmai 4 1,2,3,4 Dept. of Computer Science, MAIT, GGSIP University, Delhi, INDIA Abstract--The

More information

Classical Encryption Techniques. CSS 322 Security and Cryptography

Classical Encryption Techniques. CSS 322 Security and Cryptography Classical Encryption Techniques CSS 322 Security and Cryptography Contents Terminology and Models Requirements, Services and Attacks Substitution Ciphers Caesar, Monoalphabetic, Polyalphabetic, One-time

More information

Cryptanalysis of Homophonic Substitution- Transposition Cipher

Cryptanalysis of Homophonic Substitution- Transposition Cipher San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Spring 2014 Cryptanalysis of Homophonic Substitution- Transposition Cipher Jeffrey Yi Follow this and

More information

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment

CLASSICAL CRYPTOGRAPHY. A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY A Brief Reference for Self Build Crypto assignment CLASSICAL CRYPTOGRAPHY Cryptography is the study of secret (crypto-) writing (-graphy) Concerned with developing algorithms which

More information

CLUSTERING CATEGORICAL DATA USING k-modes BASED ON CUCKOO SEARCH OPTIMIZATION ALGORITHM

CLUSTERING CATEGORICAL DATA USING k-modes BASED ON CUCKOO SEARCH OPTIMIZATION ALGORITHM ISSN: 2229-6956 (ONLINE) ICTACT JOURNAL ON SOFT COMPUTING, OCTOBER 2017, VOLUME: 08, ISSUE: 01 DOI: 10.21917/ijsc.2017.0218 CLUSTERING CATEGORICAL DATA USING k-modes BASED ON CUCKOO SEARCH OPTIMIZATION

More information

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore

CSE 484 / CSE M 584 Computer Security. TA: Jared Moore CSE 484 / CSE M 584 Computer Security TA: Jared Moore jlcmoore@cs Logistics Lab #1 due next Friday Today: Lab 1 questions. Authentication grab bag. (if time) Cryptography Password Salting Servers shouldn

More information

Cryptanalysis. Ed Crowley

Cryptanalysis. Ed Crowley Cryptanalysis Ed Crowley 1 Topics Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types 2 Cryptanalysis Science of cracking ciphers and codes, decoding secrets,

More information

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext

CRYPTOLOGY KEY MANAGEMENT CRYPTOGRAPHY CRYPTANALYSIS. Cryptanalytic. Brute-Force. Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext CRYPTOLOGY CRYPTOGRAPHY KEY MANAGEMENT CRYPTANALYSIS Cryptanalytic Brute-Force Ciphertext-only Known-plaintext Chosen-plaintext Chosen-ciphertext 58 Types of Cryptographic Private key (Symmetric) Public

More information

Cryptography ThreeB. Ed Crowley. Fall 08

Cryptography ThreeB. Ed Crowley. Fall 08 Cryptography ThreeB Ed Crowley Fall 08 Cryptanalysis History Modern Cryptanalysis Characterization of Cryptanalysis Attacks Attack Types Cryptanalysis. Science of cracking ciphers and codes, decoding secrets,

More information

Evolutionary Computation Algorithms for Cryptanalysis: A Study

Evolutionary Computation Algorithms for Cryptanalysis: A Study Evolutionary Computation Algorithms for Cryptanalysis: A Study Poonam Garg Information Technology and Management Dept. Institute of Management Technology Ghaziabad, India pgarg@imt.edu Abstract The cryptanalysis

More information

Experiments on Cryptanalysing Block Ciphers via Evolutionary Computation Paradigms

Experiments on Cryptanalysing Block Ciphers via Evolutionary Computation Paradigms Experiments on Cryptanalysing Block Ciphers via Evolutionary Computation Paradigms Nalini N Department of Computer Science and Engineering, Siddaganga Institute of Technology, Tumkur 572103, Karnataka,

More information

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography

2/7/2013. CS 472 Network and System Security. Mohammad Almalag Lecture 2 January 22, Introduction To Cryptography CS 472 Network and System Security Mohammad Almalag malmalag@cs.odu.edu Lecture 2 January 22, 2013 Introduction To Cryptography 1 Definitions Cryptography = the science (art) of encryption Cryptanalysis

More information

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005

Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 Outline Basics of Data Encryption CS 239 Computer Security January 24, 2005 What is data encryption? Basic encryption mechanisms Stream and block ciphers Characteristics of good ciphers Page 1 Page 2 Data

More information

PARTICLE Swarm Optimization (PSO), an algorithm by

PARTICLE Swarm Optimization (PSO), an algorithm by , March 12-14, 2014, Hong Kong Cluster-based Particle Swarm Algorithm for Solving the Mastermind Problem Dan Partynski Abstract In this paper we present a metaheuristic algorithm that is inspired by Particle

More information

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm

Multi-Level Encryption using SDES Key Generation Technique with Genetic Algorithm www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue - 8 August, 2014 Page No. 7596-7576 Multi-Level Encryption using SDES Key Generation Technique with

More information

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview

Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Introduction to Network Security Missouri S&T University CPE 5420 Cryptology Overview Egemen K. Çetinkaya Egemen K. Çetinkaya Department of Electrical & Computer Engineering Missouri University of Science

More information

Introduction to Cryptology. Lecture 2

Introduction to Cryptology. Lecture 2 Introduction to Cryptology Lecture 2 Announcements Access to Canvas? 2 nd Edition vs. 1 st Edition HW1 due on Tuesday, 2/7 Discrete Math Readings/Quizzes on Canvas due on Tuesday, 2/14 Agenda Last time:

More information

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM

ENCRYPTION USING LESTER HILL CIPHER ALGORITHM ENCRYPTION USING LESTER HILL CIPHER ALGORITHM Thangarasu.N Research Scholar in Department of Computer Science Bharathiar University,Coimbatore Dr.Arul Lawrence SelvaKumar Dean & Professor, Department of

More information

Wrapper Feature Selection using Discrete Cuckoo Optimization Algorithm Abstract S.J. Mousavirad and H. Ebrahimpour-Komleh* 1 Department of Computer and Electrical Engineering, University of Kashan, Kashan,

More information

Parallelization of the Cuckoo Search Using CUDA Architecture

Parallelization of the Cuckoo Search Using CUDA Architecture Parallelization of the Cuckoo Search Using CUDA Architecture Raka JOVANOVIC University of Belgrade Institute of Physycs Pregrevica 118, 11000 Belgrade SERBIA rakabog@yahoo.com Milan TUBA Megatrend University

More information

A SIMPLIFIED IDEA ALGORITHM

A SIMPLIFIED IDEA ALGORITHM A SIMPLIFIED IDEA ALGORITHM NICK HOFFMAN Abstract. In this paper, a simplified version of the International Data Encryption Algorithm (IDEA) is described. This simplified version, like simplified versions

More information

FACE RECOGNITION BASED ON CUCKOO SEARCH ALGORITHM

FACE RECOGNITION BASED ON CUCKOO SEARCH ALGORITHM FACE RECOGNITION BASED ON CUCKOO SEARCH ALGORITHM VIPINKUMAR TIWARI Electronics and Communication Engineering, National Institute of Technology, Nagpur. Maharashtra, India. svipins.13@gmail.com ABSTRACT:-

More information

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014

Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Introduction to Cryptography CS 136 Computer Security Peter Reiher October 9, 2014 Page 1 Outline What is data encryption? Cryptanalysis Basic encryption methods Substitution ciphers Permutation ciphers

More information

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key

Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and Key International Journal of Computer Networks and Security, ISSN:25-6878, Vol.23, Issue.2 7 Hill Cipher with Parallel Processing Involving Column, Row Shuffling, Permutation and Iteration on Plaintext and

More information

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015

L2. An Introduction to Classical Cryptosystems. Rocky K. C. Chang, 23 January 2015 L2. An Introduction to Classical Cryptosystems Rocky K. C. Chang, 23 January 2015 This and the next set of slides 2 Outline Components of a cryptosystem Some modular arithmetic Some classical ciphers Shift

More information

Chapter 3 Traditional Symmetric-Key Ciphers 3.1

Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Chapter 3 Traditional Symmetric-Key Ciphers 3.1 Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 3 Objectives To define the terms and the concepts of symmetric

More information

Cryptanalysis of Homophonic Substitution Cipher Using Hidden Markov Models

Cryptanalysis of Homophonic Substitution Cipher Using Hidden Markov Models San Jose State University SJSU ScholarWorks Master's Projects Master's Theses and Graduate Research Fall 12-20-2016 Cryptanalysis of Homophonic Substitution Cipher Using Hidden Markov Models Guannan Zhong

More information

Lecture 4: Symmetric Key Encryption

Lecture 4: Symmetric Key Encryption Lecture 4: Symmetric ey Encryption CS6903: Modern Cryptography Spring 2009 Nitesh Saxena Let s use the board, please take notes 2/20/2009 Lecture 1 - Introduction 2 Data Encryption Standard Encrypts by

More information

Cryptography. What is Cryptography?

Cryptography. What is Cryptography? Cryptography What is Cryptography? Cryptography is the discipline of encoding and decoding messages. It has been employed in various forms for thousands of years, and, whether or not you know it, is used

More information

CSCE 813 Internet Security Symmetric Cryptography

CSCE 813 Internet Security Symmetric Cryptography CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability

More information

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization

Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic Algorithm and Particle Swarm Optimization 2017 2 nd International Electrical Engineering Conference (IEEC 2017) May. 19 th -20 th, 2017 at IEP Centre, Karachi, Pakistan Meta- Heuristic based Optimization Algorithms: A Comparative Study of Genetic

More information

Hybrid Bees Algorithm With Simulated Annealing for Cryptanalysis of Simple Substitution Cipher

Hybrid Bees Algorithm With Simulated Annealing for Cryptanalysis of Simple Substitution Cipher Hybrid Bees Algorithm With Simulated Annealing for Cryptanalysis of Simple Substitution Cipher Abstract Ismail Khalil Ali Alma'mon University College Dr_ismail_cs@yahoo.com Aseel Ghazi Mahmod College of

More information

VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK

VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK VIRTUAL FORCE ALGORITHM AND CUCKOO SEARCH ALGORITHM FOR NODE PLACEMENT TECHNIQUE IN WIRELESS SENSOR NETWORK Puteri Azwa Ahmad 1, M. Mahmuddin 2, and Mohd Hasbullah Omar 3 1 Politeknik Tuanku Syed Sirajuddin,

More information

Breaking of Simplified Data Encryption Standard Using Binary Particle Swarm Optimization

Breaking of Simplified Data Encryption Standard Using Binary Particle Swarm Optimization www.ijcsi.org 307 Breaking of Simplified Data Encryption Standard Using Binary Particle Swarm Optimization Lavkush Sharma 1, Bhupendra Kumar Pathak 2 and Nidhi Sharma 3 1 Department of Computer Science

More information

Keywords Security, Cryptanalysis, RSA algorithm, Timing Attack

Keywords Security, Cryptanalysis, RSA algorithm, Timing Attack Volume 4, Issue 1, January 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Performance

More information

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box

Keywords :Avalanche effect,hamming distance, Polynomial for S-box, Symmetric encryption,swapping words in S-box Efficient Implementation of Aes By Modifying S-Box Vijay L Hallappanavar 1, Basavaraj P Halagali 2, Veena V Desai 3 1 KLES s College of Engineering & Technology, Chikodi, Karnataka 2 V S M Institute of

More information

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator

Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Hiding of Random Permutated Encrypted Text using LSB Steganography with Random Pixels Generator Noor Kareem Jumaa Department of Computer Technology Engineering Al-Mansour University College, Iraq ABSTRACT

More information

International Journal of Current Research and Modern Education (IJCRME) ISSN (Online): & Impact Factor: Special Issue, NCFTCCPS -

International Journal of Current Research and Modern Education (IJCRME) ISSN (Online): & Impact Factor: Special Issue, NCFTCCPS - TO SOLVE ECONOMIC DISPATCH PROBLEM USING SFLA P. Sowmya* & Dr. S. P. Umayal** * PG Scholar, Department Electrical and Electronics Engineering, Muthayammal Engineering College, Rasipuram, Tamilnadu ** Dean

More information

Classical Encryption Techniques

Classical Encryption Techniques Encryption CSS322: Security and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 29 December 2011 CSS322Y11S2L02, Steve/Courses/2011/S2/CSS322/Lectures/classical.tex,

More information

Comparative Study of Meta-heuristics Optimization Algorithm using Benchmark Function

Comparative Study of Meta-heuristics Optimization Algorithm using Benchmark Function International Journal of Electrical and Computer Engineering (IJECE) Vol. 7, No. 3, June 2017, pp. 1643~1650 ISSN: 2088-8708, DOI: 10.11591/ijece.v7i3.pp1643-1650 1643 Comparative Study of Meta-heuristics

More information

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation

S. Erfani, ECE Dept., University of Windsor Network Security. 2.3-Cipher Block Modes of operation 2.3-Cipher Block Modes of operation 2.3-1 Model of Conventional Cryptosystems The following figure, which is on the next page, illustrates the conventional encryption process. The original plaintext is

More information

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World

JNTU World JNTU World. JNTU World. Cryptography and Network Security. Downloaded From JNTU World (http://(http:// )(http:// )JNTU World Cryptography and Network Security )(http:// ) Downloaded From (http://(http:// )(http:// ) Downloaded From (http://(http:// Introduction The art of war teaches us not on the likelihood of the enemy s not

More information

A Related Key Attack on the Feistel Type Block Ciphers

A Related Key Attack on the Feistel Type Block Ciphers International Journal of Network Security, Vol.8, No.3, PP.221 226, May 2009 221 A Related Key Attack on the Feistel Type Block Ciphers Ali Bagherzandi 1,2, Mahmoud Salmasizadeh 2, and Javad Mohajeri 2

More information

CHAPTER 4 GENETIC ALGORITHM

CHAPTER 4 GENETIC ALGORITHM 69 CHAPTER 4 GENETIC ALGORITHM 4.1 INTRODUCTION Genetic Algorithms (GAs) were first proposed by John Holland (Holland 1975) whose ideas were applied and expanded on by Goldberg (Goldberg 1989). GAs is

More information

Artificial bee colony algorithm with multiple onlookers for constrained optimization problems

Artificial bee colony algorithm with multiple onlookers for constrained optimization problems Artificial bee colony algorithm with multiple onlookers for constrained optimization problems Milos Subotic Faculty of Computer Science University Megatrend Belgrade Bulevar umetnosti 29 SERBIA milos.subotic@gmail.com

More information

Foundations of Cryptology

Foundations of Cryptology Multimedia Security Mauro Barni University of Siena Cryptography Cryptography is the art or science of keeping messages secret; the word cryptography is derived from Greek and literally means secret (crypto-)

More information

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition

Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition Journal of Computer Science 6 (2): 133-140, 2010 ISSN 1549-3636 2010 Science Publications Block Cipher Involving Key Based Random Interlacing and Key Based Random Decomposition K. Anup Kumar and V.U.K.

More information

Gray level image enhancement using Particle Swarm Optimization with Lévy Flight: An Eagle Strategy Approach

Gray level image enhancement using Particle Swarm Optimization with Lévy Flight: An Eagle Strategy Approach Gray level image enhancement using Particle Swarm Optimization with Lévy Flight: An Eagle Strategy Approach Krishna Gopal Dhal 1, Amrita Namtirtha 2, Md. Iqbal Quraishi 3, Sanjoy Das 4 Research Scholar,

More information

USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WITH OTHER ALGORITHMS

USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WITH OTHER ALGORITHMS International Journal of Computer Science & Information Technology (IJCSIT) Vol 9 No 5 October 2017 USING CUCKOO ALGORITHM FOR ESTIMATING TWO GLSD PARAMETERS AND COMPARING IT WITH OTHER ALGORITHMS Jane

More information

Web Document Clustering Using Cuckoo Search Clustering Algorithm based on Levy Flight

Web Document Clustering Using Cuckoo Search Clustering Algorithm based on Levy Flight International Journal of Innovation and Applied Studies ISSN 2028-9324 Vol. 4 No. 1 Sep. 2013, pp. 182-188 2013 Innovative Space of Scientific Research Journals http://www.issr-journals.org/ijias/ Web

More information

Encryption using Venn-Diagrams and Graph

Encryption using Venn-Diagrams and Graph Encryption using Venn-Diagrams and Graph Parijit Kedia, Vellore Institute of Technology, Tamil Nadu, India Sumeet Agrawal, Vellore Institute of Technology, Tamil Nadu, India Abstract There are various

More information

CPS2323. Block Ciphers: The Data Encryption Standard (DES)

CPS2323. Block Ciphers: The Data Encryption Standard (DES) Block Ciphers: The Data Encryption Standard (DES) Content Block Ciphers: Constructing Pseudo Random Permutations using confusion/diffusion A call for an industry standard... and the NSA Lucifer and Feistel

More information

CHAPTER 6 ORTHOGONAL PARTICLE SWARM OPTIMIZATION

CHAPTER 6 ORTHOGONAL PARTICLE SWARM OPTIMIZATION 131 CHAPTER 6 ORTHOGONAL PARTICLE SWARM OPTIMIZATION 6.1 INTRODUCTION The Orthogonal arrays are helpful in guiding the heuristic algorithms to obtain a good solution when applied to NP-hard problems. This

More information

Lecture 3: Symmetric Key Encryption

Lecture 3: Symmetric Key Encryption Lecture 3: Symmetric Key Encryption CS996: Modern Cryptography Spring 2007 Nitesh Saxena Outline Symmetric Key Encryption Continued Discussion of Potential Project Topics Project proposal due 02/22/07

More information

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur

Traditional Symmetric-Key Ciphers. A Biswas, IT, BESU Shibpur Traditional Symmetric-Key Ciphers A Biswas, IT, BESU Shibpur General idea of symmetric-key cipher The original message from Alice to Bob is called plaintext; the message that is sent through the channel

More information

A Modified Playfair Encryption Using Fibonacci Numbers

A Modified Playfair Encryption Using Fibonacci Numbers A Modified Playfair Encryption Using Fibonacci Numbers Mohd Vasim Ahamad 1, Maria Masroor 2, Urooj Fatima 3 Aligarh Muslim University (India) ABSTRACT With the technology advancements and easy availability

More information

A Comparative Study on Nature Inspired Algorithms with Firefly Algorithm

A Comparative Study on Nature Inspired Algorithms with Firefly Algorithm International Journal of Engineering and Technology Volume 4 No. 10, October, 2014 A Comparative Study on Nature Inspired Algorithms with Firefly Algorithm M. K. A. Ariyaratne, T. G. I. Fernando Department

More information

Module 1: Classical Symmetric Ciphers

Module 1: Classical Symmetric Ciphers Module 1: Classical Symmetric Ciphers Dr. Natarajan Meghanathan Professor of Computer Science Jackson State University E-mail: natarajan.meghanathan@jsums.edu Introduction to Cryptography Terms and Concepts

More information

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding

Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding e Scientific World Journal, Article ID 746260, 8 pages http://dx.doi.org/10.1155/2014/746260 Research Article Path Planning Using a Hybrid Evolutionary Algorithm Based on Tree Structure Encoding Ming-Yi

More information

Attack on DES. Jing Li

Attack on DES. Jing Li Attack on DES Jing Li Major cryptanalytic attacks against DES 1976: For a very small class of weak keys, DES can be broken with complexity 1 1977: Exhaustive search will become possible within 20 years,

More information

Optimization of Benchmark Functions Using Artificial Bee Colony (ABC) Algorithm

Optimization of Benchmark Functions Using Artificial Bee Colony (ABC) Algorithm IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 10 (October. 2013), V4 PP 09-14 Optimization of Benchmark Functions Using Artificial Bee Colony (ABC) Algorithm

More information

EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS

EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS EFFICIENT ATTACKS ON HOMOPHONIC SUBSTITUTION CIPHERS A Project Report Presented to The faculty of the Department of Computer Science San Jose State University In Partial Fulfillment of the Requirements

More information

Hardware Design and Software Simulation for Four Classical Cryptosystems

Hardware Design and Software Simulation for Four Classical Cryptosystems Available online at www.sciencedirect.com ScienceDirect Procedia Computer Science 21 (2013 ) 500 505 The 4 th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2013)

More information

The movement of the dimmer firefly i towards the brighter firefly j in terms of the dimmer one s updated location is determined by the following equat

The movement of the dimmer firefly i towards the brighter firefly j in terms of the dimmer one s updated location is determined by the following equat An Improved Firefly Algorithm for Optimization Problems Amarita Ritthipakdee 1, Arit Thammano, Nol Premasathian 3, and Bunyarit Uyyanonvara 4 Abstract Optimization problem is one of the most difficult

More information

CSCI3381-Cryptography

CSCI3381-Cryptography CSCI3381-Cryptography Project 1: Automated Cryptanalysis of Monoalphabetic Substitution Cipher September 3, 2014 There s not much in the way of modern cryptography in this project (it probably has more

More information

A Novel Hybrid Self Organizing Migrating Algorithm with Mutation for Global Optimization

A Novel Hybrid Self Organizing Migrating Algorithm with Mutation for Global Optimization International Journal of Soft Computing and Engineering (IJSCE) ISSN: 2231-2307, Volume-3, Issue-6, January 2014 A Novel Hybrid Self Organizing Migrating Algorithm with Mutation for Global Optimization

More information

Encryption à la Mod Name

Encryption à la Mod Name Rock Around the Clock Part Encryption à la Mod Let s call the integers,, 3,, 5, and the mod 7 encryption numbers and define a new mod 7 multiplication operation, denoted by, in the following manner: a

More information

Optimization of Makespan and Mean Flow Time for Job Shop Scheduling Problem FT06 Using ACO

Optimization of Makespan and Mean Flow Time for Job Shop Scheduling Problem FT06 Using ACO Optimization of Makespan and Mean Flow Time for Job Shop Scheduling Problem FT06 Using ACO Nasir Mehmood1, Muhammad Umer2, Dr. Riaz Ahmad3, Dr. Amer Farhan Rafique4 F. Author, Nasir Mehmood is with National

More information

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting.

Symmetric Key Algorithms. Definition. A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting. Symmetric Key Algorithms Definition A symmetric key algorithm is an encryption algorithm where the same key is used for encrypting and decrypting. 1 Block cipher and stream cipher There are two main families

More information

Proposal for Scrambled Method based on NTRU

Proposal for Scrambled Method based on NTRU Proposal for Scrambled Method based on NTRU Ahmed Tariq Sadiq Computer Science Department University of Technology Baghdad, Iraq Najlaa Mohammad Hussein Computer Science Department Baghdad University Baghdad,

More information

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10

Journal of Discrete Mathematical Sciences & Cryptography Vol. ( ), No., pp. 1 10 Randomizing encryption mode Yi-Shiung Yeh 1, I-Te Chen 1, Chan-Chi Wang 2, 1 Department of Computer Science and Information Engineering National Chiao-Tung University 1001 Ta Hsueh Road Hsinchu 30050 Taiwan

More information

Solving Constraint Satisfaction Problems by Artificial Bee Colony with Greedy Scouts

Solving Constraint Satisfaction Problems by Artificial Bee Colony with Greedy Scouts , 23-25 October, 2013, San Francisco, USA Solving Constraint Satisfaction Problems by Artificial Bee Colony with Greedy Scouts Yuko Aratsu, Kazunori Mizuno, Hitoshi Sasaki, Seiichi Nishihara Abstract In

More information

A Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix

A Block Cipher Involving a Key Matrix and a Key bunch Matrix, Supplemented with Mix Research Inventy: International Journal Of Engineering And Science Vol., Issue 9 (April 3), Pp - Issn(e): 7-47, Issn(p):-643, Www.Researchinventy.Com A Block Cipher Involving a Key Matrix a Key bunch Matrix,

More information

BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM

BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM BYTE ROTATION WITH CBC ENCRYPTION ALGORITHM MAHENDRAN R Assistant professor, Dept of computer science, Puthanampatti ABSTRACT In this modern electronic age we need to protect sensitive and valuable information

More information

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization

Cell-to-switch assignment in. cellular networks. barebones particle swarm optimization Cell-to-switch assignment in cellular networks using barebones particle swarm optimization Sotirios K. Goudos a), Konstantinos B. Baltzis, Christos Bachtsevanidis, and John N. Sahalos RadioCommunications

More information

Synthesis of Thinned Planar Concentric Circular Antenna Array using Evolutionary Algorithms

Synthesis of Thinned Planar Concentric Circular Antenna Array using Evolutionary Algorithms IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 10, Issue 2, Ver. II (Mar - Apr.2015), PP 57-62 www.iosrjournals.org Synthesis of Thinned

More information

ISSN: Page 320

ISSN: Page 320 A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar

More information

Some Stuff About Crypto

Some Stuff About Crypto Some Stuff About Crypto Adrian Frith Laboratory of Foundational Aspects of Computer Science Department of Mathematics and Applied Mathematics University of Cape Town This work is licensed under a Creative

More information

3D (6 X 4 X 4) - Playfair Cipher

3D (6 X 4 X 4) - Playfair Cipher 3D (6 X 4 X 4) - Playfair Cipher Nitin 1, Shubha Jain 2 1,2 Department of Computer Science & Engineering, Kanpur Institute of Technology, Kanpur, India Abstract: The role of Cryptography in today s digital

More information

Partial Opposition-based Learning Using Current Best Candidate Solution

Partial Opposition-based Learning Using Current Best Candidate Solution Partial Opposition-based Learning Using Current Best Candidate Solution Sedigheh Mahdavi Department of Electrical, Computer, and Software Engineering University of Ontario Institute of Technology (UOIT)

More information

P2_L6 Symmetric Encryption Page 1

P2_L6 Symmetric Encryption Page 1 P2_L6 Symmetric Encryption Page 1 Reference: Computer Security by Stallings and Brown, Chapter 20 Symmetric encryption algorithms are typically block ciphers that take thick size input. In this lesson,

More information

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4

A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4 IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam

More information