Open Access
Subscription Access
Linear Cryptanalysis of Substitution Ciphers Using Particle Swarm Optimization
Cryptanalysis is a standout amongst the most vital requesting zones of capable research in the request of the security. An approach of data security is Cryptography. Cryptanalysis is the investigation to break cryptography without the encryption key. Cryptanalysis is breaking or separating cipher text content into its identical plain-content without past data of the secret key or without knowing the real approach to unscramble the cipher text content. Particle Swarm Optimization (PSO) is a population based, self-versatile find improvement of optimization performance motivated by group performance of bird flocking or fish schooling. In this paper discussed with use of PSO in automated cryptanalysis of simple substitution ciphers. In this manner, encrypted data can be sent by any individual utilizing the general puplic key, yet the data can be decoded just by the holder of the secret key.
Keywords
Cryptanalysis, Particle Swarm Optimization, Plain Text, Cipher Text.
User
Font Size
Information
- A. Ruba, Dr. G. Rajkumar and Dr. K. Parimala, “Biometrics based cryptographic key generation using Finger print”, International Journal of Computer Engineering and Research Trends, Volume 4, Issue 6, pp. 259 – 262, June 2017.
- Anjali and Surendra Kumar Yadav, “Swarm Intelligence and Evolutionary computation based cryptography and cryptanalysis of 4-round DES algorithm”, International Journal of Advanced Research in Computer Engineering and Technology, Volume 3, Issue 5, May 2014.
- Dr. G. Rajkumar, Dr. K. Parimala and A. Ruba, “An Innovative approach to Genetic Algorithm based Cryptography”, International Journal of Computer Science”, Volume 5, Issue 1, No 9,2017, pp. 1199 – 1202.
- G.Rajkumar, “Evaluating Software Estimation Methods Using Particle Swarm Optimization”, International Conference on Social Media for Service Sector at Fatima College, Madurai. ISBN NO.: 978–1–63315-205–2.
- J. Carrol and S. Martin, “The automated cryptanalysis of substitution ciphers,” Cryptologia, vol.10(4), pp.193–209, 1986.
- Mohammad Faisal and M. Youssef, “Cryptanalysis of simple substitution ciphers using particle swarm optimization”, IEEE Congress on Evolutionary computation, July 16 – 21, 2006.
- Nalini and Raghavendra Rao, “Cryptanalysis of block ciphers via improvised Particle Swarm Optimization and Extended Simulated Annealing Techniques”, International Journal of Network Security, Vol. 6, No. 3, pp. 342 – 353, May 2008.
- R. Spillman, M. Janssen, B. Nelson and M. Kepner, “Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers,” Cryptologia, vol.17(1), pp.31–44, 1993.
- Thomas Jakobsen, “A fast method for cryptanalysis of substitution ciphers,” The Cryptologia Journal, pp. 265-274, July 1995.
- W. S. Forsyth and R. Safavi-Naini, “Automated cryptanalysis of substitution ciphers,” Cryptologia, vol.17(4), pp.407–418, 1993.
- Dr. Salim Ali Abbas and et al., “Cryptanalysis of Stream cipher cryptosystem based on soft computing techniques”, IOSR Journal of Computer engineering, Vol 19, Issue 1, pp. 78 – 84.
- sMorteza and Mahdieh, “Automated Cryptanalysis of Transposition ciphers using Cuckoo Search Algorithm”, International journal of Computer Science and Mobile Computing”, Volume 4, issue 1, January 2014, pg: 140 – 149.
Abstract Views: 309
PDF Views: 0