| Peer-Reviewed

Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm

Received: 16 March 2015     Accepted: 6 April 2015     Published: 27 April 2015
Views:       Downloads:
Abstract

Cryptanalysis of cipher text using evolutionary algorithm has gained much interest in the last decade. In this paper, cryptanalysis of SDES has been performed using Genetic Algorithm with Ring Crossover operator. Cryptography has been prone to many attacks but the scope of this paper is limited only to the cipher text attack. Different combinations of keys are generated using the Genetic Algorithm and hence it is concluded that Genetic Algorithm is a better approach than the Brute Force for analyzing SDES.

Published in American Journal of Networks and Communications (Volume 4, Issue 3)
DOI 10.11648/j.ajnc.20150403.12
Page(s) 32-36
Creative Commons

This is an Open Access article, distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution and reproduction in any medium or format, provided the original work is properly cited.

Copyright

Copyright © The Author(s), 2015. Published by Science Publishing Group

Keywords

Cryptanalysis, Cipher Text Attack, SDES, Genetic Algorithm, Brute Force, Key Search Space

References
[1] G Poonam, Memetic Algorithm Attack on Simplified Data Encryption Standard algorithm, proceeding of International Conference on Data Management, February 2008, pg 1097-1108.
[2] Garg Poonam, Genetic algorithm Attack on Simplified Data Encryption Standard Algorithm, International journal Research in Computing Science, ISSN1870-4069, 2006.
[3] Nalini, Cryptanalysis of S-DES via Optimization heuristics, International Journal of Computer Sciences and network security, vol 6, No 1B, Jan 2006.
[4] Spillman, R.: Cryptanalysis of Knapsack Ciphers Using Genetic Algorithms.Cryptologia XVII(4), 367– 377 (1993)
[5] Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of A Genetic Algorithm in the Cryptanalysis of simple substitution Ciphers. Cryptologia XVII(1), 187–201 (1993)
[6] Clark A and Dawson Ed, “Optimisation Heuristics for the Automated Cryptanalysis of Classical Ciphers”, Journal of Combinatorial Mathematics and Combinatorial Computing, Vol.28,pp. 63-86, 1998.
[7] M. Matsui, Linear cryptanalysis method for DES cipher, Lect. Notes Comput. Sci. 765 (1994) 386– 397.
[8] William Stallings, Cryptography and Network Security Principles and Practices, Third Edition, Pearson Education Inc., 2003.
[9] Vimalathithan.R, M.L.Valarmathi, “Cryptanalysis of SDES Using Genetic Algorithm”, International Journal of Recent Trends in Engineering, Vol2, No.4, November 2009, pp.76-79.
[10] Schaefer E, “A Simplified Data Encryption Standard Algorithm”, Cryptologia, Vol .20, No.1, pp. 77-84, 1996.
[11] Yılmaz Kaya, Murat Uyar, Ramazan Tekdn,” A Novel Crossover Operator for Genetic Algorithms: Ring Crossover”.
[12] Davis,L. “Handbook of Genetic Algorithm”,Van Nostrand Reinhold, New York,1991.
[13] D. E. Goldberg,"Genetic algorithms in search. Optimization and Machine Learning.Reading. M.A. addison -Wesley.1989.
[14] A, Michalewiez and N. Attia." Evolutionary optimization of constrained problems." InProc.3rd annu. Conf. on Evolutionary Programming. 1994.pp 98-108
[15] Z. Michalewicz. "Genetic algorithms+ Data structures = Evolution programs 3rd Ed. New York. Springer,1996.
[16] N.Koblitz, “A Course on number theory and cryptography”, Springer-Verlag New York,Inc., 1994.
[17] Alfred J. Menezes. Menezes, Alfred J. Handbook of Applied Cryptography, CRC, 1997.
[18] R. Toemeh, S. Arumugam, Breaking Transposition Cipher with Genetic Algorithhm Electronics and Electrical Engineering,ISSN 1392 – 1215 2007. No. 7(79).
[19] Lavkush Sharma , Bhupendra Kumar Pathak & Ramgopal Sharma Breaking of Simplified Data Encryption Standard Using Genetic Algorithm
[20] Kalyanmoy Deb, Multi-objective Optimization using Evolutionary Algorithms, John Wiley and Sons, 2001.
[21] C.W. Wu and N. F. Rulkov, Studying chaos via 1-Dmaps—atutorial, IEEE Trans. on Circuits and Systems I: Fundamental Theory and Applications, vol. 40, no. 10, pp. 707–721, 1993.
[22] http://www.hindawi.com/journals/mse/2009/540895/fig1/
[23] http://www.decodesystems.com/mt/98oct/crypt.html.
Cite This Article
  • APA Style

    Purvi Garg, Shivangi Varshney, Manish Bhardwaj. (2015). Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm. American Journal of Networks and Communications, 4(3), 32-36. https://doi.org/10.11648/j.ajnc.20150403.12

    Copy | Download

    ACS Style

    Purvi Garg; Shivangi Varshney; Manish Bhardwaj. Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm. Am. J. Netw. Commun. 2015, 4(3), 32-36. doi: 10.11648/j.ajnc.20150403.12

    Copy | Download

    AMA Style

    Purvi Garg, Shivangi Varshney, Manish Bhardwaj. Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm. Am J Netw Commun. 2015;4(3):32-36. doi: 10.11648/j.ajnc.20150403.12

    Copy | Download

  • @article{10.11648/j.ajnc.20150403.12,
      author = {Purvi Garg and Shivangi Varshney and Manish Bhardwaj},
      title = {Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm},
      journal = {American Journal of Networks and Communications},
      volume = {4},
      number = {3},
      pages = {32-36},
      doi = {10.11648/j.ajnc.20150403.12},
      url = {https://doi.org/10.11648/j.ajnc.20150403.12},
      eprint = {https://article.sciencepublishinggroup.com/pdf/10.11648.j.ajnc.20150403.12},
      abstract = {Cryptanalysis of cipher text using evolutionary algorithm has gained much interest in the last decade. In this paper, cryptanalysis of SDES has been performed using Genetic Algorithm with Ring Crossover operator. Cryptography has been prone to many attacks but the scope of this paper is limited only to the cipher text attack. Different combinations of keys are generated using the Genetic Algorithm and hence it is concluded that Genetic Algorithm is a better approach than the Brute Force for analyzing SDES.},
     year = {2015}
    }
    

    Copy | Download

  • TY  - JOUR
    T1  - Cryptanalysis of Simplified Data Encryption Standard Using Genetic Algorithm
    AU  - Purvi Garg
    AU  - Shivangi Varshney
    AU  - Manish Bhardwaj
    Y1  - 2015/04/27
    PY  - 2015
    N1  - https://doi.org/10.11648/j.ajnc.20150403.12
    DO  - 10.11648/j.ajnc.20150403.12
    T2  - American Journal of Networks and Communications
    JF  - American Journal of Networks and Communications
    JO  - American Journal of Networks and Communications
    SP  - 32
    EP  - 36
    PB  - Science Publishing Group
    SN  - 2326-8964
    UR  - https://doi.org/10.11648/j.ajnc.20150403.12
    AB  - Cryptanalysis of cipher text using evolutionary algorithm has gained much interest in the last decade. In this paper, cryptanalysis of SDES has been performed using Genetic Algorithm with Ring Crossover operator. Cryptography has been prone to many attacks but the scope of this paper is limited only to the cipher text attack. Different combinations of keys are generated using the Genetic Algorithm and hence it is concluded that Genetic Algorithm is a better approach than the Brute Force for analyzing SDES.
    VL  - 4
    IS  - 3
    ER  - 

    Copy | Download

Author Information
  • Department of Computer Science and Engineering, SRM University, Modinagar, Utter Pradesh, India

  • Department of Computer Science and Engineering, SRM University, Modinagar, Utter Pradesh, India

  • Department of Computer Science and Engineering, SRM University, Modinagar, Utter Pradesh, India

  • Sections