Cryptanalysis of TEA Using Quantum-Inspired Genetic Algorithms

The Tiny Encryption Algorithm (TEA) is a Feistel block cipher well known for its simple implementation, small memory footprint, and fast execution speed. In two previous studies, genetic algorithms (GAs) were employed to investigate the randomness of TEA output, based on which distinguishers for TEA could be designed. In this study, we used quan-tum-inspired genetic algorithms (QGAs) in the cryptanalysis of TEA. Quantum chromosomes in QGAs have the advan-tage of containing more information than the binary counterpart of the same length in GAs, and therefore generate a more diverse solution pool. We showed that QGAs could discover distinguishers for reduced cycle TEA that are more efficient than those found by classical GAs in two earlier studies. Furthermore, we applied QGAs to break four-cycle and five-cycle TEAs, a considerably harder problem, which the prior GA approach failed to solve.

[1]  John J. Grefenstette,et al.  Optimization of Control Parameters for Genetic Algorithms , 1986, IEEE Transactions on Systems, Man, and Cybernetics.

[2]  Pedro Isasi Viñuela,et al.  Finding Efficient Distinguishers for Cryptographic Mappings, with an Application to the Block Cipher TEA , 2004, Comput. Intell..

[3]  Eli Biham,et al.  Differential cryptanalysis of DES-like cryptosystems , 1990, Journal of Cryptology.

[4]  Bruce Schneier,et al.  Related-key cryptanalysis of 3-WAY, Biham-DES, CAST, DES-X, NewDES, RC2, and TEA , 1997, ICICS.

[5]  Willi Meier,et al.  Correlations in RC6 with a Reduced Number of Rounds , 2000, FSE.

[6]  Huanguo Zhang,et al.  Cryptanalysis of Two-Round DES Using Genetic Algorithms , 2007, ISICA.

[7]  Eli Biham,et al.  Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials , 1999, Journal of Cryptology.

[8]  Jun Song,et al.  Cryptanalysis of Four-Round DES Based on Genetic Algorithm , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[9]  Fan Yang,et al.  Quantitative Cryptanalysis of Six-Round DES Using Evolutionary Algorithms , 2008, ISICA.

[10]  Simon J. Shepherd,et al.  The Tiny Encryption Algorithm , 2007, Cryptologia.

[11]  Roger M. Needham,et al.  TEA, a Tiny Encryption Algorithm , 1994, FSE.

[13]  John H. Holland,et al.  Adaptation in Natural and Artificial Systems: An Introductory Analysis with Applications to Biology, Control, and Artificial Intelligence , 1992 .

[14]  R. Penrose,et al.  Shadows of the Mind , 1994 .

[15]  Seokhie Hong,et al.  Differential Cryptanalysis of TEA and XTEA , 2003, ICISC.

[16]  Jong-Hwan Kim,et al.  Introduction of Quantum-inspired Evolutionary Algorithm , 2002 .

[17]  Ralph Howard,et al.  Data encryption standard , 1987 .

[18]  Sangjin Lee,et al.  Impossible Differential Cryptanalysis of Reduced Round XTEA and TEA , 2002, FSE.