Cryptanalysis of Transposition Cipher Using Simulated Annealing Genetic Algorithm

The cryptanalysis technology adopting intelligent computing is the combination of intelligent computing and cryptography. Cryptanalysis of the transposition cipher with evolutionary algorithm has attracted much interest in recent years. This paper presents the automatic analysis and exploration on a typical transposition cipher, based on improved fitness evaluation weight mode and using SAGA method. Compared with the earlier experimental results of the GA/TS/SA methods adopted, the attack against transposition ciphers using improved SAGA can achieve comparatively better results on the amount of key recovery.

[1]  A.-M.A. Wahdan,et al.  Genetic algorithm cryptanalysis of the basic substitution permutation network , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[2]  M. N. Vrahatis,et al.  Evolutionary computation based cryptanalysis: A first study , 2005 .

[3]  Andrew Clark,et al.  Optimisation heuristics for cryptology , 1998 .

[4]  Susan Stepney,et al.  Making the most of two heuristics: breaking transposition ciphers with ants , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[5]  John Hughes Special Issue 31:: 10th Euroseminar on Microscopy Applied to Building Materials (EMABM) , 2007 .

[6]  Susan Stepney,et al.  Using Ants to Attack a Classical Cipher , 2003, GECCO.

[7]  Danilo Gligoroski,et al.  Attacks on the Transposition Ciphers Using Optimization Heuristics , 2003 .

[8]  Habiba Drias,et al.  Cryptanalysis of Substitution Ciphers Using Scatter Search , 2005, IWINAC.

[9]  Susan Stepney,et al.  The design of S-boxes by simulated annealing , 2004, Proceedings of the 2004 Congress on Evolutionary Computation (IEEE Cat. No.04TH8753).

[10]  Wenbo Mao,et al.  Modern Cryptography: Theory and Practice , 2003 .

[11]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[12]  Andrew Clark,et al.  Modern optimisation algorithms for cryptanalysis , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.

[13]  A.G. Bafghi,et al.  Finding suitable differential characteristics for block ciphers with Ant colony technique , 2004, Proceedings. ISCC 2004. Ninth International Symposium on Computers And Communications (IEEE Cat. No.04TH8769).

[14]  S. Arumugam,et al.  Breaking Transposition Cipher with Genetic Algorithm , 2007 .

[15]  Robert A. J. Matthews,et al.  The Use of Genetic Algorithms in Cryptanalysis , 1993, Cryptologia.

[16]  Edgar N. Reyes,et al.  Genetic Algorithms: Theory And Application , 1998 .

[17]  Julian F. Miller,et al.  Genetic and Evolutionary Computation — GECCO 2003 , 2003, Lecture Notes in Computer Science.

[18]  John A. Clark,et al.  Nature-inspired cryptography: past, present and future , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..