An improved fitness function for automated cryptanalysis using genetic algorithm

Genetic Algorithm (GA) is a popular desire for the researchers for creating an automated cryptanalysis system. GA strategy is useful for many problems. Genetic Algorithms try to solve problems by using genetic processes. Different techniques for deciding on fitness function relying on the ciphers have proposed by different researchers. The most necessary component is to set such a fitness function that can evaluate different types of ciphers on the identical scale. In this paper, we have proposed a combined fitness function that is valid for great sorts of ciphers. We use GA to select the fitness function. We have bought the higher result after imposing our proposed method.

[1]  Gholamreza Latif Shabgahi,et al.  Cryptanalysis of Transposition Ciphers with Long Key Lengths Using an Improved Genetic Algorithm , 2013 .

[2]  R. K. Chauhan,et al.  A Survey on Comparisons of Cryptographic Algorithms Using Certain Parameters in WSN , 2017 .

[4]  Andrew Clark,et al.  Optimisation heuristics for cryptology , 1998 .

[5]  S. Arumugam,et al.  Breaking Transposition Cipher with Genetic Algorithm , 2007 .

[6]  Zhang Qi ming Secure Digital Certificate Design Based on the Public Key Cryptography Algorithm , 2013 .

[7]  Arashdeep Kaur,et al.  A Generic Genetic Algorithm to Automate an Attack on Classical Ciphers , 2013 .

[8]  Jasmin Ilyani Ahmad,et al.  Analysis Review on Public Key Cryptography Algorithms , 2018, Indonesian Journal of Electrical Engineering and Computer Science.

[9]  Andrew J. Clark,et al.  A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher , 1997, Cryptologia.

[10]  Auqib Hamid Lone,et al.  The Applicability of Genetic Algorithm in Cryptanalysis: A Survey , 2015 .

[11]  Robert A. J. Matthews,et al.  The Use of Genetic Algorithms in Cryptanalysis , 1993, Cryptologia.

[12]  A.M.B. Albassall,et al.  Genetic algorithm cryptanalysis of a feistel type block cipher , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..

[13]  A. S. Al-Khalid,et al.  USING GENETIC ALGORITHMS TO BREAK A SIMPLE TRANSPOSITION CIPHER , 2013 .

[14]  Raja Azlina Raja Mahmood,et al.  Feature Selection Based on Genetic Algorithm and Support Vector Machine for Intrusion Detection System , 2013 .