A Review on Swarm Intelligence Techniques in Automated Cryptanalysis of Classical Substitution Cipher

Between the year 2006 and 2019, a considerable new and different swarm intelligence techniques have been presented in the literature for automated cryptanalysis of classical substitution cipher. This paper compares the performance of these new and different swarm intelligence techniques. Three main comparison measures are considered to assess the performance of presented swarm intelligence techniques: efficiency, effectiveness, and success rate. To the best of author knowledge first time this kind of review has been carried out. It is noteworthy that among the presented swarm intelligence techniques the performance of cuckoo search technique is best with respect to all the measures.

[1]  John Fulcher,et al.  Computational Intelligence: An Introduction , 2008, Computational Intelligence: A Compendium.

[2]  Oded Goldreich P, Np, and Np-Completeness: The Basics of Computational Complexity , 2010 .

[3]  M. Heydari,et al.  Automated Cryptanalysis of Transposition Ciphers Using Cuckoo Search Algorithm , 2014 .

[4]  El-Sayed M. El-Alfy,et al.  Computational Intelligence in Cryptology , 2017 .

[5]  Xin-She Yang,et al.  Cuckoo Search via Lévy flights , 2009, 2009 World Congress on Nature & Biologically Inspired Computing (NaBIC).

[7]  Amr M. Youssef,et al.  Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[9]  Ian C. Parmee,et al.  The Ant Colony Metaphor for Searching Continuous Design Spaces , 1995, Evolutionary Computing, AISB Workshop.

[10]  Ashish Jain,et al.  A New Heuristic Based on the Cuckoo Search for Cryptanalysis of Substitution Ciphers , 2015, ICONIP.

[11]  Ahmed Azouaoui,et al.  Ant Colony Optimization for Cryptanalysis of Simplified-DES , 2018 .

[12]  Ajith Abraham,et al.  Known-plaintext attack of DES-16 using Particle Swarm Optimization , 2011, 2011 Third World Congress on Nature and Biologically Inspired Computing.

[13]  Joshua Holden,et al.  The Mathematics of Secrets: Cryptography from Caesar Ciphers to Digital Encryption , 2017 .

[14]  Harish Sharma,et al.  Application of Binary Particle Swarm Optimization in Cryptanalysis of DES , 2011, SocProS.

[15]  Ahmed Azouaoui,et al.  A cryptanalytic attack of simplified-AES using ant colony optimization , 2019 .

[16]  Douglas R. Stinson,et al.  Cryptography: Theory and Practice , 1995 .

[17]  J. Paulo Davim,et al.  Firefly Algorithm , 2019, Optimizing Engineering Problems through Heuristic Techniques.

[18]  Malay Kule,et al.  A cryptanalytic attack on the knapsack cryptosystem using binary Firefly algorithm , 2011, 2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011).

[19]  Ahmed T. Sadiq,et al.  Mutation-Based Particle Swarm Optimization (MPSO) to Attack Classical Cryptography Methods , 2012 .

[20]  M.N.S. Swamy,et al.  Search and Optimization by Metaheuristics: Techniques and Algorithms Inspired by Nature , 2016 .

[21]  Riccardo Poli,et al.  Particle swarm optimization , 1995, Swarm Intelligence.

[22]  Ashok K. Bhateja,et al.  Cryptanalysis of Vigenere Cipher using Particle Swarm Optimization with Markov chain random walk , 2013 .

[23]  I. K. Ali Cryptanalysis of Simple Substitution Ciphers Using Bees Algorithm , 2013 .

[24]  Santanu Chaudhury,et al.  Cryptanalysis of Vigenere cipher using Cuckoo Search , 2015, Appl. Soft Comput..

[25]  J. Davim,et al.  Bees Algorithm , 2019, Optimizing Engineering Problems through Heuristic Techniques.

[26]  Xin-She Yang,et al.  Nature-Inspired Optimization Algorithms: Challenges and Open Problems , 2020, J. Comput. Sci..

[27]  M. Danziger,et al.  Computational Intelligence Applied on Cryptology: a brief review , 2012, IEEE Latin America Transactions.

[28]  Ashish Jain,et al.  An Improved Genetic Algorithm and A New Discrete Cuckoo Algorithm for Solving the Classical Substitution Cipher , 2019, Int. J. Appl. Metaheuristic Comput..

[29]  Farrukh Aslam Khan,et al.  Cryptanalysis of four-rounded DES using binary particle swarm optimization , 2009, GECCO '09.

[30]  Tahar Mekhaznia,et al.  Cryptanalysis of classical ciphers with ant algorithms , 2014, Int. J. Metaheuristics.

[31]  Musheer Ahmad,et al.  A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map , 2018, Neural Computing and Applications.

[32]  Sarab M. Hameed,et al.  PARTICLES SWARM OPTIMIZATION FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER , 2010 .

[33]  Saibal K. Pal,et al.  A hybrid Firefly Algorithm using genetic operators for the cryptanalysis of a monoalphabetic substitution cipher , 2011, 2011 World Congress on Information and Communication Technologies.

[34]  Amrit Pal Singh,et al.  The Firefly Algorithm and Application in Cryptanalysis of Monoalphabetic Substitution Ciphers , 2013 .

[35]  Ahmed Azouaoui,et al.  A Novel Ant Colony Optimization Based Cryptanalysis of Substitution Cipher , 2016, AECIA.

[36]  Pedro Isasi Viñuela,et al.  Evolutionary Computation in computer security and cryptography , 2005, New Generation Computing.

[37]  Nderim Zeqiri Adaptation and research development in the spectrum of methods with advanced access in the area of communication and computer system , 2012 .

[38]  Susan Stepney,et al.  Making the most of two heuristics: breaking transposition ciphers with ants , 2003, The 2003 Congress on Evolutionary Computation, 2003. CEC '03..

[39]  V. K. Jayaraman,et al.  Ant colony framework for optimal design and scheduling of batch plants , 2000 .

[40]  Shweta Pandey,et al.  Particle Swarm Optimization in Cryptanalysis of DES , 2012 .

[41]  Farrukh Aslam Khan,et al.  Cryptanalysis of Four-Rounded DES Using Ant Colony Optimization , 2010, 2010 International Conference on Information Science and Applications.

[42]  Amr M. Youssef,et al.  An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[43]  M.F. AbdulHalim,et al.  A binary Particle Swarm Optimization for attacking knapsacks Cipher Algorithm , 2008, 2008 International Conference on Computer and Communication Engineering.