Evolutionary Algorithms, Fuzzy Logic and Artificial Immune Systems applied to Cryptography and Cryptanalysis: State-of-the-art review

The need and importance of secure information communication, particularly text, image and video transmission has made cryptography to take a larger space in current research era. Improvement of pictorial information for betterment of human perception involves de-blurring, de-noising and safe transmission. These applications extend over several fields such as satellite imaging, medical imaging etc. Specifically we would like to elaborate our research on the significance of computational intelligence as one of the domains which finds application in cryptography and information security, and then the relevance of cryptography is indeed unavoidable. This paper deals with the study of the requirements for strong cryptography and various computational intelligence techniques that find use in cryptography. Cryptanalysis is a well-studied problem with many important applications in the areas of error-free and secure data transmission. In this paper, we have reviewed the improved algorithms used for cryptography optimization; the algorithms under reviews integrate genetic algorithms, immune computing, crossover and mutation operators and fuzzy systems to maintain the diversity and optimization of candidate objects. These computational intelligence techniques have seen to greatly improve the fitness levels of candidate groups in cryptography. Lastly, we make detailed comparison between these methods and those cryptography techniques without computational intelligence.

[1]  M. N. Vrahatisa,et al.  Evolutionary computation based cryptanalysis : A first study , 2005 .

[2]  Vipin Tyagi,et al.  Problem Reduction in Online Payment System Using Hybrid Model , 2011, ArXiv.

[3]  Alonso Corona-Chavez,et al.  De-Encryption of a Text in Spanish Using Probability and Statistics , 2008, 18th International Conference on Electronics, Communications and Computers (conielecomp 2008).

[4]  Ali Aydin Selçuk,et al.  On Probability of Success in Linear and Differential Cryptanalysis , 2008, Journal of Cryptology.

[5]  SelçukAli Aydın On Probability of Success in Linear and Differential Cryptanalysis , 2008 .

[6]  K. W. Lee,et al.  DECRYPTING ENGLISH TEXT USING ENHANCED FREQUENCY ANALYSIS , 2006 .

[7]  V. Bhusari,et al.  Study of Hidden Markov Model in credit card fraudulent detection , 2011, 2016 World Conference on Futuristic Trends in Research and Innovation for Social Welfare (Startup Conclave).

[8]  Hussein A. Abdou,et al.  Credit card fraud and detection techniques : a review , 2009 .

[9]  Mauro Birattari,et al.  Swarm Intelligence , 2012, Lecture Notes in Computer Science.

[10]  Michael J. Wiener The Full Cost of Cryptanalytic Attacks , 2003, Journal of Cryptology.

[11]  Amr M. Youssef,et al.  Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization , 2006, 2006 IEEE International Conference on Evolutionary Computation.

[12]  Abhinav Srivastava,et al.  Credit Card Fraud Detection Using Hidden Markov Model , 2008, IEEE Transactions on Dependable and Secure Computing.

[13]  Ralph Howard,et al.  Data encryption standard , 1987 .

[14]  Stephen M. Matyas,et al.  The data encryption standard , 1997, Inf. Secur. Tech. Rep..

[15]  Shamik Sural,et al.  Credit card fraud detection: A fusion approach using Dempster-Shafer theory and Bayesian learning , 2009, Inf. Fusion.

[16]  Jongan Park,et al.  The improved data encryption standard (DES) algorithm , 1996, Proceedings of ISSSTA'95 International Symposium on Spread Spectrum Techniques and Applications.

[17]  Kevin Knight,et al.  Attacking Letter Substitution Ciphers with Integer Programming , 2009, Cryptologia.

[18]  Vinaya Babu,et al.  Effect of Language Complexity on Deciphering Substitution Ciphers - A Case Study on Telugu , 2010 .

[19]  A.M.B. Albassall,et al.  Genetic algorithm cryptanalysis of a feistel type block cipher , 2004, International Conference on Electrical, Electronic and Computer Engineering, 2004. ICEEC '04..

[20]  Tang Ming . Wei Lian. Si Tuo Lin Si,et al.  Cryptography and Network Security - Principles and Practice , 2015 .

[21]  John Fulcher,et al.  Computational Intelligence: An Introduction , 2008, Computational Intelligence: A Compendium.

[22]  Carlisle M. Adams Designing against a class of algebraic attacks on symmetric block ciphers , 2006, Applicable Algebra in Engineering, Communication and Computing.

[23]  S. Arumugam,et al.  Breaking Transposition Cipher with Genetic Algorithm , 2007 .

[24]  Hongxia Wang,et al.  Efficient Image Encryption Using a Chaos-based PWL Memristor , 2010 .

[25]  Kevin Knight,et al.  Attacking Decipherment Problems Optimally with Low-Order N-gram Models , 2008, EMNLP.

[26]  Sean Simmons,et al.  Algebraic Cryptanalysis of Simplified AES* , 2009, Cryptologia.

[27]  Jun Song,et al.  Cryptanalysis of Four-Round DES Based on Genetic Algorithm , 2007, 2007 International Conference on Wireless Communications, Networking and Mobile Computing.

[28]  S. V. Wunnava,et al.  Data encryption performance and evaluation schemes , 2002, Proceedings IEEE SoutheastCon 2002 (Cat. No.02CH37283).

[29]  M. L. Valarmathi,et al.  Cryptanalysis of S-DES using Genetic Algorithm , 2009 .