Abstract
Cryptography nowadays is a very important field of protecting information from falling into wrong hands. One of modern cryptography branch is stream cipher cryptography. This paper focuses on cryptanalysis of such ciphers using genetic algorithm. Genetic algorithm as one of optimisation methods isn’t quite obvious to use in the field of cryptography, nevertheless it can give interesting results. In this article authors look for the shortest equivalent linear system which approximate given keystream with linear shift feedback register.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
RC4 Source Code. Cypherpunks, September 1994. http://cypherpunks.venona.com/archive/1994/09/msg00304.html
Glover, F.: Future Paths for Integer Programming and Links to Artificial Intelligence. Comput. Oper. Res. 13(5), 533–549 (1986)
Goldberg, D.E.: Genetic algorithms in search, optimization, and machine learning, 3rd edn. Wydawnictwa Naukowo-Techniczne, Warszawa (2003). (in Polish)
Holland, J.H.: Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor (1975)
Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. Journal of Cryptographic Engineering 1(4), 293–302 (2011)
Itaim, P., Riff, M.C.: Applying Differential Cryptanalysis for XTEA using a Genetic Algorithm (2008)
Kaream, H.A.: Attacking stream cipher systems using genetic algorithm. Master’s thesis, College of Science, University of Basrah, August 2000
Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers. Applied Mathematics and Computation 184(1), 63–72 (2007). Special issue of the International Conference on Computational Methods in Sciences and Engineering 2004 (ICCMSE-2004)
Polak, I., Boryczka, M.: Breaking LFSR using genetic algorithm. In: Bǎdicǎ, C., Nguyen, N.T., Brezovan, M. (eds.) ICCCI 2013. LNCS, vol. 8083, pp. 731–738. Springer, Heidelberg (2013)
Polak, I., Boryczka, M.: Cryptoanalysis of A5/1 and A5/2 using genetic algorithm. In: Systemy Inteligencji Obliczeniowej, pp. 145–153. Instytut Informatyki Uniwersytetu Śląskiego, Katowice (2014). (in Polish)
Selvi, G., Purusothaman, T.: Cryptanalysis of Simple Block Ciphers using Extensive Heuristic Attacks. European Journal of Scientific Research 78(2), 198–221 (2012)
Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of four-round DES based on genetic algorithm. In: International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007, pp. 2326–2329, September 2007
Strombergson, J., Josefsson, S.: Test Vectors for the Stream Cipher RC4, May 2011
Younis, H.A., Awad, W.S., Abd, A.A.: Attacking of Stream Cipher Systems Using a Genetic Algorithm. Journal of University of Thi-Qar 8(3), 78–84 (2013)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Polak, I., Boryczka, M. (2015). Genetic Algorithm in Stream Cipher Cryptanalysis. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_15
Download citation
DOI: https://doi.org/10.1007/978-3-319-24306-1_15
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24305-4
Online ISBN: 978-3-319-24306-1
eBook Packages: Computer ScienceComputer Science (R0)