Abstract
In this paper, we exploit evolutionary algorithms for cryptanalysis and we focus on a chosen-plaintext attack model, in which the attacker is able to access both the ciphertext and the plaintext. The aim of this attack is to determine the decryption key for the Simplified Data Encryption Standard, so that other encrypted texts can be easily deciphered. We propose to extract the key using genetic and memetic algorithms (the latter being a hybrid of the evolutionary techniques and some refinement procedures). An extensive experimental study, coupled with the sensitivity analysis on method components and statistical tests, show the convergence capabilities of our approaches and prove they are very competitive compared with other state-of-the-art algorithms.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Chase, M., Chow, S.S.: Improving privacy and security in multi-authority attribute-based encryption. In: Proceedings of the ACM Conference on Computer and Communications Security. CCS 09, pp. 121–130. ACM, New York, USA (2009)
Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Inc., Boca Raton (1995)
Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia 17(1), 31–44 (1993)
Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of two-round DES using genetic algorithms. In: Kang, L., Liu, Y., Zeng, S. (eds.) Advances in Computation and Intelligence, vol. 4683, pp. 583–590. LNCS, Springer, Berlin (2007)
Boryczka, U., Dworak, K.: Genetic transformation techniques in cryptanalysis. In: Nguyen, N., Attachoo, B., Trawiñski, B., Somboonviwat, K. (eds.) Intelligent Information and Database Systems, vol. 8398, pp. 147–156. LNCS, Springer, Berlin (2014)
Boryczka, U., Dworak, K.: Cryptanalysis of transposition cipher using evolutionary algorithms. In: Hwang, D., Jung, J., Nguyen, N.T. (eds.) Proceedings of ICCCI, vol. 8733, pp. 623–632. LNCS, Springer, Berlin (2014)
Garg, P.: Cryptanalysis of SDES via evolutionary computation techniques. CoRR abs/0906.5123 (2009)
Dworak, K., Boryczka, U.: Cryptanalysis of SDES using modified version of binary particle swarm optimization. In: Proceedings of ICCCI. LNCS, Springer (2015) (in press)
Youssef, A.M.: Cryptanalysis of a quadratic knapsack cryptosystem. Comp. Math. App. 61(4), 1261–1265 (2011)
Russell, M., Clark, J., Stepney, S.: Using ants to attack a classical cipher. In: Cantu-Paz, E., et al. (eds.) Proceedings of GECCO, vol. 2723, pp. 146–147. Lecture Notes in Computer Science, Springer, Berlin (2003)
Garici, M., Drias, H.: Cryptanalysis of substitution ciphers using scatter search. In Mira, J., Alvarez, J. (eds.) Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach, vol. 3562, pp. 31–40. Lecture Notes in Computer Science, Springer, Berlin (2005)
Dewu, X., Wei, C.: A survey on cryptanalysis of block ciphers. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 8, pp. 218–220 (2010)
Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer, London (1996)
Nalepa, J., Kawulok, M.: A memetic algorithm to select training data for support vector machines. In: Proceedings of GECCO 2014, pp. 573–580. ACM, NY, USA (2014)
Chen, X., Ong, Y.S., Lim, M.H., Tan, K.C.: A multi-facet survey on memetic computation. IEEE Trans. Evol. Comp. 15(5), 591–607 (2011)
Kawulok, M., Nalepa, J.: Support vector machines training data selection using a genetic algorithm. In: Gimel’farb, G., Hancock, E., Imiya, A., Kuijper, A., Kudo, M., Omachi, S., Windeatt, T., Yamada, K. (eds.) S + SSPR 2012, vol. 7626, pp. 557–565, LNCS, Springer, Berlin (2012)
Nalepa, J., Kawulok, M.: Adaptive genetic algorithm to select training data for support vector machines. In: Esparcia-Alcazar, A.I., Mora, A.M. (eds.) Applications of Evolutionary Computation, vol. 8602, pp. 514–525. LNCS, Springer, Berlin (2014)–525
Cekala, T., Telec, Z., Trawinski, B.: Truck loading schedule optimization using genetic algorithm for yard management. In: Nguyen, N.T., Trawiñski, B., Kosala, R. (eds.) Intelligent Information and Database Systems, vol. 9011, pp. 536–548. LNCS, Springer, Berlin (2015)
Nalepa, J., Blocho, M.: Adaptive memetic algorithm for minimizing distance in the vehicle routing problem with time windows. Soft Comput 1–19 (2015)
Knudsen, L., Mathiassen, J.: A chosen-plaintext linear attack on DES. In: Goos, G., Hartmanis, J., van Leeuwen, J., Schneier, B. (eds.) Fast Software Encryption, vol. 1978, pp. 262–272. LNCS, Springer, Berlin (2001)
Schaefer, E.F.: A simplified data encryption standard algorithm. Cryptologia 20(1), 77–84 (1996)
Acknowledgments
This research was performed using the infrastructure supported by the POIG.02.03.01-24-099/13 grant: “GeCONiI—Upper Silesian Center for Computational Science and Engineering”.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Dworak, K., Nalepa, J., Boryczka, U., Kawulok, M. (2016). Cryptanalysis of SDES Using Genetic and Memetic Algorithms. In: Król, D., Madeyski, L., Nguyen, N. (eds) Recent Developments in Intelligent Information and Database Systems. Studies in Computational Intelligence, vol 642. Springer, Cham. https://doi.org/10.1007/978-3-319-31277-4_1
Download citation
DOI: https://doi.org/10.1007/978-3-319-31277-4_1
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-31276-7
Online ISBN: 978-3-319-31277-4
eBook Packages: EngineeringEngineering (R0)