Cryptanalysis of Multilanguage Encryption Techniques

  • Prasanna Raghaw MishraEmail author
  • Indivar Gupta
  • Navneet Gaba
Conference paper
Part of the Springer Proceedings in Mathematics & Statistics book series (PROMS, volume 91)


We present an analysis of an encryption scheme MUlti-Language Encryption Technique (MULET ) proposed by G. Praveen Kumar et al. in the Seventh International Conference on Information Technology, ITNG 2010. Using our analysis, we have successfully recovered 80 % of the plaintext from the MULET ciphertext. We also give quantitative results in support of our findings.


  1. 1.
    Anoop Kumar, S., Sanjeev S., Santosh, S.: MSMET: a modified and secure multilanguage encryption technique. Int. J. Comput. Sci. Eng. 4(03), 402–405 (2012)Google Scholar
  2. 2.
    Bauer, F.L.: Decrypted Secret: Methods and Maxims of cryptology, 4th edn. Springer, Germany (2006)Google Scholar
  3. 3.
    Churchhouse, R.: Codes and Ciphers, Julius Caeser, the Enigma and the Internet. Cambridge University Press, Cambridge (2002)Google Scholar
  4. 4.
    Elder, J., Miner, G., Nisbet, B.: Practical Text Mining and Statistical Analysis for Non-structure Text Data Applications. Academic Press, Burlington (2012)Google Scholar
  5. 5.
    Harris, F.A., Tuck, S.: Solving Simple Substitution Ciphers. American Cryptogram Association, New York (1959)Google Scholar
  6. 6.
    Jakobsen, T.: A fast method for cryptanalysis of substitution ciphers. Cryptologia 19(3), 265–274 (1995)CrossRefzbMATHGoogle Scholar
  7. 7.
    Lucks, M.: A constraint satisfaction algorithm for the automated decryption of simple substitution ciphers. In: Advance in Cryptology, CRYPTO’1988, LNCS, vol. 1462, pp. 132–144. Springer, Berlin (1998)Google Scholar
  8. 8.
    Menezes, A.J., van Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, New York (1997)Google Scholar
  9. 9.
    Olson, E.: Robust dictionary attack of short simple substitution ciphers. Cryptologia 31(4), 332–342 (2007)CrossRefzbMATHGoogle Scholar
  10. 10.
    Peleg, S., Rosenfeld, A.: Breaking substitution ciphers using a relaxation algorithm. Commn. ACM 22(11), 598–605 (1973)CrossRefGoogle Scholar
  11. 11.
    Praveen Kumar, G., Arjun Kumar M., Parajuli, B., Choudhury, P.: MULET: a multilanguage encryption technique. In: Proceedings of Seventh International Conference on Information Technology 2010. IEEE Computer Society (2010)Google Scholar
  12. 12.
    Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia. XVII(3), 31–44 (1993)Google Scholar
  13. 13.
    Stamp, M., Low, R.M.: Applied Cryptanalysis: Breaking Ciphers in the Real World. John Wiley & Sons, Hoboken (2007)Google Scholar
  14. 14.
    Unicode Character form.

Copyright information

© Springer India 2014

Authors and Affiliations

  • Prasanna Raghaw Mishra
    • 1
    Email author
  • Indivar Gupta
    • 1
  • Navneet Gaba
    • 1
  1. 1.Scientific Analysis GroupDefence Research and Development OrganisationDelhiIndia

Personalised recommendations