Annals of Operations Research - Special issue on Tabu search
Computer
Genetic Algorithms in Search, Optimization and Machine Learning
Genetic Algorithms in Search, Optimization and Machine Learning
Cryptography and Network Security: Principles and Practice
Cryptography and Network Security: Principles and Practice
Hi-index | 0.00 |
Evolutionary computation techniques have been effectively used to solve a number of optimisation problems. Cryptanalysis of ciphers has been attempted through several methods such as brute force attack, linear and differential cryptanalysis and heuristic-based approaches. Most papers in the literature use heuristic search to classical ciphers such as simple substitution or transposition ciphers. To demonstrate the power of evolutionary techniques for attacks of modern-day ciphers, we report for the first time systematic experiments on heuristic-based attacks of Simplified Data Encryption Standard (SDES) and Modified version of Data Encryption Standard (DES) and present our conclusions. Though these are simpler ciphers, they contain the significant building blocks and features present in other complex ciphers. Thus the studies reported in this paper will be useful for the heuristic attack of other similar ciphers.