The Data Encryption Standard (DES) and its strength against attacks
IBM Journal of Research and Development
Artficial Immune Systems and Their Applications
Artficial Immune Systems and Their Applications
Genetic Cryptoanalysis of Two Rounds TEA
ICCS '02 Proceedings of the International Conference on Computational Science-Part III
The First Experimental Cryptanalysis of the Data Encryption Standard
CRYPTO '94 Proceedings of the 14th Annual International Cryptology Conference on Advances in Cryptology
Finding suitable differential characteristics for block ciphers with Ant colony technique
ISCC '04 Proceedings of the Ninth International Symposium on Computers and Communications 2004 Volume 2 (ISCC"04) - Volume 02
The design of S-boxes by simulated annealing
New Generation Computing - Evolutionary computation
Cryptanalysis of four-rounded DES using binary particleswarm optimization
Proceedings of the 11th Annual Conference Companion on Genetic and Evolutionary Computation Conference: Late Breaking Papers
Using ants to attack a classical cipher
GECCO'03 Proceedings of the 2003 international conference on Genetic and evolutionary computation: PartI
Cryptanalysis of two-round DES using genetic algorithms
ISICA'07 Proceedings of the 2nd international conference on Advances in computation and intelligence
Hi-index | 0.00 |
In this paper, we present a new approach for the cryptanalysis of four-rounded Data Encryption Standard (DES) based on Artificial Immune System (AIS) The proposed algorithm is a combination of exploitation and exploration of fitness landscape where it performs local as well as global search The algorithm has the property of automatically determining the population size and maintaining the local solutions in generations to generate results close to the global results It is actually a known plaintext attack that aims at deducing optimum keys depending upon their fitness values The set of deduced or optimum keys is scanned to extract the valuable bits out by counting all bits from the deduced key set These valuable extracted bits produce a major divergence from other observed bits This results in a 56-bit key deduction without probing the whole search space To the best of our knowledge, the proposed algorithm is the first attempt to perform cryptanalysis of four-rounded DES using Artificial Immune System.