2011 IEEE Conference on Open Systems 2011
DOI: 10.1109/icos.2011.6079312
|View full text |Cite
|
Sign up to set email alerts
|

A cryptanalytic attack on Vigenère cipher using genetic algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
9
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 19 publications
(9 citation statements)
references
References 9 publications
0
9
0
Order By: Relevance
“…Also, it seems that the evolutionary algorithms had been used more frequently in both analysing and breaking ciphers instead of making ones. Many researches had shown that they could be used to decipher a message encoded using algorithms such as Vigenere [7] or DES [9]. For the generation task there are methods such as CIGA (Cryptography Inspired by Genetic Algorithms) or ICIGA (Improved CIGA) [14].…”
Section: Evolutionary Algorithms In Cryptographymentioning
confidence: 99%
See 1 more Smart Citation
“…Also, it seems that the evolutionary algorithms had been used more frequently in both analysing and breaking ciphers instead of making ones. Many researches had shown that they could be used to decipher a message encoded using algorithms such as Vigenere [7] or DES [9]. For the generation task there are methods such as CIGA (Cryptography Inspired by Genetic Algorithms) or ICIGA (Improved CIGA) [14].…”
Section: Evolutionary Algorithms In Cryptographymentioning
confidence: 99%
“…The most modern and promising development direction is to use intelligent based techniques to make cryptography algorithms [6][7][8][9][10][11][12][13][14][15]. For many years both neural networks and evolution algorithms were used to make ciphers as well as to break ciphers.…”
Section: Introductionmentioning
confidence: 99%
“…An automated approach to the cryptanalysis of transposition cipher was developed in the works of Song et al [19] and Garg [20] based on GA, TS and SA algorithms. In addition, Omran et al [21] developed a GA to attack the Vigenere Cipher. Bhateja and Kumar [22] adopted elitism in GA with a novel fitness function and applied it to cryptanalyze a Vigenere cipher.…”
Section: Introductionmentioning
confidence: 99%
“…Results described in this paper indicates that GA based techniques minimizes the time complexity. S.S Omran et al [14], exhibited a study on cryptanalyzing poly substitution(vignere) cipher using GA based techniques and tested various parameters such as mutation rate and key size. The results obtained are evident of GA based approaches being more efficient.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Hence, an urge to equip businesses, military and the society with effective mechanisms to enhance security of such data arises [7,14].…”
Section: Introductionmentioning
confidence: 99%