2017 International Conference on Computing, Communication and Automation (ICCCA) 2017
DOI: 10.1109/ccaa.2017.8229834
|View full text |Cite
|
Sign up to set email alerts
|

Application of genetic algorithm in cryptanalysis of mono-alphabetic substitution cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…Encode all connections where conceivable. Encryption is the most common way of covering or changing data through a code or a code with the goal that it becomes garbled to any remaining individuals aside from the people who hold the key to the data [8][10] [13]. The subsequent encoded data is called scrambled data.…”
Section: Encryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…Encode all connections where conceivable. Encryption is the most common way of covering or changing data through a code or a code with the goal that it becomes garbled to any remaining individuals aside from the people who hold the key to the data [8][10] [13]. The subsequent encoded data is called scrambled data.…”
Section: Encryptionmentioning
confidence: 99%
“…Selecting a single point on the parent organism string and all the data beyond that crossover point is exchanged between the two parents [8][10].…”
Section: • Single Point Crossovermentioning
confidence: 99%
“…Cryptography is a science securing the confidential exchange of information between two people by converting the information into a form difficult to understand by attackers [13], [14]. Depending on the key used for encryption-decryption operations, cryptographic methods are classified into symmetric methods which is used only one key for encoding and decoding like AES and DES while asymmetric methods rely on using two keys one of them is publicly declared key for encryption [15], [16]. For decoding there is another key which is only accessible to authorized persons [17], RSA and El-Gamal are popular examples of this type.…”
Section: El-gamal Algorithmmentioning
confidence: 99%
“…Various computational intelligence approaches have been used for cryptanalysis, although much of the work in this area has been applied to classical ciphers -those that have been proven to be insecure, and therefore are not in wide use at the present time. These include ciphers such as the substitution cipher [10], the Purple cipher [14], Substitution Permutation Networks (SPN) [1], the Tiny Encryption Algorithm (TEA) [6], and the RC4 Stream cipher [4]. The genetic algorithm applied to the RC4 cipher was a success, as it greatly improved on the complexity for theoretical attacks [4].…”
Section: Previous Workmentioning
confidence: 99%