2015 World Symposium on Computer Networks and Information Security (WSCNIS) 2015
DOI: 10.1109/wscnis.2015.7368278
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of a Hill cipher using genetic algorithm

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 14 publications
(4 citation statements)
references
References 3 publications
0
4
0
Order By: Relevance
“…(See, Table 1). The suggested cryptosystem has high periodicity (see relation ( 9)), and high complexity (see relation (10)). We suggested using four different images to apply the suitable tests on them using the proposed cryptosystem.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…(See, Table 1). The suggested cryptosystem has high periodicity (see relation ( 9)), and high complexity (see relation (10)). We suggested using four different images to apply the suitable tests on them using the proposed cryptosystem.…”
Section: Discussionmentioning
confidence: 99%
“…Decryption is the process of returning encoded data to its original format. Cryptography is broadly classified into two categories symmetric and asymmetric key cryptography (popularly key cryptography), (see Figure 1) [10].…”
Section: Basic Concepts For Cryptographymentioning
confidence: 99%
“…The focus was on the cryptanalysis of a Hill cipher by using Genetic algorithms and study the algorithm factors that affect finding solution taking into consideration the time and efficiency of the cryptanalysis process, the different type of crossover, population size and mutation rate that used to find the optimal solution [19].…”
Section: Related Workmentioning
confidence: 99%
“… Ali S.Al-Khalid and AlaaO. Al-Khfagi presented the scenario of attacking the Hill cipher using Genetic Algorithms [2].  Aditi Bhateja and Shailender Kumar presented a method decryption of the Vigenere cipher with Genetic Algorithms using elitism with a novel fitness function [3].…”
Section: Related Workmentioning
confidence: 99%