2005 3rd International Conference on Intelligent Sensing and Information Processing 2005
DOI: 10.1109/icisip.2005.1619415
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Simplified Data Encryption Standard via Optimization Heuristics

Abstract: Cryptanalysis of ciphertext has gained considerable interest among the research community engaged in security studies. Optimisation heuristics are alternative candidates for brute force attack of ciphers. This paper demonstrates the applicability of two optimisation heuristics, simulated annealing (SA) and tabu search for the cryptanalysis of Simplified Data Encryption Standard (SDES). Results of preliminary studies on a comparison with genetic algorithms (GA) are also presented.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0
1

Year Published

2011
2011
2021
2021

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 7 publications
0
8
0
1
Order By: Relevance
“…In decryption first we have received the cipher text which is not in original message. Then decrypt the cipher text after that we get the original message [12] [13]. om = av-(n-r)/q Wheren-Substitution array sequential number r-Reminder Number q-Quotient number om-original message av-ascii value Now finally received original message after the decryption of the message"SECURITY OF THE SYTEM" Original Message-"Security of the System"…”
Section: Symmetric Key Decryptionmentioning
confidence: 99%
See 1 more Smart Citation
“…In decryption first we have received the cipher text which is not in original message. Then decrypt the cipher text after that we get the original message [12] [13]. om = av-(n-r)/q Wheren-Substitution array sequential number r-Reminder Number q-Quotient number om-original message av-ascii value Now finally received original message after the decryption of the message"SECURITY OF THE SYTEM" Original Message-"Security of the System"…”
Section: Symmetric Key Decryptionmentioning
confidence: 99%
“…Population size is fixed to 100( could be varied) (v) 60 generators are requiring generating 60000. By far the most widely used technique for PRNG is an algorithm first proposed by Lehmer, which is known as linear congruential method [12]. Note-There are using population size =150 In this research paper we consider about the first generation which is created the next generation numbers are using the GA Operators, Crossover and Mutation.…”
Section: (Iii)mentioning
confidence: 99%
“…An important analysis on how different optimization techniques can be used in the field of cryptanalysis is shown in by Clark [6]. In 2006 Nalini [3] used GA, Tabu search and Simulated Annealing techniques to break S-DES. Later in 2008, Garg [1,2] presented the use of memetic algorithm and genetic algorithm to break a simplified data encryption standard algorithm.…”
Section: Related Workmentioning
confidence: 99%
“…There are several methods are available for audio steganography [3]. Some of them are as follows: -LSB Coding: Least significant bit (LSB) coding is the simplest way to embed information in a digital audio file.…”
Section: Perspective Study On Various Methodsmentioning
confidence: 99%