2005
DOI: 10.1177/0971890720050117
|View full text |Cite
|
Sign up to set email alerts
|

Genetic Algorithm & Tabu Search Attack on The Mono-Aiphanetic Substitution Cipher

Abstract: With the exponential growth of networked system and application such as Commerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper, we propose a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Alphabetic Substitution Cipher. We will also compare and analyze the performance of these algorithms in automate… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
2
2

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(4 citation statements)
references
References 0 publications
0
4
0
Order By: Relevance
“…For a cryptogram of 800 characters, 25 out of 27 key elements were recovered, and for a cryptogram of a length of 500, it was able to recover 23 keys (Clark, 1998). For a ciphertext of 200 characters, the amount of recovered keys was about 12 whereas with a 1000 character long ciphertext, about 24 keys was successfully recovered out of 27 (Garg & Sherry, 2005). Another genetic algorithm based solution (Grundlingh & Van Vuuren, 2003) was successfully implemented.…”
Section: Previous Workmentioning
confidence: 99%
See 3 more Smart Citations
“…For a cryptogram of 800 characters, 25 out of 27 key elements were recovered, and for a cryptogram of a length of 500, it was able to recover 23 keys (Clark, 1998). For a ciphertext of 200 characters, the amount of recovered keys was about 12 whereas with a 1000 character long ciphertext, about 24 keys was successfully recovered out of 27 (Garg & Sherry, 2005). Another genetic algorithm based solution (Grundlingh & Van Vuuren, 2003) was successfully implemented.…”
Section: Previous Workmentioning
confidence: 99%
“…The essential concepts of substitution ciphers and transposition ciphers are still widely used nowadays in the Advanced Encryption Standard (AES) and the International Data Encryption Algorithm (IDEA). As long as the operations and the concepts of the classical cipher systems are the basic building blocks of more secure modern ciphers, then the classical ciphers are typically the first ciphers considered in the case of investigating and examining new attacks (Garg & Sherry, 2005).…”
Section: Plaintextmentioning
confidence: 99%
See 2 more Smart Citations