scispace - formally typeset
Open Access

Attacks on the Transposition Ciphers Using Optimization Heuristics

TLDR
Three optimization heuristics are presented which can be utilized in attacks on the transposition cipher, which are simulated annealing, genetic algorithm and tabu search and it is shown that each provides effective automated techniques for the cryptanalysis of the ciphertext.
Abstract
In this paper three optimization heuristics are presented which can be utilized in attacks on the transposition cipher. These heuristics are simulated annealing, genetic algorithm and tabu search. We will show that each of these heuristics provides effective automated techniques for the cryptanalysis of the ciphertext. The property which make this cipher vulnerable, is that it is not sophisticated enough to hide the inherent properties or statistics of the language of the plaintext. In Table 1 is shown the key and the encryption process of the previously described transposition cipher. It can be noticed that the random string "X" was appended to the end of the message to enforce a message length, which is a multiple of the block size. It is also clear that the decryption can be achieved by following the same process as encryption using the "inverse" of the encryption permutation. In this case

read more

Content maybe subject to copyright    Report

Citations
More filters
Proceedings ArticleDOI

P-Coding: Secure Network Coding against Eavesdropping Attacks

TL;DR: P-Coding is proposed, a novel security scheme against eavesdropping attacks in network coding that can efficiently thwart global eavesdroppers in a transparent way and is also featured in scalability and robustness, which enable it to be integrated into practical network coded systems.
Journal ArticleDOI

A Lightweight Encryption Scheme for Network-Coded Mobile Ad Hoc Networks

TL;DR: P-Coding, a lightweight encryption scheme to provide confidentiality for network-coded MANETs in an energy-efficient way is proposed and it is demonstrated that due to its lightweight nature, P-C coding incurs minimal energy consumption compared to other encryption schemes.
Journal ArticleDOI

Breaking Transposition Cipher with Genetic Algorithm

TL;DR: The aim of the research presented in this paper is to investigate the use of genetic algorithm in the cryptanalysis of transposition cipher and the applicability of genetic algorithms for searching the key space of encryption scheme is studied.
Journal ArticleDOI

Cryptanalysis of Vigenere cipher using Cuckoo Search

TL;DR: It is shown that optimal solution obtained by CS are better than the best solutions obtained by GA or PSO for the analysis of the Vigenere cipher.
Journal ArticleDOI

Decrypting classical cipher text using Markov chain Monte Carlo

TL;DR: This work investigates the use of Markov Chain Monte Carlo methods to attack classical ciphers and extends this approach to transposition cipherns and to substitution-plus-transpositionciphers.
References
More filters
Book

Genetic algorithms in search, optimization, and machine learning

TL;DR: In this article, the authors present the computer techniques, mathematical tools, and research results that will enable both students and practitioners to apply genetic algorithms to problems in many fields, including computer programming and mathematics.
Journal ArticleDOI

Optimization by Simulated Annealing

TL;DR: There is a deep and useful connection between statistical mechanics and multivariate or combinatorial optimization (finding the minimum of a given function depending on many parameters), and a detailed analogy with annealing in solids provides a framework for optimization of very large and complex systems.

Genetic algorithms in search, optimization and machine learning

TL;DR: This book brings together the computer techniques, mathematical tools, and research results that will enable both students and practitioners to apply genetic algorithms to problems in many fields.
Journal ArticleDOI

A user's guide to tabu search

TL;DR: This presentation demonstrates that a well-tuned implementation of tabu search makes it possible to obtain solutions of high quality for difficult problems, yielding outcomes in some settings that have not been matched by other known techniques.