scispace - formally typeset
Open AccessJournal ArticleDOI

Genetic Algorithm and Tabu Search Attack on the Mono-Alphabetic Subsitution Cipher in Adhoc Networks

Anil Kumar Verma, +2 more
- 31 Mar 2007 - 
- Vol. 3, Iss: 3, pp 134-137
Reads0
Chats0
TLDR
This study presents a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Alphabetic Substitution Cipher in Adhoc networks and compares and analyzed the performance of these algorithms in automated attacks on Mono-alphabetic Substitutes Cipher.
Abstract
With exponential growth of networked system and application such as e-Commerce, the demand for effective Internet security is increasing. Cryptology is the science and study of systems for secret communication. In consists of two complementary fields of study: cryptography and cryptanalysis. This study presents a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Alphabetic Substitution Cipher in Adhoc networks. We have also compared and analyzed the performance of these algorithms in automated attacks on Mono-alphabetic Substitution Cipher. The use of Tabu search is largely an unexplored area in the field of Cryptanalysis. A generalized version of these algorithms can be used for attacking other ciphers as well.

read more

Citations
More filters

Offline handwriting recognition using genetic algorithm

TL;DR: A robust algorithm for handwriting segmentation has been described here with the help of which individual characters can be segmented from a word selected from a paragraph of handwritten text image which is given as input to the module.
Posted Content

Unsupervised Cipher Cracking Using Discrete GANs

TL;DR: CipherGAN, an architecture inspired by CycleGAN used for inferring the underlying cipher mapping given banks of unpaired ciphertext and plaintext, is details and it is proved that the technique used in CipherGAN avoids the common problem of uninformative discrimination associated with GANs applied to discrete data.
Proceedings ArticleDOI

A hybrid Firefly Algorithm using genetic operators for the cryptanalysis of a monoalphabetic substitution cipher

TL;DR: This paper discusses the integration of the operators of mutation and crossover commonly used in Genetic Algorithms with the Firefly Algorithm for cryptanalysis of the monoalphabetic substitution cipher.
Journal ArticleDOI

Information Security: Text Encryption and Decryption with poly substitution method and combining the features of Cryptography

TL;DR: This paper shows the possibility of exploiting the features of Genetic Algorithm with poly substitution methods in a linear way, to generate ASCII values of the given text and then applying conversion, transposition with the feature of Cryptography.
Proceedings ArticleDOI

A cryptanalytic attack on Vigenère cipher using genetic algorithm

TL;DR: The cryptanalysis of a poly alphabetic substitution cipher (Vigenère cipher) by applying genetic algorithms is presented and the applicability of genetic algorithms for searching the key space of encryption scheme is studied.
References
More filters
Book

Genetic algorithms in search, optimization, and machine learning

TL;DR: In this article, the authors present the computer techniques, mathematical tools, and research results that will enable both students and practitioners to apply genetic algorithms to problems in many fields, including computer programming and mathematics.
Book

Adaptation in natural and artificial systems

TL;DR: Names of founding work in the area of Adaptation and modiication, which aims to mimic biological optimization, and some (Non-GA) branches of AI.
Book

Genetic Algorithms

Book

Handbook of Genetic Algorithms

TL;DR: This book sets out to explain what genetic algorithms are and how they can be used to solve real-world problems, and introduces the fundamental genetic algorithm (GA), and shows how the basic technique may be applied to a very simple numerical optimisation problem.
Book

Tabu Search

TL;DR: This book explores the meta-heuristics approach called tabu search, which is dramatically changing the authors' ability to solve a host of problems that stretch over the realms of resource planning, telecommunications, VLSI design, financial analysis, scheduling, spaceplanning, energy distribution, molecular engineering, logistics, pattern classification, flexible manufacturing, waste management,mineral exploration, biomedical analysis, environmental conservation and scores of other problems.