Using Genetic Algorithm for the Breaking Vigenere Cipher (original) (raw)

Key Generation for Vigenere Ciphering Based on Genetic Algorithm

JOURNAL OF UNIVERSITY OF BABYLON for Pure and Applied Sciences

Cryptography is a science securing of information. Encryption requires impregnable keys to encrypt or decrypt data these keys should be unpredictable and not easily to break. In this research we use genetic algorithm to generate keys for vigenere cipher. The best key is used to perform encryption. The keys created by genetic algorithm are tested for randomness by using the entropy test. The entropy calculation shows that randomness of key generated based on genetic processing is better than chosen key in the classical vigenere cipher.

A cryptanalytic attack on Vigenère cipher using genetic algorithm

2011 IEEE Conference on Open Systems, 2011

With the exponential growth of networked system and its applications such as e-commerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. In this paper the cryptanalysis of a poly alphabetic substitution cipher (Vigenère cipher) by applying genetic algorithms is presented. The applicability of genetic algorithms for searching the key space of encryption scheme is studied. The frequency analysis is used as an essential factor in the objective function.

A Generic Genetic Algorithm to Automate an Attack on Classical Ciphers

International Journal of Computer Applications, 2013

The work presented in this paper describes a generic genetic algorithm called DUREHA's (Dominance, Universal stochastic sampling and Rank-based Emulation of a Heuristic Algorithm) Algorithm for cryptanalysis of classical ciphers. The underlying objective of this paper is to automate the process of cryptanalysis in order to render salvage of time, and resources available, preserve population diversity, minimize the convergence rate and control mutation rates. While numerous algorithms have been proposed to automate this process for variegated ciphers, these approaches are yet isolated from each other. The existence of a generic algorithm to cryptanalyze any type of cipher is yet not true. The algorithm proposed in this paper aspires to address such issues. The implementation and experimentation of the proposed algorithm is accomplished using three types of classical ciphers namely monosubstitution, poly-substitution and columnar transposition. The theoretical validation and experimental results indicate that the proposed algorithm is able to decrypt the ciphers by reclaiming80.71% ,87.31%and 77.66% of letters in correct position in Mono-substitution, Columnar Transposition and Vignere cipher respectively. It is also able to distinguish between the three types of ciphers correctly and is able to correctly control the mutation andconvergence rates and preserve population diversity.

The Applicability of Genetic Algorithm in Cryptanalysis: A Survey

The Cryptanalysis has been the most fascinating area for science fraternity. The application of Genetic Algorithm (GAs) to the field of cryptanalysis is rather unique as no robust model for cryptanalysis using Genetic Algorithm exists. Genetic Algorithm (GAs) are the class of heuristic algorithm which are known for optimization and search problem. The paper presents the systematic review of Genetic Algorithm applied to the Cryptanalysis.

The Applications of Genetic Algorithms in Cryptanalysis

1996

This thesis describes a method of deciphering messages encrypted with rotor machines utilising a Genetic Algorithm to search t h e k eyspace. A tness measure based on the phi test for non randomness of text is described and the results show that an unknown three rotor machine can generally becryptanalysed with about 4000 letters of ciphertext. The results are compared to those given using a previously published technique and found to be superior. P(Type I error) = = P(X 2 S 1 j 2 ):

Survey: Recent Modifications in Vigenere Cipher

IOSR Journal of Computer Engineering, 2014

In order to secure the information there are different polyalphabetic substitution ciphers are available. Out of these Vigenere cipher is considered to be most efficient and simplest one. Due to its repeating nature of the key it is also vulnerable to attacks. To overcome this, there are many researches going on to modify the conventional Vigenere Cipher. In this paper we have presented a review of recent modifications in Vigenere cipher and its cryptanalysis.

Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitution Cipher

"Today, security is a vital concern in computer science, cryptography is used vastly for implementation of the same. Cryptanalysis is a process in which the security is attempted to breach and the complexity of this process is considered as security measurement. As cryptographic algorithm is open to all, the whole strength lies in the complexity of the key i.e. efforts to crack the key. Mostly the strength of the key is shown through its length, eventually the number of communication (Brute- force method). Genetic algorithms are considered to be a tool for meta heuristic applications. In this work an attempt is made to carry out cryptanalysis, through genetic algorithms. In this, mono-alphabetic substitution cipher technique is considered. The experiment is carried out for four key samples, and attempt to break with variations in genetic operators i.e. selection, crossover and mutation. Regarding variations, for selection- random with elitism, roulette wheel and tournament options are used, for crossover - 1 -point, 2-point and Uniform options are used, with interchanging mutation. Dr. Prabha Shreeraj Nair""Application of Genetic Algorithm in Cryptanalysis of Mono-alphabetic Substitution Cipher"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-1 | Issue-4 , June 2017, URL: http://www.ijtsrd.com/papers/ijtsrd2191.pdf Article URL: http://www.ijtsrd.com/computer-science/other/2191/application-of-genetic-algorithm-in-cryptanalysis-of-mono-alphabetic-substitution-cipher/dr-prabha-shreeraj-nair"

A Literature Survey on the Usage of Genetic Algorithms In Recent cryptography Researches

This paper will take a brief look at the usage of genetic algorithms in cryptography. Since there is no standard classification, this paper classified the usage into three categories according to its application and usage, they are: The usage of genetic algorithm in key generation, in creating new encryption process, in improving the standard encryption algorithm. And in each approach, its advantages and disadvantages were discussed.

Study of Parameters in the Genetic Algorithm for the Attack on Block Ciphers

Symmetry

In recent years, the use of Genetic Algorithms (GAs) in symmetric cryptography, in particular in the cryptanalysis of block ciphers, has increased. In this work, the study of certain parameters that intervene in GAs was carried out, such as the time it takes to execute a certain number of iterations, so that a number of generations to be carried out in an available time can be estimated. Accordingly, the size of the set of individuals that constitute admissible solutions for GAs can be chosen. On the other hand, several fitness functions were introduced, and which ones led to better results was analyzed. The experiments were performed with the block ciphers AES(t), for t∈{3,4,7}.

Vigenere Cipher: Trends, Review and Possible Modifications

Vigenere cipher is one of the earliest known polyalphabetic cipher which was considered secure for a very long time until 1917 when friedman and kasiski were able to break it by determining repeating segments of the ciphertext and using it to determine the length of the key. Once the length of the key is known, the ciphertext could be grouped in columns and treated as a separate caesar cipher which can be solved. Over the years, a lot of modification has been done to inprove the security of the vigenere cipher. This paper presents a review of the vigenere cipher and also discusses various existing modifications.