Cryptanalysis of Mono-Alphabetic Substitution Ciphers using Genetic Algorithms and Simulated Annealing
In this paper, we intend to apply the principles of genetic algorithms along with simulated annealing to cryptanalyze a mono-alphabetic substitution cipher. The type of attack used for cryptanalysis is a ciphertext-only attack in which we donâ€™t know any plaintext. In genetic algorithms and simulated annealing, for ciphertext-only attack, we need to have the solution space or any method to match the decrypted text to the language text. However, the challenge is to implement the project while maintaining computational efficiency and a high degree of security. We carry out three attacks, the first of which uses genetic algorithms alone, the second which uses simulated annealing alone and the third which uses a combination of genetic algorithms and simulated annealing.
D. Bethany, â€œGenetic Algorithm in Cryptographyâ€, Rochester Institute of Technology, Rochester, New York, July 2010.
W. R. Grundlingh and Jan Van Vuuren, â€œUsing Genetic Algorithms to break a simple Cryptographic Cipherâ€, March 31, 2005.
O. David, â€œEvolutionary Algorithm for Decryption of Mono-alphabetic Homophonic Substitution Ciphers Encoded as Constraint Satisfaction Problemsâ€, Atlanta, Georgia, USA, 2008.
R. Spillman, M. Janssen, B. Nelson, and M. Kepner, â€œUse of a genetic algorithm in the of simple substitution ciphersâ€, Cryptologia 17(1), pp.31 - 44, January 2003.
A. J. Clark, Optimization Heuristics for Cryptology, PhD, Thesis, Queensland University of Technology, February 2012.
L. C. Washington, Introduction to cryptography with coding theory, Pearson Education, Inc., 2nd edition, 2006.
A. K. Verma, Mayank Dave and, R. C. Joshi, Genetic Algorithm and Tabu Search Attack on the Mono- Alphabetic Substitution Cipher in Adhoc Networks, Journal of Computer Science 3 (3), pp.134- 137, 2007.
Using Genetic Algorithm â€œTo Break A Mono - Alphabetic Substitution Cipherâ€, S. S. Omran, A. S. A l-Khalid, D. M. Al-Saady, 2010 IEEE Conference on Open Systems (ICOS 2010), pp. 63 -67, 2010.
G. J. Simmons, Contemporary Cryptology, â€œThe Science of Information Integrityâ€, The Institute of Electrical and Electronics Engineers, Inc., New York, 2001.
D. Kahn, The Code breakers, The New American Library, Inc., USA, 2003.
W. Stallings, cryptography and network security, Pearson Education, Inc., 4th edition, 2005.
T. Ragheb and A. Subbanagounder, Applying Genetic Algorithms for Searching Key- Space of Poly-alphabetic Substitution Ciphers, The International Arab Journal of Information Technology, Vol. 5, No. 1, pp.87 - 91, January.
Copyright (c) 2018 IARS' International Research Journal
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.
Submission to publish with IARS' International Research Journal through any means is to agree to auto-transfer the copyright to its publisher. Author reserves the ownership of the content for further research purposes but re-publishing the content already submitted or published with IARS' International Research Journal must be accompanied with a written permission from competent authority of IARS' International Research Journal. Author should feel free to write to firstname.lastname@example.org or email@example.com for such permissions. Stay assured, IARS never denies permissions unless this against its core objectives/visions or violating regulations. IARS believes in ethical practices in its endeavors.