Skip to main content

Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 11432))

Abstract

The paper presents a new differential cryptanalysis attack based on memetic algorithms. A prepared attack is directed against the ciphertext generated by one of the most popular ciphers named Data Encryption Standard (DES) reduced to six rounds of an encryption algorithm. The main purpose of the proposed MASA attack is to indicate the last encryption subkey, which allows the cryptanalyst to find 48 from 56 bits of decrypting key. With a simple comprehensive search, it’s possible to get the remaining 8 bits. The memetic attack is based on the simulated annealing algorithm, used to improve the local search process, to achieve the best possible solution. The described algorithm will be compared with a genetic algorithm attack, named NGA, based on an additional heuristic operator.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York (1996)

    MATH  Google Scholar 

  2. Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  3. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)

    Article  MathSciNet  Google Scholar 

  4. Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. CRC Press, Boca Raton (2003)

    Book  Google Scholar 

  5. Song, J., Zhang, H., Meng, Q., Zhangyi, W.: Cryptanalysis of four-round DES based on genetic algorithm. In: Wireless Communications, Networking and Mobile Computing, pp. 2326–2329. IEEE (2007)

    Google Scholar 

  6. Tadros, T., Hegazy, A., Badr, A.: Genetic algorithm for DES cryptanalysis. Int. J. Comput. Sci. Netw. Secur. 10(5), 5–11 (2007)

    Google Scholar 

  7. Dworak, K., Boryczka, U.: Genetic algorithm as optimization tool for differential cryptanalysis of DES6. In: Nguyen, N.T., Papadopoulos, G.A., Jędrzejowicz, P., Trawiński, B., Vossen, G. (eds.) ICCCI 2017. LNCS (LNAI), vol. 10449, pp. 107–116. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67077-5_11

    Chapter  Google Scholar 

  8. Dworak, K., Boryczka, U.: Differential cryptanalysis of FEAL4 using evolutionary algorithm. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI 2016. LNCS (LNAI), vol. 9876, pp. 102–112. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45246-3_10

    Chapter  Google Scholar 

  9. Dworak, K., Nalepa, J., Boryczka, U., Kawulok, M.: Cryptanalysis of SDES using genetic and Memetic algorithms. In: Król, D., Madeyski, L., Nguyen, N.T. (eds.) Recent Developments in Intelligent Information and Database Systems. SCI, vol. 642, pp. 3–14. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31277-4_1

    Chapter  Google Scholar 

  10. Garg, P.: A comparison between Memetic algorithm and genetic algorithm for the cryptanalysis of simplified data encryption standard algorithm. Int. J. Netw. Secur. Appl. (IJNSA) 1(1), 34–42 (2009)

    Google Scholar 

  11. Jain, A., Chaudhari, N.S.: A new heuristic based on the cuckoo search for cryptanalysis of substitution ciphers. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9490, pp. 206–215. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26535-3_24

    Chapter  Google Scholar 

  12. Jain, A., Chaudhari, N.S.: A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem. Int. J. Syst. Assur. Eng. Manag. 9(4), 942–961 (2017)

    Article  Google Scholar 

  13. Abd-Elmonim, W.G., Ghali, N.I., Hassanien, A.E., Abraham, A.: Known-plaintext attack of des-16 using particle swarm optimization. In: Third IEEE World Congress on Nature and Biologically Inspired Computing, pp. 12–16 (2011)

    Google Scholar 

  14. Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson, Upper Saddle River (2011)

    Google Scholar 

  15. Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)

    MATH  Google Scholar 

  16. Moscato, P.: On evolution, search, optimization, genetic algorithms and martial arts: towards Memetic algorithms. In: Caltech Concurrent Computation Program (1989)

    Google Scholar 

  17. Neri, F., Cotta, C., Moscato, P.: Handbook of Memetic Algorithms, Studies in Computational Intelligence, vol. 379. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-23247-3

    Book  Google Scholar 

  18. Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs. Springer, London (1996). https://doi.org/10.1007/978-3-662-03315-9

    Book  MATH  Google Scholar 

  19. Stamp, M., Low, R.M.: Applied Cryptanalysis. Breaking Ciphers in the Real World. Wiley-Interscience, Hoboken (2007)

    Book  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamil Dworak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dworak, K., Boryczka, U. (2019). Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms. In: Nguyen, N., Gaol, F., Hong, TP., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2019. Lecture Notes in Computer Science(), vol 11432. Springer, Cham. https://doi.org/10.1007/978-3-030-14802-7_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-14802-7_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-14801-0

  • Online ISBN: 978-3-030-14802-7

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics