Abstract
The paper presents a new differential cryptanalysis attack based on memetic algorithms. A prepared attack is directed against the ciphertext generated by one of the most popular ciphers named Data Encryption Standard (DES) reduced to six rounds of an encryption algorithm. The main purpose of the proposed MASA attack is to indicate the last encryption subkey, which allows the cryptanalyst to find 48 from 56 bits of decrypting key. With a simple comprehensive search, it’s possible to get the remaining 8 bits. The memetic attack is based on the simulated annealing algorithm, used to improve the local search process, to achieve the best possible solution. The described algorithm will be compared with a genetic algorithm attack, named NGA, based on an additional heuristic operator.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsReferences
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York (1996)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)
Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. CRC Press, Boca Raton (2003)
Song, J., Zhang, H., Meng, Q., Zhangyi, W.: Cryptanalysis of four-round DES based on genetic algorithm. In: Wireless Communications, Networking and Mobile Computing, pp. 2326–2329. IEEE (2007)
Tadros, T., Hegazy, A., Badr, A.: Genetic algorithm for DES cryptanalysis. Int. J. Comput. Sci. Netw. Secur. 10(5), 5–11 (2007)
Dworak, K., Boryczka, U.: Genetic algorithm as optimization tool for differential cryptanalysis of DES6. In: Nguyen, N.T., Papadopoulos, G.A., Jędrzejowicz, P., Trawiński, B., Vossen, G. (eds.) ICCCI 2017. LNCS (LNAI), vol. 10449, pp. 107–116. Springer, Cham (2017). https://doi.org/10.1007/978-3-319-67077-5_11
Dworak, K., Boryczka, U.: Differential cryptanalysis of FEAL4 using evolutionary algorithm. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI 2016. LNCS (LNAI), vol. 9876, pp. 102–112. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-45246-3_10
Dworak, K., Nalepa, J., Boryczka, U., Kawulok, M.: Cryptanalysis of SDES using genetic and Memetic algorithms. In: Król, D., Madeyski, L., Nguyen, N.T. (eds.) Recent Developments in Intelligent Information and Database Systems. SCI, vol. 642, pp. 3–14. Springer, Cham (2016). https://doi.org/10.1007/978-3-319-31277-4_1
Garg, P.: A comparison between Memetic algorithm and genetic algorithm for the cryptanalysis of simplified data encryption standard algorithm. Int. J. Netw. Secur. Appl. (IJNSA) 1(1), 34–42 (2009)
Jain, A., Chaudhari, N.S.: A new heuristic based on the cuckoo search for cryptanalysis of substitution ciphers. In: Arik, S., Huang, T., Lai, W.K., Liu, Q. (eds.) ICONIP 2015. LNCS, vol. 9490, pp. 206–215. Springer, Cham (2015). https://doi.org/10.1007/978-3-319-26535-3_24
Jain, A., Chaudhari, N.S.: A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem. Int. J. Syst. Assur. Eng. Manag. 9(4), 942–961 (2017)
Abd-Elmonim, W.G., Ghali, N.I., Hassanien, A.E., Abraham, A.: Known-plaintext attack of des-16 using particle swarm optimization. In: Third IEEE World Congress on Nature and Biologically Inspired Computing, pp. 12–16 (2011)
Stallings, W.: Cryptography and Network Security: Principles and Practice. Pearson, Upper Saddle River (2011)
Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Boca Raton (1995)
Moscato, P.: On evolution, search, optimization, genetic algorithms and martial arts: towards Memetic algorithms. In: Caltech Concurrent Computation Program (1989)
Neri, F., Cotta, C., Moscato, P.: Handbook of Memetic Algorithms, Studies in Computational Intelligence, vol. 379. Springer, Heidelberg (2012). https://doi.org/10.1007/978-3-642-23247-3
Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs. Springer, London (1996). https://doi.org/10.1007/978-3-662-03315-9
Stamp, M., Low, R.M.: Applied Cryptanalysis. Breaking Ciphers in the Real World. Wiley-Interscience, Hoboken (2007)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2019 Springer Nature Switzerland AG
About this paper
Cite this paper
Dworak, K., Boryczka, U. (2019). Differential Cryptanalysis of Symmetric Block Ciphers Using Memetic Algorithms. In: Nguyen, N., Gaol, F., Hong, TP., Trawiński, B. (eds) Intelligent Information and Database Systems. ACIIDS 2019. Lecture Notes in Computer Science(), vol 11432. Springer, Cham. https://doi.org/10.1007/978-3-030-14802-7_24
Download citation
DOI: https://doi.org/10.1007/978-3-030-14802-7_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-14801-0
Online ISBN: 978-3-030-14802-7
eBook Packages: Computer ScienceComputer Science (R0)