Abstract
Nowadays, information security is based on ciphers and cryptographic systems. What evaluates the quality of such security measures is cryptanalysis. This paper presents a new cryptanalysis attack aimed at a ciphertext generated with the use of the SDES (Simplified Data Encryption Standard). The attack was carried out with a modified version of the BPSO (Binary Particle Swarm Optimization) algorithm. A well-adjusted version of this method can have a positive effect on the quality of the results obtained in a given period of time.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Boryczka, U., Dworak, K.: Genetic transformation techniques in cryptanalysis. In: Nguyen, N.T., Attachoo, B., Trawiński, B., Somboonviwat, K. (eds.) ACIIDS 2014, Part II. LNCS, vol. 8398, pp. 147–156. Springer, Heidelberg (2014)
Clark, A.J.: Optimisation Heuristics for Cryptology. PhD thesis. Information Research Centre Faculty of Information Technology Queensland (1998)
Engelbrecht, A.P.: Fundamentals of computional swarm intelligence. Wiley (2005)
Garg, P.: Cryptanalysis of SDES via Evolutionary Computation Techniques. International Journal of Computer Science and Information Security 1(1) (2009)
Kahn, D.: The Code-breakers. Scribner (1996)
Kenan, K.: Cryptography in the databases. The Last Line of Defense. Addison Wesley Publishing Company (2005)
Kennedy, J., Eberhart, R.C.: New optimizer using particle swarm theory. In: Proceedings of the Sixth International Symposium on Micromachine and Human Science (1995)
Kennedy, J., Eberhart, R.C.: A discrete binary version of the particle swarm optimization. In: Proc. of the Conference on Systems, Man, and Cybernetics SMC 1997 (1997)
Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press (1997)
Nalini, N., Raghavendra, R.: Cryptanalysis of Block Ciphers via Improvised Particle Swarm Optimization and Extended Simulated Annealing Techniques. International Journal of Network Security 6(3) (2008)
Schaefer, E.: A simplified data encryption standard algorithm. Cryptologia 20(1) (1996)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. Wiley (1996)
Shen, Q., Jiang, J.H., Jiao, C.X., Shen, G.L., Yu, R.Q.: Modified particle swarm optimization algorithm for variable selection in MLR and PLS modeling: QSAR studies of antagonism of angiotensin II antagonists. European Journal of Pharmaceutical Sciences 22 (2004)
Stinson, D.S.: Cryptography. Theory and Practice. Chapman & Hall/CRC Taylor & Francois Group, Boca Raton (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Dworak, K., Boryczka, U. (2015). Cryptanalysis of SDES Using Modified Version of Binary Particle Swarm Optimization. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_16
Download citation
DOI: https://doi.org/10.1007/978-3-319-24306-1_16
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-24305-4
Online ISBN: 978-3-319-24306-1
eBook Packages: Computer ScienceComputer Science (R0)