Abstract
This paper presents a differential cryptanalysis attack on the Fast Data Encipherment Algorithm (FEAL4) reduced to four rounds, using an Evolutionary Algorithm (EA). The main purpose of the developed attack is to find six subkeys of the encryption algorithm, which will be used to decipher the captured ciphertext. Furthermore, an additional heuristic negation operator was introduced to improve local search of EA. The algorithm is based on a chosen-plaintext attack. In order to improve an effectiveness, the attack uses the differential cryptanalysis techniques. The results of the developed algorithm were compared against a corresponding Hill Climbing (HC), Simple Evolutionary Algorithm (SEA) and Brute Force (BF) attacks.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Kenan, K.: Cryptography in the Databases. The Last Line of Defense. Addison Wesley Publishing Company, New York (2005)
Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Pearson, New York (2011)
Stinson, D.R.: Cryptography: Theory and Practice. CRC Press Inc., Boca Raton (1995)
Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. CRC Press Inc., Boca Raton (2003)
Boryczka, U., Dworak, K.: Genetic transformation techniques in cryptanalysis. In: Nguyen, N.T., Attachoo, B., Trawiński, B., Somboonviwat, K. (eds.) ACIIDS 2014, Part II. LNCS, vol. 8398, pp. 147–156. Springer, Heidelberg (2014)
Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of four-round DES based on genetic algorithm. In: Proceedings of IEEE International Conference on Wireless Communications, Network and Mobile Computing, pp. 2326–2329. IEEE (2007)
Bhasin, H., Hameed, K.A.: Cryptanalysis using soft computing techniques. J. Comput. Sci. Appl. 3(2), 52–55 (2015)
Garg, P., Varshney, S., Bhardwaj, M.: Cryptanalysis of simplified data encryption standard using genetic algorithm. Am. J. Net. Comm. 4, 32–36 (2015)
Dworak, K., Boryczka, U.: Cryptanalysis of SDES using modified version of binary particle swarm optimization. In: Núñez, M., Nguyen, N.T., Camacho, D., Trawinski, B. (eds.) ICCCI 2015. LNCS, vol. 9330, pp. 159–168. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24306-1_16
Abd-Elmonim, W.G., Ghali, N.I., Hassanien, A.E., Abraham, A.: Known-plaintext attack of DES-16 using particle swarm optimization. In: Proceedings of Third World Congress on Nature and Biologically Inspired Computing (NaBIC), pp. 12–16. IEEE (2011)
Russell, M., Clark, J.A., Stepney, S.: Using ants to attack a classical cipher. In: Cantú-Paz, E., et al. (eds.) GECCO 2003. LNCS, vol. 2723, pp. 146–147. Springer, Heidelberg (2003)
Mekhaznia, T., Menai, M.E.B.: Cryptanalysis of classical ciphers with ant algorithms. Int. J. Metaheuristics 3, 175–198 (2014)
Garg, P.: Genetic algorithms, tabu search and simulated annealing: a comparasion between three approached for the cryptanalysis of transposition cipher. IJNSA 1(1), 34–52 (2009)
Dewu, X., Wei, C.: A survey on cryptanalysis of block ciphers. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 8, pp. 218–220 (2010)
Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Evolutionary computation based cryptanalysis: a first study. Nonlinear Anal. 63, e823–e830 (2005)
Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer, London (1996)
Goldberg, D.E.: Genetic Algorithms in Search. Optimization and Machine Learning. Addison-Wesley Longman Publishing, Boston (1989)
Shimizu, A., Miyaguchi, S.: Fast data encipherment algorithm FEAL. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 267–278. Springer, Heidelberg (1988)
Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York (1996)
Stamp, M., Low, R.M.: Applied Cryptanalysis. Breaking Ciphers in the Real World. Wiley, New York (2007)
Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3–72 (1991)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing Switzerland
About this paper
Cite this paper
Dworak, K., Boryczka, U. (2016). Differential Cryptanalysis of FEAL4 Using Evolutionary Algorithm. In: Nguyen, N., Iliadis, L., Manolopoulos, Y., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2016. Lecture Notes in Computer Science(), vol 9876. Springer, Cham. https://doi.org/10.1007/978-3-319-45246-3_10
Download citation
DOI: https://doi.org/10.1007/978-3-319-45246-3_10
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-45245-6
Online ISBN: 978-3-319-45246-3
eBook Packages: Computer ScienceComputer Science (R0)