Skip to main content

Differential Cryptanalysis of FEAL4 Using Evolutionary Algorithm

  • Conference paper
  • First Online:
Computational Collective Intelligence (ICCCI 2016)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9876))

Included in the following conference series:

Abstract

This paper presents a differential cryptanalysis attack on the Fast Data Encipherment Algorithm (FEAL4) reduced to four rounds, using an Evolutionary Algorithm (EA). The main purpose of the developed attack is to find six subkeys of the encryption algorithm, which will be used to decipher the captured ciphertext. Furthermore, an additional heuristic negation operator was introduced to improve local search of EA. The algorithm is based on a chosen-plaintext attack. In order to improve an effectiveness, the attack uses the differential cryptanalysis techniques. The results of the developed algorithm were compared against a corresponding Hill Climbing (HC), Simple Evolutionary Algorithm (SEA) and Brute Force (BF) attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Kenan, K.: Cryptography in the Databases. The Last Line of Defense. Addison Wesley Publishing Company, New York (2005)

    Google Scholar 

  2. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Pearson, New York (2011)

    Google Scholar 

  3. Stinson, D.R.: Cryptography: Theory and Practice. CRC Press Inc., Boca Raton (1995)

    MATH  Google Scholar 

  4. Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. CRC Press Inc., Boca Raton (2003)

    Book  MATH  Google Scholar 

  5. Boryczka, U., Dworak, K.: Genetic transformation techniques in cryptanalysis. In: Nguyen, N.T., Attachoo, B., Trawiński, B., Somboonviwat, K. (eds.) ACIIDS 2014, Part II. LNCS, vol. 8398, pp. 147–156. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  6. Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of four-round DES based on genetic algorithm. In: Proceedings of IEEE International Conference on Wireless Communications, Network and Mobile Computing, pp. 2326–2329. IEEE (2007)

    Google Scholar 

  7. Bhasin, H., Hameed, K.A.: Cryptanalysis using soft computing techniques. J. Comput. Sci. Appl. 3(2), 52–55 (2015)

    Google Scholar 

  8. Garg, P., Varshney, S., Bhardwaj, M.: Cryptanalysis of simplified data encryption standard using genetic algorithm. Am. J. Net. Comm. 4, 32–36 (2015)

    Article  Google Scholar 

  9. Dworak, K., Boryczka, U.: Cryptanalysis of SDES using modified version of binary particle swarm optimization. In: Núñez, M., Nguyen, N.T., Camacho, D., Trawinski, B. (eds.) ICCCI 2015. LNCS, vol. 9330, pp. 159–168. Springer, Heidelberg (2015). doi:10.1007/978-3-319-24306-1_16

    Chapter  Google Scholar 

  10. Abd-Elmonim, W.G., Ghali, N.I., Hassanien, A.E., Abraham, A.: Known-plaintext attack of DES-16 using particle swarm optimization. In: Proceedings of Third World Congress on Nature and Biologically Inspired Computing (NaBIC), pp. 12–16. IEEE (2011)

    Google Scholar 

  11. Russell, M., Clark, J.A., Stepney, S.: Using ants to attack a classical cipher. In: Cantú-Paz, E., et al. (eds.) GECCO 2003. LNCS, vol. 2723, pp. 146–147. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  12. Mekhaznia, T., Menai, M.E.B.: Cryptanalysis of classical ciphers with ant algorithms. Int. J. Metaheuristics 3, 175–198 (2014)

    Article  Google Scholar 

  13. Garg, P.: Genetic algorithms, tabu search and simulated annealing: a comparasion between three approached for the cryptanalysis of transposition cipher. IJNSA 1(1), 34–52 (2009)

    Google Scholar 

  14. Dewu, X., Wei, C.: A survey on cryptanalysis of block ciphers. In: 2010 International Conference on Computer Application and System Modeling (ICCASM), vol. 8, pp. 218–220 (2010)

    Google Scholar 

  15. Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Evolutionary computation based cryptanalysis: a first study. Nonlinear Anal. 63, e823–e830 (2005)

    Article  MATH  Google Scholar 

  16. Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer, London (1996)

    Book  MATH  Google Scholar 

  17. Goldberg, D.E.: Genetic Algorithms in Search. Optimization and Machine Learning. Addison-Wesley Longman Publishing, Boston (1989)

    MATH  Google Scholar 

  18. Shimizu, A., Miyaguchi, S.: Fast data encipherment algorithm FEAL. In: Price, W.L., Chaum, D. (eds.) EUROCRYPT 1987. LNCS, vol. 304, pp. 267–278. Springer, Heidelberg (1988)

    Chapter  Google Scholar 

  19. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, New York (1996)

    MATH  Google Scholar 

  20. Stamp, M., Low, R.M.: Applied Cryptanalysis. Breaking Ciphers in the Real World. Wiley, New York (2007)

    Book  Google Scholar 

  21. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptology 4(1), 3–72 (1991)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamil Dworak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Dworak, K., Boryczka, U. (2016). Differential Cryptanalysis of FEAL4 Using Evolutionary Algorithm. In: Nguyen, N., Iliadis, L., Manolopoulos, Y., Trawiński, B. (eds) Computational Collective Intelligence. ICCCI 2016. Lecture Notes in Computer Science(), vol 9876. Springer, Cham. https://doi.org/10.1007/978-3-319-45246-3_10

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-45246-3_10

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-45245-6

  • Online ISBN: 978-3-319-45246-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics