Skip to main content

Genetic Algorithm as Optimization Tool for Differential Cryptanalysis of DES6

  • Conference paper
  • First Online:
Computational Collective Intelligence (ICCCI 2017)

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 10449))

Included in the following conference series:

Abstract

This article presents a new differential attack on the Data Encryption Standard (DES) reduced to 6 rounds, with the usage of the genetic algorithm (GA). The objective of the proposed attack is to indicate the last encryption subkey, used in the sixth cipher round, which makes it possible to define 48 from 56 primary key bits. The remaining 8 bits may be guessed by executing a brute-force attack. An additional heuristic negation operator was introduced to improve local search of proposed algorithm named NGA. The algorithm is based on the basic techniques of differential cryptanalysis. The results of the proposed NGA attack were compared with the simple genetic algorithm (SGA) and the simulated annealing (SA) attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Institutional subscriptions

References

  1. Pieprzyk, J., Hardjono, T., Seberry, J.: Fundamentals of Computer Security. CRC Press, Inc., Boca Raton (2003)

    Book  Google Scholar 

  2. Stallings, W.: Cryptography and Network Security: Principles and Practice, 5th edn. Pearson, New York (2011)

    Google Scholar 

  3. Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. J. Cryptol. 4(1), 3–72 (1991)

    Article  MathSciNet  Google Scholar 

  4. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. Wiley, Hoboken (1996)

    MATH  Google Scholar 

  5. Dworak, K., Boryczka, U.: Differential cryptanalysis of FEAL4 using evolutionary algorithm. In: Nguyen, N.-T., Manolopoulos, Y., Iliadis, L., Trawiński, B. (eds.) ICCCI 2016. LNCS, vol. 9876, pp. 102–112. Springer, Cham (2016). doi:10.1007/978-3-319-45246-3_10

    Chapter  Google Scholar 

  6. Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of four-round DES based on genetic algorithm. In: Proceedings of IEEE International Conference on Wireless Communication, Network and Mobile Computing, pp. 2326–2329. IEEE (2007)

    Google Scholar 

  7. Huseim, H.M.H., Bayoumi, B.I., Holail, F.S., Hasan, B.E.M., El-Mageed, M.Z.A.: A genetic algorithm for cryptanalysis of DES-8. Int. J. Netw. Secur. 5, 213–219 (2007)

    Google Scholar 

  8. Tadros, T., Hegazy, A.E.F., Badr, A.: Genetic algorithm for DES cryptanalysis genetic algorithm for DES cryptanalysis. Int. J. Comput. Sci. Netw. Secur. 10, 5–11 (2010)

    Google Scholar 

  9. Dworak, K., Nalepa, J., Boryczka, U., Kawulok, M.: Cryptanalysis of SDES using genetic and memetic algorithms. In: Król, D., Madeyski, L., Nguyen, N.T. (eds.) Recent Developments in Intelligent Information and Database Systems. SCI, vol. 642, pp. 3–14. Springer, Cham (2016). doi:10.1007/978-3-319-31277-4_1

    Chapter  Google Scholar 

  10. Garg, P., Varshney, S., Bhardwaj, M.: Cryptanalysis of simplified data encryption standard using genetic algorithm. Am. J. Netw. Commun. 4, 32–36 (2015)

    Article  Google Scholar 

  11. Abd-Elmonim, W.G., Ghali, N.I., Hassanien, A.E., Abraham, A.: Known-plaintext attack of DES-16 using particle swarm optimization. In: Third World Congress on Nature and Biologically Inspired Computing, vol. 9330, pp. 12–16. IEEE (2011)

    Google Scholar 

  12. Jadon, S.S., Sharma, H., Kumar, E., Bansal, J.C.: Application of binary particle swarm optimization in cryptanalysis of DES. In: Deep, K., Nagar, A., Pant, M., Bansal, J.C. (eds.) Proceedings of the International Conference on SocProS 2011. AINSC, vol. 130, pp. 1061–1071. Springer, India (2012). doi:10.1007/978-81-322-0487-9_97

    Chapter  Google Scholar 

  13. Nalini, N., Raghavendra, R.G.: Cryptanalysis of block ciphers via improved simulated annealing technique. In: Information Technology, ICIT, vol. 130, pp. 182–185. IEEE (2007)

    Google Scholar 

  14. Michalewicz, Z.: Genetic Algorithms + Data Structures = Evolution Programs, 3rd edn. Springer, London (1996). doi:10.1007/978-3-662-03315-9

    Book  MATH  Google Scholar 

  15. Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning. Addison-Wesley Longman Publishing, Boston (1989)

    MATH  Google Scholar 

  16. Menezes, A.J., Oorschot, P.C., Vanstone, S.A.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  17. Stinson, D.R.: Cryptography: Theory and Practice. CRC Press, Inc., Boca Raton (1995)

    MATH  Google Scholar 

  18. O’Connor, L.J.: An analysis of product ciphers based on the properties of Boolean functions. Ph.D. thesis, University of Waterloo, Waterloo (1992)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Kamil Dworak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Dworak, K., Boryczka, U. (2017). Genetic Algorithm as Optimization Tool for Differential Cryptanalysis of DES6. In: Nguyen, N., Papadopoulos, G., Jędrzejowicz, P., Trawiński, B., Vossen, G. (eds) Computational Collective Intelligence. ICCCI 2017. Lecture Notes in Computer Science(), vol 10449. Springer, Cham. https://doi.org/10.1007/978-3-319-67077-5_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-67077-5_11

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-67076-8

  • Online ISBN: 978-3-319-67077-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics