Abstract
With the advance of the communication technology and the massive flow of information across the internet, it is becoming urgent to keep the confidentiality of the transmitted information. Using the internet has been extended to several fields such as e-mail, e-commerce, e-learning, health and medicine, shopping, and so on. Cryptography is the study of different techniques for securing the communication between the sender and the receiver. One of the most known cryptosystems is Merkle–Hellman Knapsack Cryptosystem (MHKC). It is one of the earliest Public Key Cryptosystem (PKC) that is used to secure the messages between the sender and the receiver. Developing a powerful cryptosystem comes after studying the fragility points of the current cryptosystems. The Whale Optimization Algorithm (WOA) is one of the most recent nature-inspired meta-heuristic optimization algorithms, which simulates the social behavior of humpback whales. WOA has validated excellent performance in solving the continuous problems and the engineering optimization problems. This paper introduces a novel Modified version of WOA (MWOA) for cryptanalysis of MHKC. The sigmoid function is used to map the continuous values into discrete one. A penalty function is added to the evaluation function to deal with the infeasible solutions. The mutation operation is employed for improving the solutions. The results show that MWOA is more effective and robust than other algorithms in the literature.





Similar content being viewed by others
References
Merkle R, Hellman M (1978) Hiding information and signatures in trapdoor knapsacks. IEEE Trans Inf Theory 24(5):525–530
Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2017) A Three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2017.07.001
Mahmood K, Chaudhry SA, Naqvi H, Kumari S, Li X, Sangaiah AK (2017) An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2017.05.002
Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw. https://doi.org/10.1016/j.comnet.2017.03.013
Liu S, Fu W, He L, Zhou J, Ma M (2017) Distribution of primary additional errors in fractal encoding method. Multimedia Tools Appl 76(4):5787–5802
Liu S, Cheng X, Lan C, Fu W, Zhou J, Li Q, Gao G (2013) Fractal property of generalized M-set with rational number exponent. Appl Math Comput 220:668–675
Liu S, Cheng X, Fu W, Zhou Y, Li Q (2014) Numeric characteristics of generalized M-set with its asymptote. Appl Math Comput 243:767–774
Srikanth K, Panwar LK, Panigrahi BK, Herrera-Viedma E, Sangaiah AK, Wang GG (2017) Meta-heuristic framework: quantum inspired binary grey wolf optimizer for unit commitment problem. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2017.07.023
Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371
Spillman R (1993) Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia 17(4):367–377
Garg P, Shastri A, Agarwal DC (2006) An enhanced cryptanalytic attackknetic algorithm. Trans Eng Comput Technol 12:829–832
Palit S, Sinha SN, Molla MA, Khanra A, Kule M (2011, September) A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm. In: 2011 2nd International conference on computer and communication technology (ICCCT), IEEE, pp 428–432
Singh H (2016) Contravening esotery: cryptanalysis of knapsack cipher using genetic algorithms. arXiv preprint arXiv:1606.06047
Kochladze Z, Beselia L (2016) Cracking of the Merkle–Hellman cryptosystem using genetic algorithm. Int J Sci Technol 3(1–2):291–296
Agarwal A (2011) Encrypting messages using the Merkle-Hellman knapsack cryptosystem. IJCSNS 11(5):12
Padhmavathi B, Ray A, Anjum A, Bhat S (2013, January) Improvement of CBC encryption technique by using the Merkle-Hellman knapsack cryptosystem. In: 2013 7th international conference on intelligent systems and control (ISCO), IEEE, pp 340–344
Ray A, Bhat S (2013) Enhancement of Merkle-Hellman knapsack cryptosystem by use of discrete logarithmics. Int J Sci Res Publ 3(4):230
Jain A, Chaudhari NS (2014) Cryptanalytic results on knapsack cryptosystem using binary particle swarm optimization. In: International joint conference SOCO’14-CISIS’14-ICEUTE’14, Springer International Publishing, pp 375–384
Kennedy J, Eberhart RC (1997, October) A discrete binary version of the particle swarm algorithm. In: Computational cybernetics and simulation, 1997 I.E. international conference on systems, man, and cybernetics, vol. 5, IEEE, pp 4104–4108
Bansal JC, Deep K (2012) A modified binary particle swarm optimization for knapsack problems. Appl Math Comput 218(22):11042–11061
Sinha SN, Palit S, Molla MA, Khanra A, Kule M (2011, September) A cryptanalytic attack on Knapsack cipher using differential evolution algorithm. In: 2011 I.E. recent advances in intelligent computational systems (RAICS), IEEE, pp 317–320
Beselia L (2016) Using genetic algorithm for cryptanalysis cryptoalgorithm Merkle-Hellman. Comput Sci Telecommun 48(2):49–53
Lokeshwari G, Susarla S, Kumar SU (2015) A modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm. J Discret Math Sci Cryptogr 18(3):293–300
Lokeshwari G, Kumar SU, Susarla SV (2015) An efficient image encryption using Merkle-Hellman, elgamal and genetic algorithm for color images. Appl Mech Mater 719:1140
Thangavel M, Varalakshmi P (2017, January) A novel public key cryptosystem based on Merkle-Hellman knapsack cryptosystem. In: 2016 eighth international conference on advanced computing (ICoAC), IEEE, pp 117–122
Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
This article does not contain any studies with human participants or animals performed by any of the authors.
Conflict of interest
The authors declare that there is no conflict of interests regarding the publication of this article.
Rights and permissions
About this article
Cite this article
Abdel-Basset, M., El-Shahat, D., El-henawy, I. et al. A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem. Mobile Netw Appl 23, 723–733 (2018). https://doi.org/10.1007/s11036-018-1005-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11036-018-1005-3
Keywords
Profiles
- Arun Kumar Sangaiah View author profile