Abstract
During the past decade several new variants of knapsack cryptosystems have been reported in the literature. Hence, there is a growing demand for automated cryptanalysis of knapsack cryptosystems. Brute force approach is capable to cryptanalyze simple stages of cryptosystems while cryptanalysis of complex cryptosystems demands efficient methods and high-speed computing systems. In the literature, several search heuristics have proven to be promising and effective in automated cryptanalysis (or attacks) of classical or reduced cryptosystems. This paper presents the automated cryptanalysis of the reduced multiplicative knapsack cryptosystem using three different search heuristics, namely, cuckoo search, particle swarm optimization and genetic algorithm. It should be noted that the considered cryptosystem is reduced but is complex and practical representative. To the best of our knowledge, this is the first time when the cuckoo search is utilized for automated cryptanalysis of the complex cryptosystem. The performance of developed techniques has been measured in terms of time taken by the algorithm (i.e., how efficient the algorithm is?), number of times the original plaintext is determined (i.e., success rate), and the number of candidate plaintexts is examined before determining the original plaintext (i.e., how effective the algorithm is?). For the case considered, performance of the proposed techniques, namely, novel binary cuckoo search (NBCS), improved genotype–phenotype binary particle swarm optimization (IGPBPSO), and new genetic algorithm (NGA) is as follows: roughly the NBCS technique is 12% and 8% more efficient, 6% and 5% more successful, and 16% and 12% more effective than IGPBPSO and NGA, respectively. This results show that the proposed NBCS strategy is superior to IGPBPSO and NGA, and therefore NBCS strategy can be used as an efficient and effective choice for solving similar binary discrete problems such as 0–1 knapsack problem, set covering problem, etc.
Similar content being viewed by others
References
AbdulHalim MF, Bara’a AA, Hameed SM (2008) A binary particle swarm optimization for attacking knapsacks cipher algorithm. In: International conference on computer and communication engineering, pp 77–81, IEEE
Awad WS, El-Alfy ES (2015) Computational intelligence in cryptology. Improv Inf Secur Pract Through Comput Intell, 28–45
Bansal JC, Deep K (2012) A modified binary particle swarm optimization for knapsack problems. Appl Math Comput 218(22):11042–11061
Bhateja AK, Bhateja A, Chaudhury S, Saxena PK (2015) Cryptanalysis of vigenere cipher using cuckoo search. Appl Soft Comput 26:315–324
Boryczka U, Dworak K (2014) Genetic transformation techniques in cryptanalysis. In: Asian conference on intelligent information and database systems, Springer, pp 147–156
Danziger M, Henriques MA (2012) Computational intelligence applied on cryptology: a brief review. IEEE Lat Am Trans 10(3):1798–1810
Engelbrecht AP (2007) Computational intelligence: an introduction. Wiley, London
Forsyth WS, Safavi-Naini R (1993) Automated cryptanalysis of substitution ciphers. Cryptologia 17(4):407–418
Garg P, Shastri A (2006) An improved cryptanalytic attack on knapsack cipher using genetic algorithm. Int J Inf Technol 3(3):145–152
Goldberg DE, Holland JH (1988) Genetic algorithms and machine learning. Mach Learn 3(2):95–99
Gonzalez TF (2007) Handbook of approximation algorithms and metaheuristics. CRC Press, Boca Raton
Hei X, Song B (2014) SHipher: families of block ciphers based on subset-sum problem. IACR Cryptol ePrint Arch 2014:103
Jadon SS, Bansal JC, Tiwari R, Sharma H (2014) Artificial bee colony algorithm with global and local neighborhoods. Int J Syst Assur Eng Manag 1–13
Jain A, Bharadwaj A (2017) A genotype–phenotype binary particle swarm optimization technique with Lévy flights. In: ICONIP 2017, LNCS Springer (Accepted)
Jain A, Chaudhari NS (2014) Cryptanalytic results on knapsack cryptosystem using binary particle swarm optimization. In: International joint conference SOCO’14-CISIS’14-ICEUTE’14, Springer, pp 375–384
Jain A, Chaudhari NS (2015a) A new heuristic based on the cuckoo search for cryptanalysis of substitution ciphers. In: International conference on neural information processing, LNCS Springer, pp 206–215
Jain A, Chaudhari NS (2015b) Evolving highly nonlinear balanced boolean functions with improved resistance to dpa attacks. In: 9th International conference on network and system security, LNCS Springer, pp 316–330
Karagöz S, Yıldız AR (2017) A comparison of recent metaheuristic algorithms for crashworthiness optimisation of vehicle thin-walled tubes considering sheet metal forming effects. Int J Veh Des 73(1–3):179–188
Kate A, Goldberg I (2011) Generalizing cryptosystems based on the subset sum problem. Int J Inf Secur 10(3):189–199
Kennedy J, Eberhart RC et al. (1995) Particle swarm optimization. In: IEEE international conference on neural networks, vol 4, pp 1942–1948, IEEE
Kennedy J, Eberhart RC (1997) A discrete binary version of the particle swarm algorithm. In: IEEE international conference on systems, man, and cybernetics, vol 5, pp 4104–4108, IEEE
Khanesar MA, Teshnehlab M, Shoorehdeli MA (2007) A novel binary particle swarm optimization. In: International conference on control & automation, MED’07, pp 1–6, IEEE
Kiani M, Yildiz AR (2016) A comparative study of non-traditional methods for vehicle crashworthiness and NVH optimization. Arch Comput Methods Eng 23(4):723–734
Laskari EC, Meletiou GC, Stamatiou YC, Vrahatis MN (2007) Cryptography and cryptanalysis through computational intelligence. In: Computational intelligence in information assurance and security, Springer, pp 1–49
Lee S, Hong S (2016) Modified binary particle swarm optimization for multidimensional knapsack problem. Adv Sci Lett 22(11):3688–3691
Ma EY, Obimbo C (2011) An evolutionary computation attack on one-round TEA. Procedia Comput Sci 6:171–176
Mantegna RN (1994) Fast, accurate algorithm for numerical simulation of Levy stable stochastic processes. Phys Rev E 49(5):46–77
Martin KM (2017) Everyday cryptography: fundamental principles and applications. Oxford Press, Oxford
Matthews RA (1993) The use of genetic algorithms in cryptanalysis. Cryptologia 17(2):187–201
Menezes AJ, Van Oorschot PC, Vanstone SA (2010) Handbook of applied cryptography. CRC Press, Boca Raton
Merkle R, Hellman M (1978) Hiding information and signatures in trapdoor knapsacks. IEEE Trans Inf Theory 24(5):525–530
Michalewicz Z (2013) Genetic algorithms + data structures = evolution programs. Springer, New York
Muthuregunathan R, Venkataraman D, Rajasekaran P (2009) Cryptanalysis of knapsack cipher using parallel evolutionary computing. Int J Recent Trends Eng 1(1):3–6
Nalini N, Rao GR (2007) Attacks of simple block ciphers via efficient heuristics. Inf Sci 177(12):2553–2569
Palit S, Sinha SN, Molla MA, Khanra A, Kule M (2011) A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm. In: 2nd International conference on computer and communication technology (ICCCT), pp 428–432, IEEE
Pampara G, Franken N, Engelbrecht AP (2005) Combining particle swarm optimisation with angle modulation to solve binary problems. In: IEEE congress on evolutionary computation, vol 1, pp 89–96, IEEE
Pholdee N, Bureerat S, Yıldız AR (2017) Hybrid real-code population-based incremental learning and differential evolution for many-objective optimisation of an automotive floor-frame. Int J Veh Des 73(1–3):20–53
Pohlig SC, Hellman ME (1978) An improved algorithm for computing logarithms over and its cryptographic significance. IEEE Trans Inf Theory 24(1):106–110
Sadri J, Suen CY (2006) A genetic binary particle swarm optimization model. In: IEEE congress on evolutionary computation, pp 656–663, IEEE
Sharma K, Chhamunya V, Gupta PC, Sharma H, Bansal JC (2015) Fitness based particle swarm optimization. Int J Syst Assur Eng Manag 6(3):319–329
Shi Y, Eberhart R (1998) A modified particle swarm optimizer. In: IEEE world congress on computational intelligence, pp 69–73, IEEE
Shor PW (1997) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J Comput 41(2):303–332
Sinha SN, Palit S, Molla MA, Khanra A, Kule M (2011) A cryptanalytic attack on knapsack cipher using differential evolution algorithm. In: Recent advances in intelligent computational systems (RAICS), pp 317–320, IEEE
Spillman R (1993) Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia 17(4):367–377
Spillman R, Janssen M, Nelson B, Kepner M (1993) Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia 17(1):31–44
Srinivas M, Patnaik LM (1994) Genetic algorithms: a survey. Computer 27(6):17–26
Stinson DR (2005) Cryptography: theory and practice. CRC Press, Boca Raton
Vose MD (1999) The simple genetic algorithm: foundations and theory. MIT press, Cambridge
Wang B, Hu Y (2010) Quadratic compact knapsack public-key cryptosystem. Comput Math Appl 59(1):194–206
Wang B, Wu Q, Hu Y (2007) A knapsack-based probabilistic encryption scheme. Inf Sci 177(19):3981–3994
Yang XS (2014) Nature-inspired optimization algorithms. Elsevier, Amsterdam
Yang XS, Deb S (2009) Cuckoo search via Lévy flights. In: Nature and biologically inspired computing, NaBIC 2009, pp 210–214, IEEE
Yang XS, Deb S (2010) Engineering optimisation by cuckoo search. Int J Math Model Numer Optim 1(4):330–343
Yang XS, Cui Z, Xiao R, Gandomi AH, Karamanoglu M (2014) Swarm intelligence and bio-inspired computation: theory and applications, Newnes
Yildiz AR (2013a) Comparison of evolutionary-based optimization algorithms for structural design optimization. Eng Appl Artif Intell 26(1):327–333
Yildiz AR (2013b) Cuckoo search algorithm for the selection of optimal machining parameters in milling operations. Int J Adv Manuf Technol 64:55–61
Yildız AR (2009) Hybrid immune-simulated annealing algorithm for optimal design and manufacturing. Int J Mater Prod Technol 34(3):217–226
Yıldız AR (2009a) A novel hybrid immune algorithm for global optimization in design and manufacturing. Robot Comput Integr Manuf 25(2):261–270
Yıldız AR (2009b) An effective hybrid immune-hill climbing optimization approach for solving design and manufacturing optimization problems in industry. J Mater Process Technol 209(6):2773–2780
Yıldız BS (2017) A comparative investigation of eight recent population-based optimisation algorithms for mechanical and structural design problems. Int J Veh Des 73(1–3):208–218
Yıldız BS, Lekesiz H (2017) Fatigue-based structural optimisation of vehicle components. Int J Veh Des 73(1–3):54–56
Yildiz AR, Saitou K (2011) Topology synthesis of multicomponent structural assemblies in continuum domains. J Mech Des 133(1):1–9
Yildiz BS, Huseyin L, Ali RY (2016) Structural design of vehicle components using gravitational search and charged system search algorithms. Mater Test 58(1):79–81
Yıldız AR, Kurtuluş E, Demirci E, Yıldız BS, Karagöz S (2016) Optimization of thin-wall structures using hybrid gravitational search and Nelder–Mead algorithm. Mater Test 58(1):75–78
Author information
Authors and Affiliations
Corresponding author
Appendices
Rights and permissions
About this article
Cite this article
Jain, A., Chaudhari, N.S. A novel cuckoo search strategy for automated cryptanalysis: a case study on the reduced complex knapsack cryptosystem. Int J Syst Assur Eng Manag 9, 942–961 (2018). https://doi.org/10.1007/s13198-017-0690-9
Received:
Revised:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s13198-017-0690-9