Skip to main content
Log in

A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem

  • Published:
Mobile Networks and Applications Aims and scope Submit manuscript

Abstract

With the advance of the communication technology and the massive flow of information across the internet, it is becoming urgent to keep the confidentiality of the transmitted information. Using the internet has been extended to several fields such as e-mail, e-commerce, e-learning, health and medicine, shopping, and so on. Cryptography is the study of different techniques for securing the communication between the sender and the receiver. One of the most known cryptosystems is Merkle–Hellman Knapsack Cryptosystem (MHKC). It is one of the earliest Public Key Cryptosystem (PKC) that is used to secure the messages between the sender and the receiver. Developing a powerful cryptosystem comes after studying the fragility points of the current cryptosystems. The Whale Optimization Algorithm (WOA) is one of the most recent nature-inspired meta-heuristic optimization algorithms, which simulates the social behavior of humpback whales. WOA has validated excellent performance in solving the continuous problems and the engineering optimization problems. This paper introduces a novel Modified version of WOA (MWOA) for cryptanalysis of MHKC. The sigmoid function is used to map the continuous values into discrete one. A penalty function is added to the evaluation function to deal with the infeasible solutions. The mutation operation is employed for improving the solutions. The results show that MWOA is more effective and robust than other algorithms in the literature.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5

Similar content being viewed by others

References

  1. Merkle R, Hellman M (1978) Hiding information and signatures in trapdoor knapsacks. IEEE Trans Inf Theory 24(5):525–530

    Article  Google Scholar 

  2. Li X, Niu J, Kumari S, Wu F, Sangaiah AK, Choo KKR (2017) A Three-factor anonymous authentication scheme for wireless sensor networks in internet of things environments. J Netw Comput Appl. https://doi.org/10.1016/j.jnca.2017.07.001

  3. Mahmood K, Chaudhry SA, Naqvi H, Kumari S, Li X, Sangaiah AK (2017) An elliptic curve cryptography based lightweight authentication scheme for smart grid communication. Futur Gener Comput Syst. https://doi.org/10.1016/j.future.2017.05.002

  4. Li X, Ibrahim MH, Kumari S, Sangaiah AK, Gupta V, Choo KKR (2017) Anonymous mutual authentication and key agreement scheme for wearable sensors in wireless body area networks. Comput Netw. https://doi.org/10.1016/j.comnet.2017.03.013

  5. Liu S, Fu W, He L, Zhou J, Ma M (2017) Distribution of primary additional errors in fractal encoding method. Multimedia Tools Appl 76(4):5787–5802

    Article  Google Scholar 

  6. Liu S, Cheng X, Lan C, Fu W, Zhou J, Li Q, Gao G (2013) Fractal property of generalized M-set with rational number exponent. Appl Math Comput 220:668–675

    MathSciNet  MATH  Google Scholar 

  7. Liu S, Cheng X, Fu W, Zhou Y, Li Q (2014) Numeric characteristics of generalized M-set with its asymptote. Appl Math Comput 243:767–774

    MathSciNet  MATH  Google Scholar 

  8. Srikanth K, Panwar LK, Panigrahi BK, Herrera-Viedma E, Sangaiah AK, Wang GG (2017) Meta-heuristic framework: quantum inspired binary grey wolf optimizer for unit commitment problem. Comput Electr Eng. https://doi.org/10.1016/j.compeleceng.2017.07.023

  9. Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371

    Article  Google Scholar 

  10. Spillman R (1993) Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia 17(4):367–377

    Article  MATH  Google Scholar 

  11. Garg P, Shastri A, Agarwal DC (2006) An enhanced cryptanalytic attackknetic algorithm. Trans Eng Comput Technol 12:829–832

  12. Palit S, Sinha SN, Molla MA, Khanra A, Kule M (2011, September) A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm. In: 2011 2nd International conference on computer and communication technology (ICCCT), IEEE, pp 428–432

  13. Singh H (2016) Contravening esotery: cryptanalysis of knapsack cipher using genetic algorithms. arXiv preprint arXiv:1606.06047

  14. Kochladze Z, Beselia L (2016) Cracking of the Merkle–Hellman cryptosystem using genetic algorithm. Int J Sci Technol 3(1–2):291–296

    Google Scholar 

  15. Agarwal A (2011) Encrypting messages using the Merkle-Hellman knapsack cryptosystem. IJCSNS 11(5):12

    Google Scholar 

  16. Padhmavathi B, Ray A, Anjum A, Bhat S (2013, January) Improvement of CBC encryption technique by using the Merkle-Hellman knapsack cryptosystem. In: 2013 7th international conference on intelligent systems and control (ISCO), IEEE, pp 340–344

  17. Ray A, Bhat S (2013) Enhancement of Merkle-Hellman knapsack cryptosystem by use of discrete logarithmics. Int J Sci Res Publ 3(4):230

  18. Jain A, Chaudhari NS (2014) Cryptanalytic results on knapsack cryptosystem using binary particle swarm optimization. In: International joint conference SOCO’14-CISIS’14-ICEUTE’14, Springer International Publishing, pp 375–384

  19. Kennedy J, Eberhart RC (1997, October) A discrete binary version of the particle swarm algorithm. In: Computational cybernetics and simulation, 1997 I.E. international conference on systems, man, and cybernetics, vol. 5, IEEE, pp 4104–4108

  20. Bansal JC, Deep K (2012) A modified binary particle swarm optimization for knapsack problems. Appl Math Comput 218(22):11042–11061

    MathSciNet  MATH  Google Scholar 

  21. Sinha SN, Palit S, Molla MA, Khanra A, Kule M (2011, September) A cryptanalytic attack on Knapsack cipher using differential evolution algorithm. In: 2011 I.E. recent advances in intelligent computational systems (RAICS), IEEE, pp 317–320

  22. Beselia L (2016) Using genetic algorithm for cryptanalysis cryptoalgorithm Merkle-Hellman. Comput Sci Telecommun 48(2):49–53

    Google Scholar 

  23. Lokeshwari G, Susarla S, Kumar SU (2015) A modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm. J Discret Math Sci Cryptogr 18(3):293–300

    Article  MathSciNet  Google Scholar 

  24. Lokeshwari G, Kumar SU, Susarla SV (2015) An efficient image encryption using Merkle-Hellman, elgamal and genetic algorithm for color images. Appl Mech Mater 719:1140

    Article  Google Scholar 

  25. Thangavel M, Varalakshmi P (2017, January) A novel public key cryptosystem based on Merkle-Hellman knapsack cryptosystem. In: 2016 eighth international conference on advanced computing (ICoAC), IEEE, pp 117–122

  26. Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Arun Kumar Sangaiah.

Ethics declarations

This article does not contain any studies with human participants or animals performed by any of the authors.

Conflict of interest

The authors declare that there is no conflict of interests regarding the publication of this article.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Abdel-Basset, M., El-Shahat, D., El-henawy, I. et al. A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem. Mobile Netw Appl 23, 723–733 (2018). https://doi.org/10.1007/s11036-018-1005-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11036-018-1005-3

Keywords

Navigation