Reference Hub2
Applicability of Cellular Automata in Cryptanalysis

Applicability of Cellular Automata in Cryptanalysis

Harsh Bhasin, Naved Alam
Copyright: © 2017 |Volume: 8 |Issue: 2 |Pages: 11
ISSN: 1947-8283|EISSN: 1947-8291|EISBN13: 9781522513223|DOI: 10.4018/IJAMC.2017040103
Cite Article Cite Article

MLA

Bhasin, Harsh, and Naved Alam. "Applicability of Cellular Automata in Cryptanalysis." IJAMC vol.8, no.2 2017: pp.38-48. http://doi.org/10.4018/IJAMC.2017040103

APA

Bhasin, H. & Alam, N. (2017). Applicability of Cellular Automata in Cryptanalysis. International Journal of Applied Metaheuristic Computing (IJAMC), 8(2), 38-48. http://doi.org/10.4018/IJAMC.2017040103

Chicago

Bhasin, Harsh, and Naved Alam. "Applicability of Cellular Automata in Cryptanalysis," International Journal of Applied Metaheuristic Computing (IJAMC) 8, no.2: 38-48. http://doi.org/10.4018/IJAMC.2017040103

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Cryptanalysis refers to finding the plaintext from the given cipher text. The problem reduces to finding the correct key from a set of possible keys, which is basically a search problem. Many researchers have put in a lot of effort to accomplish this task. Most of the efforts used conventional techniques. However, soft computing techniques like Genetic Algorithms are generally good in optimized search, though the applicability of such techniques to cryptanalysis is still a contentious point. This work carries out an extensive literature review of the cryptanalysis techniques, finds the gaps there in, in order to put the proposed technique in the perspective. The work also finds the applicability of Cellular Automata in cryptanalysis. A new technique has been proposed and verified for texts of around 1000 words. Each text is encrypted 10 times and then decrypted using the proposed technique. The work has also been compared with that employing Genetic Algorithm. The experiments carried out prove the veracity of the technique and paves way of Cellular automata in cryptanalysis. The paper also discusses the future scope of the work.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.