Abstract
Between the year 1994 and 2018, a considerable new and different metaheuristic optimization techniques have been presented in the literature for automated cryptanalysis of classical transposition cipher. This paper compares the performance of these new and different metaheuristic techniques. Three main comparison measures are considered to assess the performance of presented metaheuristics: effectiveness, efficiency and success rate. It is noteworthy that among the presented metaheuristics the performance of genetic algorithm technique is best with respect to all the measures.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Goldreich, O.: P, NP, and NP-Completeness: the basics of computational complexity. Cambridge University Press, pp. 1–183 (2010)
Du, K.L., Swamy, M.N.S.: Search and optimization by metaheuristics: techniques and algorithms inspired by nature, birkhäuser, pp. 1–434 (2016)
Menezes, A.J., Van Oorschot, P.C., Vanstone, S.A.: Handbook of applied cryptography, CRC press, pp. 1–780
Stinson D.R.: Cryptography: theory and practice, CRC press, pp. 1–593 (2005)
Castro, J.C.H., Viñuela, P.I.: Evolutionary computation in computer security and cryptography. New Gener. Comput. 23(3), 193–199 (2005)
Danziger, M., Henriques, M.A.A.: Computational intelligence applied on cryptology: a brief review. IEEE Latin Am. Trans. 10(3), 1798–1810 (2012)
Awad, W.S., El-Alfy, E.S.M.: Computational intelligence in cryptology. Improving Inf. Secur. Practices Through Comput. Intell. 28, 1–17 (2015)
Holden, J.: The mathematics of secrets: cryptography from caesar ciphers to digital encryption. Princeton University Press, pp. 1–373 (2017)
Jain, A., Chaudhari, N.S.: An improved genetic algorithm and a new discrete cuckoo algorithm for solving the classical substitution cipher. Int. J. Appl. Metaheuristic Comput. (IJAMC) 10(2), 109–130 (2019)
Bhateja, A.K., Bhateja, A., Chaudhury, S., Saxena, P.K.: Cryptanalysis of vigenere cipher using cuckoo search. Appl. Soft Comput. 26, 315–324 (2015)
Giddy, J.P., Safavi-Naini, R.: Automated cryptanalysis of transposition ciphers. Comput. J. 37(5), 429–436 (1994)
Clark, A.: Modern optimisation algorithms for cryptanalysis, In: IEEE Proceedings of the Intelligent Information Systems, pp. 258–262. IEEE (1994)
Jain, A., Chaudhari, N.S.: A novel cuckoo search technique for solving discrete optimization problems. Int. J. Syst. Assur. Eng. Manag. 9(4), 972–986 (2018)
Goldberg, D.E.: Genetic algorithms. Pearson Education India
Michalewicz, Z.: Genetic algorithms+data structures=evolution programs. Springer Science & Business Media (2013)
Gonzalez, T.F. (ed.) Handbook of approximation algorithms and metaheuristics. CRC Press (2007). https://doi.org/10.1201/9781420010749
Kramer, O.: Genetic algorithm essentials. Springer (2017). https://doi.org/10.1007/978-3-319-52156-5
Kirkpatrick, S., Gelatt, C.D., Vecchi, M.P.: Optimization by simulated annealing. Science 220(4598), 671–680 (1983)
Glover, F., Laguna, M.: Tabu Search. Handbook of combinatorial optimization, pp. 3261–3362. Springer, New York (2013)
Rego, C., Alidaee, B. (eds.): Metaheuristic optimization via memory and evolution: tabu search and scatter search. Springer Science & Business Media (2006)
Matthews, R.A.: The use of genetic algorithms in cryptanalysis. Cryptologia 17(2), 187–201 (1993)
Spillman, R., Janssen, M., Nelson, B., Kepner, M.: Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia 17(1), 31–44 (1993)
Clark, A.: Optimisation heuristics for cryptology, Doctoral Dissertation, Queensland University of Technology, Australia (1998)
Dimovski, A., Gligoroski, D.: Attack on the polyalphabetic substitution cipher using a parallel genetic algorithm. Swiss-Macedonian scientific cooperation trought SCOPES project (2003)
Garg, P., Sherry, A.M.: Genetic algorithm & Tabu search attack on the mono-aiphanetic substitution cipher. Paradigm 9(1), 106–109 (2005)
Verma, A.K., Dave, M., Joshi, R.C.: Genetic algorithm and tabu search attack on the mono-alphabetic substitution cipher i adhoc networks. J. Comput. Sci. (2017)
Omran, S.S., Al-Khalid, A.S., Al-Saady, D.M.: Using genetic algorithm to break a mono-alphabetic substitution cipher. In: 2010 IEEE Conference on Open Systems (ICOS 2010), pp. 63–67. IEEE (2010)
Mudgal, P.K., Purohit, R., Sharma, R., Jangir, M.K.: Application of genetic algorithm in cryptanalysis of mono-alphabetic substitution cipher. In: 2017 International Conference on Computing, Communication and Automation (ICCCA), pp. 400–405. IEEE (2017)
Garici, M.A., Drias, H.: Cryptanalysis of substitution ciphers using scatter Search. In: LNCS Proceedings of International Work-Conference on the Interplay between Natural and Artificial Computation 2005, LNCS Springer Heidelberg, pp. 31–40 (2005)
Forsyth, W.S., Safavi-Naini, R.: Automated cryptanalysis of substitution ciphers. Cryptologia 17(4), 407–418 (1993)
Toemeh, R., Arumugam, S.: Breaking transposition cipher with genetic algorithm. Elektronika ir Elektrotechnika 79(7), 75–78 (2007)
Song, J., Yang, F., Wang, M., Zhang, H.: Cryptanalysis of transposition cipher using simulated annealing genetic algorithm. In: International Symposium on Intelligence Computation and Applications, pp. 795–802. Springer, Berlin, Heidelberg (2008)
Muhajjar, R.A.: Use of genetic algorithm in the cryptanalysis of transposition ciphers. Basrah J. Sci. 28(1A english), 49–57 (2010)
Al-Khalid, A.S., Omran, S.S., Hammood, D.A.: Using genetic algorithms to break a simple transposition cipher. In: 6th International Conference on Information Technology ICIT (2013)
Garg, P.: Genetic algorithms, tabu search, and simulated annealing: a comparison between three approaches for the cryptanalysis of transposition cipher. J. Theor. Appl. Inf. Technol. 5(4), (2009)
Mishra, G., Kaur, S.: Cryptanalysis of transposition cipher using hill climbing and simulated annealing. In: Proceedings of Fourth International Conference on Soft Computing for Problem Solving, pp. 293–302. Springer, New Delhi (2015)
Spillman, R.: Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia 17(4), 367–377 (1993)
Yaseen, I.F., Sahasrabuddhe, H.V.: A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC). In: Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA’99 (Cat. No. PR00300), pp. 81–85. IEEE (1999)
Garg, P., Shastri, A., Agarwal, D.C.: An enhanced cryptanalytic attack on knapsack cipher using genetic algorithm. Int. J. Comput. Inf. Eng. 1(12), 4071–4074 (2007)
Ramani, G., Balasubramanian, L.: Genetic algorithm solution for cryptanalysis of knapsack cipher with knapsack sequence of size 16. Int. J. Comput. Appl. 35(11), 17–23 (2011)
Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of four-round DES based on genetic algorithm. In: 2007 International Conference on Wireless Communications, Networking and Mobile Computing, pp. 2326–2329. IEEE (2007)
Vimalathithan, R., Valarmathi, M.L.: Cryptanalysis of S-DES using genetic algorithm. Int. J. Recent Trends Eng. 2(4), 76 (2009)
Sathya, S.S., Chithralekha, T., Anandakumar, P.: Nomadic genetic algorithm for cryptanalysis of DES 16. Int. J. Comput. Theory Eng. 2(3), 1793–8201 (2010)
Sharma, L., Pathak, B.K., Sharma, R.G.: Breaking of simplified data encryption standard using genetic algorithm. Global J. Comput. Sci. Technol. (2012)
Al Adwan, F., Al Shraideh, M., Al Saidat, M.S.: A genetic algorithm approach for breaking of simplified data encryption standard. Int. J. Secur. Its Appl. 9(9), 295–304 (2015)
Dworak, K., Boryczka, U.: Genetic algorithm as optimization tool for differential cryptanalysis of DES6. In: International Conference on Computational Collective Intelligence, pp. 107–116. Springer, Cham (2017)
Nalini, N., Rao, G.R.: Cryptanalysis of simplified data encryption standard via optimization heuristics. In: 2005 3rd International Conference on Intelligent Sensing and Information Processing, pp. 74–79. IEEE (2005)
Nalini, N.: Cryptanalysis of block ciphers via improved simulated annealing technique. In: 9th International Conference on Information Technology (ICIT’06), pp. 182–185. IEEE (2006)
Soyjaudah, K.M.S.: Cryptanalysis of simplified-data encryption standard using tabu search method. In: International Conference on Information Processing, pp. 561–568. Springer, Berlin, Heidelberg (2012)
Cowan, M.J.: Breaking short playfair ciphers with the simulated annealing algorithm. Cryptologia 32(1), 71–83 (2008)
Clark, J.A., Jacob, J.L., Stepney, S.: The design of S-boxes by simulated annealing. New Gener. Comput. 23(3), 219–231 (2005)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Jain, A., Sharma, P.C., Vishwakarma, S.K., Gupta, N.K., Gandhi, V.C. (2022). Metaheuristic Techniques for Automated Cryptanalysis of Classical Transposition Cipher: A Review. In: Somani, A.K., Mundra, A., Doss, R., Bhattacharya, S. (eds) Smart Systems: Innovations in Computing. Smart Innovation, Systems and Technologies, vol 235. Springer, Singapore. https://doi.org/10.1007/978-981-16-2877-1_43
Download citation
DOI: https://doi.org/10.1007/978-981-16-2877-1_43
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-2876-4
Online ISBN: 978-981-16-2877-1
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)