Accelerating the world's research. A comparison between Memetic



Download 0,66 Mb.
Pdf ko'rish
bet10/11
Sana30.06.2022
Hajmi0,66 Mb.
#721196
1   2   3   4   5   6   7   8   9   10   11
Bog'liq
A Comparison bet Memetic alg and Genetic alg for the cryptanalysis of Simplified Data Encryption Standard Algo-with-cover-page-v2

Accuracy comaparision of the two algorithm
0
2
4
6
8
10
100 200 300 400 500 600 700 800 900 1000
Amount of cipher text
A
ccu
racy o

n
u
m
b
er
 o

b
its
 m
a
tc
h
e
d
MA
GA


International Journal of Network Security & Its Applications (IJNSA), Vol.1, No 1, April 2009 
41
Our objective is to determine the performance of memetic algorithm in comparison with genetic algorithm 
for the cryptanalysis of SDES. The first performance comparison was made on the average number of key 
elements (out of 10) correctly recovered versus the amount of ciphertext. Our experimental result shows 
that memetic algorithm is slightly superior for finding the number of keys accurately in comparison of 
genetic algorithm because search technique is incorporated in genetic algorithm and the solution space is 
better searched. The second comparison was made upon the computation time for recovering the keys 
from the search space. From the extensive experiments, it was found that genetic algorithm can be seen to 
be the most efficient algorithm as almost same keys is achieved in shorter time but in contrast for a large 
amount of cipher text the memetic algorithm can be seen outperform genetic algorithm. Result indicates 
that memetic algorithm is extremely powerful technique for the cryptanalysis of SDES. 
 
6. References 
[1] 
Davis, L. , “Handbook of Genetic Algorithms”, Van Nostrand Reinhold, New York ,1991. 
[2] 
Garg Poonam, Sherry A.M., Genetic algorithm & tabu search attack on the monoalphabetic
substitution cipher, Paradime Vol IX no.1, January-June 2005,pg 106-109
[3] 
Garg Poonam, Shastri Aditya, Agarwal D.C, Genetic Algorithm, Tabu Search & Simulated
annealing Attack on Transposition Cipher ,proceeding of Third AIMS International conference 
on management at IIMA – 2006, pg 983-989 
[4]
Garg Poonam, Shastri Aditya,
An improved cryptanalytic attack on knapsack cipher using genetic 
algorithm approach, International journal of information technology, volume 3 number 3 2006, 
ISSN 1305-2403, 145-152 
[5] 
Garg Poonam, Genetic Algorithm Attack on Simplified Data Encryption Standard Algorithm,
International journal Research in Computing Science, ISSN 1870-4069, 2006.
[6] 
Garg Poonam, Memetic Algorithm Attack on Simplified Data Encryption Standard Algorithm,
proceeding of International Conference on Data Management, February 2008, pg 1097-1108 .
[7] 
Goldberg, D.E., “Genetic Algorithms in Search, Optimization and Machine Learning”, Addison-
Wesley, Reading, 1989. 
[8]
Giddy J. P and Safavi-Naini R., Automated cryptanalysis of transposition ciphers, The Computer 
Journal, Vol 37, No. 5, 1994. 
[9]
Gr¨undlingh, W. & van Vuuren, J. H., Using Genetic Algorithms to Break a Simple Cryptographic 
Cipher, Retrieved March 31, 2003 from http://dip.sun.ac.za/˜vuuren/abstracts/abstr genetic.htm,
submitted 2002. 
[10] Holland, J., “Adaptation in Natural and Artificial Systems”, University of Michigan Press, Ann 
Arbor, 1975. 
[11]
Kolodziejczyk, J., Miller, J., & Phillips, P. ,The application of genetic algorithm in cryptoanalysis 
of knapsack cipher, In Krasnoproshin, V., Soldek, J., 1997 
[12] 
Methew, R.A.J. (1993, April), The use of genetic algorithms in cryptanalysis, Cryptologia, 7(4),
187-201. 
[13] 
Nalini, Cryptanalysis of Simplified data encryption standard via Optimization heuristics, 
International Journal of Computer Sciences and network security, vol 6, No 1B, Jan 2006
[14] 
P. Men and B. Freisleben, “Memetic Algorithms for the Traveling Salesman Problem,” Complex 
Systems, 13(4):297-345. 2001. 
[15]
P, Moscato, “on evolution, scorch, optimization. genetic algorithms and martial arts: toward 
memetic olgorithms“, Technical report, California, 1989.
 
[16] 
Spillman et. al., Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers, 
Cryptologia, 17(1):187-201, April 1993.
[17]
Spillman R.,Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia, 17(4):367–
377, October 1993. 
[18]
Schaefer E, A simplified data encryption standard algorithm, Cryptologia, Vol 20, No 1, 77-84, 
1996. 
[19] 
Yaseen, I.F.T., & Sahasrabuddhe, H.V. (1999), A genetic algorithm for the Cryptanalysis of Chor-
Rivest knapsack public key cryptosystem (PKC), In Proceedings of Third International 
Conference on Computational Intelligence and Multimedia Applications, pp. 81-85, 1999 


International Journal of Network Security & Its Applications (IJNSA), Vol.1, No 1, April 2009 
42

Download 0,66 Mb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9   10   11




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish