skip to main content
10.1145/1389095.1389297acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
poster

Cryptanalysis using genetic algorithms

Published: 12 July 2008 Publication History

Abstract

Genetic algorithms were used for the cryptanalysis of a number of classical cryptosystems. The results of applying a number of GA implementations to various ciphers are presented. The selection of appropriate mutation operators and fitness functions is also discussed.

References

[1]
K. P. Bergmann, Cryptanalysis Using Nature-Inspired Optimization Algorithms, University of Calgary, 2006, Technical Report 2008-894-07.
[2]
B. Delman, Genetic Algorithms in Cryptography, Rochester Institute of Technology, 2004
[3]
National Institute of Standards and Technology, FIPS Publication 46: Announcing the Data Encryption Standard. FIPS, Jan. 1977
[4]
National Institute of Standards and Technology, FIPS Publication 197: Announcing the Advanced Encryption Standard (AES). FIPS, Nov. 2001
[5]
W. Friedman, The Index of Coincidence and Its Applications in Cryptography. Riverbank Labs, 1920
[6]
J. H. Holland, Adaptation in Natural and Artificial Systems. The University of Michigan Press, Ann Arbor, MI, 1975
[7]
A. J. Menezes and P. C. van Oorschot and S. A. Vanstone, Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, 1997

Cited By

View all
  • (2024)Red deer algorithm to detect the secret key of the monoalphabetic cryptosystemSoft Computing10.1007/s00500-024-09849-y28:17-18(10569-10582)Online publication date: 5-Aug-2024
  • (2021)A Proposed Genetic Algorithm Attack for Public Key Cryptosystem2021 7th International Engineering Conference “Research & Innovation amid Global Pandemic" (IEC)10.1109/IEC52205.2021.9476146(194-199)Online publication date: 24-Feb-2021
  • (2020)A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPUCryptography10.4018/978-1-7998-1763-5.ch012(193-213)Online publication date: 2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
GECCO '08: Proceedings of the 10th annual conference on Genetic and evolutionary computation
July 2008
1814 pages
ISBN:9781605581309
DOI:10.1145/1389095
  • Conference Chair:
  • Conor Ryan,
  • Editor:
  • Maarten Keijzer
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 12 July 2008

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. cryptanalysis
  2. genetic algorithms
  3. security

Qualifiers

  • Poster

Conference

GECCO08
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)2
  • Downloads (Last 6 weeks)0
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Red deer algorithm to detect the secret key of the monoalphabetic cryptosystemSoft Computing10.1007/s00500-024-09849-y28:17-18(10569-10582)Online publication date: 5-Aug-2024
  • (2021)A Proposed Genetic Algorithm Attack for Public Key Cryptosystem2021 7th International Engineering Conference “Research & Innovation amid Global Pandemic" (IEC)10.1109/IEC52205.2021.9476146(194-199)Online publication date: 24-Feb-2021
  • (2020)A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPUCryptography10.4018/978-1-7998-1763-5.ch012(193-213)Online publication date: 2020
  • (2018)Real-Time Analysis of Big Network Packet Streams by Learning the Likelihood of Trusted SequencesBig Data – BigData 201810.1007/978-3-319-94301-5_4(43-56)Online publication date: 21-Jun-2018
  • (2016)A Novel Approach of Symmetric Key Cryptography using Genetic Algorithm Implemented on GPGPUEmerging Research Surrounding Power Consumption and Performance Issues in Utility Computing10.4018/978-1-4666-8853-7.ch014(283-303)Online publication date: 2016
  • (2016)An Automatic Cryptanalysis of Transposition Ciphers Using CompressionCryptology and Network Security10.1007/978-3-319-48965-0_3(36-52)Online publication date: 28-Oct-2016
  • (2011)An Effortless Cryptanalytic Attack on Knapsack Cipher2011 International Conference on Process Automation, Control and Computing10.1109/PACC.2011.5979040(1-6)Online publication date: Jul-2011
  • (2010)Genetic CryptanalysisNetworked Digital Technologies10.1007/978-3-642-14292-5_34(321-332)Online publication date: 2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media