skip to main content
10.1145/1389095.1389425acmconferencesArticle/Chapter ViewAbstractPublication PagesgeccoConference Proceedingsconference-collections
poster

Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems

Published: 12 July 2008 Publication History

Abstract

A homophonic substitution cipher maps each plaintext letter of a message to one or more ciphertext symbols [4]. Monoalphabetic homophonic ciphers do not allow ciphertext symbols to map to more than one plaintext letter. Homophonic ciphers conceal language statistics in the enciphered messages, making statistical-based attacks more difficult. We present a dictionary-based attack using a genetic algorithm that encodes solutions as plaintext word placements subjected to constraints imposed by the cipher symbols. We test the technique using a famous cipher (with a known solution) created by the Zodiac serial killer. We present several successful decryption attempts using dictionary sizes of up to 1,600 words.

References

[1]
J. M. Carrol and S. Martin. The automated cryptanalysis of substitution ciphers. Cryptologia, X(4):193--209, 1986.
[2]
R. Graysmith. Zodiac. St. Martin's, New York NY, 1986.
[3]
T. Jakobsen. A fast method for cryptanalysis of substitution ciphers. Cryptologia, 19(3):265--274, 1995.
[4]
J. C. King and D. R. Bahler. A framework for the study of homophonic ciphers in classical encryption and genetic systems. Cryptologia, XVII(1):45--54, 1993.
[5]
M. Lucks. A constraint satisfaction algorithm for the automated decryption of simple substitution ciphers. In CRYPTO, pages 132--144, 1988.
[6]
R. A. J. Matthews. The use of genetic algorithms in cryptanalysis. 17(2):187.201, Apr. 1993. cryptanalysis; genetic algorithms; cryptographic systems; keyspaces; GENALYST.
[7]
E. Olson. Robust dictionary attack of short simple substitution ciphers. 2007.
[8]
R. Spillman, M. Janssen, B. Nelson, and M. Kepner. Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. 17(1):31--44, Jan. 1993.

Cited By

View all
  • (2022)Evolutionary computation and machine learning in securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3520304.3534087(1572-1601)Online publication date: 9-Jul-2022
  • (2021)Evolutionary computation and machine learning in cryptologyProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3449726.3461420(1089-1118)Online publication date: 7-Jul-2021
  • (2020)Evolutionary computation and machine learning in cryptologyProceedings of the 2020 Genetic and Evolutionary Computation Conference Companion10.1145/3377929.3389886(1147-1173)Online publication date: 8-Jul-2020
  • Show More Cited By

Index Terms

  1. Evolutionary algorithm for decryption of monoalphabetic homophonic substitution ciphers encoded as constraint satisfaction problems

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      GECCO '08: Proceedings of the 10th annual conference on Genetic and evolutionary computation
      July 2008
      1814 pages
      ISBN:9781605581309
      DOI:10.1145/1389095
      • Conference Chair:
      • Conor Ryan,
      • Editor:
      • Maarten Keijzer
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 July 2008

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. codebreaking
      2. constraint satisfaction
      3. cryptography
      4. evolutionary computing
      5. genetic algorithms
      6. homophonic substitution
      7. zodiac killer
      8. zodiac murder ciphers

      Qualifiers

      • Poster

      Conference

      GECCO08
      Sponsor:

      Acceptance Rates

      Overall Acceptance Rate 1,669 of 4,410 submissions, 38%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 08 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Evolutionary computation and machine learning in securityProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3520304.3534087(1572-1601)Online publication date: 9-Jul-2022
      • (2021)Evolutionary computation and machine learning in cryptologyProceedings of the Genetic and Evolutionary Computation Conference Companion10.1145/3449726.3461420(1089-1118)Online publication date: 7-Jul-2021
      • (2020)Evolutionary computation and machine learning in cryptologyProceedings of the 2020 Genetic and Evolutionary Computation Conference Companion10.1145/3377929.3389886(1147-1173)Online publication date: 8-Jul-2020
      • (2018)Cryptanalysis of Mono-Alphabetic Substitution Ciphers using Genetic Algorithms and Simulated AnnealingIARS International Research Journal10.51611/iars.irj.v8i1.2018.848:1Online publication date: 8-Feb-2018
      • (2018)Hybrid Obfuscation to Protect Against Disclosure Attacks on Embedded MicroprocessorsIEEE Transactions on Computers10.1109/TC.2017.264952067:3(307-321)Online publication date: 1-Mar-2018
      • (2012)Decoding running key ciphersProceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Short Papers - Volume 210.5555/2390665.2390686(80-84)Online publication date: 8-Jul-2012
      • (2011)Bayesian inference for Zodiac and other homophonic ciphersProceedings of the 49th Annual Meeting of the Association for Computational Linguistics: Human Language Technologies - Volume 110.5555/2002472.2002504(239-247)Online publication date: 19-Jun-2011

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media