Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers

@article{Laskari2007ApplyingEC,
  title={Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers},
  author={Elena C. Laskari and Gerasimos C. Meletiou and Yannis C. Stamatiou and Michael N. Vrahatis},
  journal={Applied Mathematics and Computation},
  year={2007},
  volume={184},
  pages={63-72}
}
In this contribution instances of a problem introduced by the differential cryptanalysis of Feistel cryptosystems are formulated as optimization tasks. The performance of Evolutionary Computation methods on these tasks is studied for a representative Feistel cryptosystem, the Data Encryption Standard. The results indicate that the proposed methodology is efficient in handling this type of problems and furthermore, that its effectiveness depends mainly on the construction of the objective… CONTINUE READING

References

Publications referenced by this paper.
Showing 1-10 of 17 references

Differential Cryptanalysis of DES-like Cryptosystems

CRYPTO • 1990
View 4 Excerpts
Highly Influenced

Cryptography and computer privacy

H. Feistel
Scientific American 228 (5) • 1973
View 4 Excerpts
Highly Influenced

Evolutionary computation based cryptanalysis : A first study

E. C. Laskaria, G. C. Meletiouc, Y. C. Stamatioud, M. N. Vrahatisa
2005
View 1 Excerpt

The particle swarm-explosion

M. Clerc, J. Kennedy
stability, and convergence in a multidimensional complex space, IEEE Transactions on Evolutionary Computation 6 (1) • 2002

Swarm Intelligence

J. Kennedy, R. Eberhart
Morgan Kaufman Publishers • 2001
View 1 Excerpt

Computational Intelligence Pc Tools [Books in Brief]

Design—Martin T. Hagan, Howard B. Demuth
IEEE Transactions on Neural Networks • 1997
View 1 Excerpt

Engineering Optimization – Theory and Practice

S. Rao
Wiley Eastern, New Delhi • 1996
View 2 Excerpts

Similar Papers

Loading similar papers…