• Corpus ID: 17562611

Automated Cryptanalysis of Monoalphabetic Substitution Ciphers Using Stochastic Optimization Algorithms

@inproceedings{Hilton2012AutomatedCO,
  title={Automated Cryptanalysis of Monoalphabetic Substitution Ciphers Using Stochastic Optimization Algorithms},
  author={Rod Hilton},
  year={2012}
}
  • Rod Hilton
  • Published 2012
  • Computer Science, Mathematics
All forms of symmetric encryption take a key shared between a small group of people and encode data using this key so that only those with the key are able to decrypt it. Encryption algorithms tend to rely on problems that are computationally intractable for security, but even more generally these algorithms rely on a fundamental assumption: that the number of potential keys is so large that it cannot be searched via brute force for the correct key in a reasonable amount of time. Certain… 

Figures from this paper

An automatic cryptanalysis of simple substitution ciphers using compression
TLDR
This paper presents how a Prediction by Partial Matching text compression scheme, a method that shows a high level of performance when applied to different natural language processing tasks, can also be used for the automatic decryption of simple substitution ciphers.
Compression-based methods for the automatic cryptanalysis of classical ciphers
TLDR
The study has shown how a good model of the source (i.e. the PPM compression model) can also be effectively used in the automatic decryption of different classical ciphers, and highlighted why better models are of vital importance in cryptology.
A Binomial Crossover Based Artificial Bee Colony Algorithm for Cryptanalysis of Polyalphabetic Cipher
TLDR
It is shown that optimal cryptanalysis keys produced by BCABC are notably competitive and better than those produced by basic ABC for Vigenere cipher analysis.
Finding Data in DNA: Computer Forensic Investigations of Living Organisms
TLDR
A software toolkit that detects the presence of a hidden message within a DNA sequence, and deciphers that message, and modifying several existing cryptanalysis tools that have been developed for solving simple substitution ciphers and comparing their performance.
Bulletin of Electrical Engineering and Informatics
TLDR
An alternative sentence weighting method by incorporating news features, POS tagging, and sentence relevance to the title is presented, and the proposed method achieved better results.
A forensics software toolkit for DNA steganalysis.

References

SHOWING 1-10 OF 29 REFERENCES
Automated Cryptanalysis of Substitution Ciphers
TLDR
Simulated annealing is used to provide an automated method for the cryptanalysis of mono-alphabetic substitution ciphers and it is shown that it provides a simple, fast and elegant solution to the crypt analysis problem which is also promising for more complex types of block cipher.
A cryptanalytic attack on Vigenère cipher using genetic algorithm
TLDR
The cryptanalysis of a poly alphabetic substitution cipher (Vigenère cipher) by applying genetic algorithms is presented and the applicability of genetic algorithms for searching the key space of encryption scheme is studied.
Genetic Algorithm and Tabu Search Attack on the Mono-Alphabetic Subsitution Cipher in Adhoc Networks
TLDR
This study presents a cryptanalysis method based on Genetic Algorithm and Tabu Search to break a Mono-Alphabetic Substitution Cipher in Adhoc networks and compares and analyzed the performance of these algorithms in automated attacks on Mono-alphabetic Substitutes Cipher.
Using Genetic Algorithm to break a mono - alphabetic substitution cipher
TLDR
This work is trying to explore the use of Genetic Algorithms in cryptography by focusing on substitution cipher, the principles of which form the foundation for many of the modern cryptosystems.
Introduction To Cryptography With Java Applets
TLDR
The author has developed various Java crypto classes to perform these functions, and many programming exercises are assigned to the reader, and the reader should be someone with a basic working knowledge of Java, but knowledge of number theory or cryptography is not necessary.
Introduction to Cryptography with Coding Theory
TLDR
A full chapter on error correcting codes introduces the basic elements of coding theory and provides a flexible organization, as each chapter is modular and can be covered in any order.
A Parallel Genetic Algorithm for Cryptanalysis of the Polyalphabetic Substitution Cipher
TLDR
A new method for attacking the simple substitution cipher is presented which utilises a parallel version of the genetic algorithm which allows communication between a number of parallel nodes each solving a separate part of the problem.
A hybrid Firefly Algorithm using genetic operators for the cryptanalysis of a monoalphabetic substitution cipher
  • Jitin Luthra, S. Pal
  • Computer Science
    2011 World Congress on Information and Communication Technologies
  • 2011
TLDR
This paper discusses the integration of the operators of mutation and crossover commonly used in Genetic Algorithms with the Firefly Algorithm for cryptanalysis of the monoalphabetic substitution cipher.
Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization
  • M. F. Uddin, A. Youssef
  • Computer Science, Mathematics
    2006 IEEE International Conference on Evolutionary Computation
  • 2006
TLDR
This work investigates the use of Particle Swarm Optimization in automated cryptanalysis of classical simple substitution ciphers and shows that PSO-based attacks proved to be very effective on various sets of encoding keys.
Use of a genetic algorithm in the crypt-analysis of simple substitution ciphers
TLDR
It is shown that such a algorithm could be used to discover the key for a simple substitution cipher using a directed random search algorithm called a genetic algorithm.
...
...