A Review on Metaheuristic Techniques in Automated Cryptanalysis of Classical Substitution Cipher

2021 ◽  
pp. 323-332
Author(s):  
Ashish Jain ◽  
Prakash C. Sharma ◽  
Nirmal K. Gupta ◽  
Santosh K. Vishwakarma
2019 ◽  
Vol 10 (2) ◽  
pp. 109-130 ◽  
Author(s):  
Ashish Jain ◽  
Narendra S. Chaudhari

Searching secret key of classical ciphers in the keyspace is a challenging NP-complete problem that can be successfully solved using metaheuristic techniques. This article proposes two metaheuristic techniques: improved genetic algorithm (IGA) and a new discrete cuckoo search (CS) algorithm for solving a classical substitution cipher. The efficiency and effectiveness of the proposed techniques are compared to the existing tabu search (TS) and genetic algorithm (GA) techniques using three criteria: (a) average number of key elements correctly detected, (b) average number of keys examined before determining the required key, and (c) the mean performance time. As per the results obtained, the improved GA is comparatively better than the existing GA for criteria (a) and (c), while the proposed CS strategy is significantly better than rest of the algorithms (i.e., GA, IGA, and TS) for all three criteria. The obtained results indicate that the proposed CS technique can be an efficient and effective option for solving other similar NP-complete combinatorial problems also.


Author(s):  
Ashish Jain ◽  
Narendra S. Chaudhari

Searching secret key of classical ciphers in the keyspace is a challenging NP-complete problem that can be successfully solved using metaheuristic techniques. This article proposes two metaheuristic techniques: improved genetic algorithm (IGA) and a new discrete cuckoo search (CS) algorithm for solving a classical substitution cipher. The efficiency and effectiveness of the proposed techniques are compared to the existing tabu search (TS) and genetic algorithm (GA) techniques using three criteria: (a) average number of key elements correctly detected, (b) average number of keys examined before determining the required key, and (c) the mean performance time. As per the results obtained, the improved GA is comparatively better than the existing GA for criteria (a) and (c), while the proposed CS strategy is significantly better than rest of the algorithms (i.e., GA, IGA, and TS) for all three criteria. The obtained results indicate that the proposed CS technique can be an efficient and effective option for solving other similar NP-complete combinatorial problems also.


2018 ◽  
Vol 6 (5) ◽  
pp. 51-58
Author(s):  
Ranju S Kartha ◽  
◽  
◽  
Varghese Paul
Keyword(s):  

Mathematics ◽  
2021 ◽  
Vol 9 (3) ◽  
pp. 225
Author(s):  
José García ◽  
Gino Astorga ◽  
Víctor Yepes

The optimization methods and, in particular, metaheuristics must be constantly improved to reduce execution times, improve the results, and thus be able to address broader instances. In particular, addressing combinatorial optimization problems is critical in the areas of operational research and engineering. In this work, a perturbation operator is proposed which uses the k-nearest neighbors technique, and this is studied with the aim of improving the diversification and intensification properties of metaheuristic algorithms in their binary version. Random operators are designed to study the contribution of the perturbation operator. To verify the proposal, large instances of the well-known set covering problem are studied. Box plots, convergence charts, and the Wilcoxon statistical test are used to determine the operator contribution. Furthermore, a comparison is made using metaheuristic techniques that use general binarization mechanisms such as transfer functions or db-scan as binarization methods. The results obtained indicate that the KNN perturbation operator improves significantly the results.


2021 ◽  
Vol 1767 (1) ◽  
pp. 012048
Author(s):  
M Dharshini ◽  
K Gayathri ◽  
S Renuga Devi ◽  
B Gopalakrishnan
Keyword(s):  

2019 ◽  
Vol 13 (7) ◽  
pp. 1009-1023 ◽  
Author(s):  
Muhammad Naveed Akhter ◽  
Saad Mekhilef ◽  
Hazlie Mokhlis ◽  
Noraisyah Mohamed Shah

Sign in / Sign up

Export Citation Format

Share Document