Skip to main content

Genetic Algorithm in Stream Cipher Cryptanalysis

  • Conference paper
  • First Online:
Computational Collective Intelligence

Part of the book series: Lecture Notes in Computer Science ((LNAI,volume 9330))

Abstract

Cryptography nowadays is a very important field of protecting information from falling into wrong hands. One of modern cryptography branch is stream cipher cryptography. This paper focuses on cryptanalysis of such ciphers using genetic algorithm. Genetic algorithm as one of optimisation methods isn’t quite obvious to use in the field of cryptography, nevertheless it can give interesting results. In this article authors look for the shortest equivalent linear system which approximate given keystream with linear shift feedback register.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. RC4 Source Code. Cypherpunks, September 1994. http://cypherpunks.venona.com/archive/1994/09/msg00304.html

  2. Glover, F.: Future Paths for Integer Programming and Links to Artificial Intelligence. Comput. Oper. Res. 13(5), 533–549 (1986)

    Article  MathSciNet  MATH  Google Scholar 

  3. Goldberg, D.E.: Genetic algorithms in search, optimization, and machine learning, 3rd edn. Wydawnictwa Naukowo-Techniczne, Warszawa (2003). (in Polish)

    Google Scholar 

  4. Holland, J.H.: Adaptation in Natural and Artificial Systems. University of Michigan Press, Ann Arbor (1975)

    Google Scholar 

  5. Hospodar, G., Gierlichs, B., De Mulder, E., Verbauwhede, I., Vandewalle, J.: Machine learning in side-channel analysis: a first study. Journal of Cryptographic Engineering 1(4), 293–302 (2011)

    Article  Google Scholar 

  6. Itaim, P., Riff, M.C.: Applying Differential Cryptanalysis for XTEA using a Genetic Algorithm (2008)

    Google Scholar 

  7. Kaream, H.A.: Attacking stream cipher systems using genetic algorithm. Master’s thesis, College of Science, University of Basrah, August 2000

    Google Scholar 

  8. Laskari, E.C., Meletiou, G.C., Stamatiou, Y.C., Vrahatis, M.N.: Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers. Applied Mathematics and Computation 184(1), 63–72 (2007). Special issue of the International Conference on Computational Methods in Sciences and Engineering 2004 (ICCMSE-2004)

    Article  MathSciNet  MATH  Google Scholar 

  9. Polak, I., Boryczka, M.: Breaking LFSR using genetic algorithm. In: Bǎdicǎ, C., Nguyen, N.T., Brezovan, M. (eds.) ICCCI 2013. LNCS, vol. 8083, pp. 731–738. Springer, Heidelberg (2013)

    Google Scholar 

  10. Polak, I., Boryczka, M.: Cryptoanalysis of A5/1 and A5/2 using genetic algorithm. In: Systemy Inteligencji Obliczeniowej, pp. 145–153. Instytut Informatyki Uniwersytetu Śląskiego, Katowice (2014). (in Polish)

    Google Scholar 

  11. Selvi, G., Purusothaman, T.: Cryptanalysis of Simple Block Ciphers using Extensive Heuristic Attacks. European Journal of Scientific Research 78(2), 198–221 (2012)

    Google Scholar 

  12. Song, J., Zhang, H., Meng, Q., Wang, Z.: Cryptanalysis of four-round DES based on genetic algorithm. In: International Conference on Wireless Communications, Networking and Mobile Computing, WiCom 2007, pp. 2326–2329, September 2007

    Google Scholar 

  13. Strombergson, J., Josefsson, S.: Test Vectors for the Stream Cipher RC4, May 2011

    Google Scholar 

  14. Younis, H.A., Awad, W.S., Abd, A.A.: Attacking of Stream Cipher Systems Using a Genetic Algorithm. Journal of University of Thi-Qar 8(3), 78–84 (2013)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Iwona Polak .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Polak, I., Boryczka, M. (2015). Genetic Algorithm in Stream Cipher Cryptanalysis. In: Núñez, M., Nguyen, N., Camacho, D., Trawiński, B. (eds) Computational Collective Intelligence. Lecture Notes in Computer Science(), vol 9330. Springer, Cham. https://doi.org/10.1007/978-3-319-24306-1_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-24306-1_15

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-24305-4

  • Online ISBN: 978-3-319-24306-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics