Microsoft Word 26050949 cameraReadyPaper doc


Running time comparision of



Download 184,03 Kb.
Pdf ko'rish
bet8/9
Sana30.06.2022
Hajmi184,03 Kb.
#721134
1   2   3   4   5   6   7   8   9
Running time comparision of 
Evolutionary computation 
algorithms
0
5
10
15
20
100 200 300 400 50
0
600 70
0
800 900 100
0
Amount of Cipher text
R
unni
n
g
 t
im
e
 i
n
 Mi
n
MA
GA
SA
Figure 7
: The running time comparison of evolutionary 
computation algorithms

VII.
C
ONCLUSION
In this paper we have presented a memetic algorithm, genetic 
algorithm and simulated annealing approach for the 
cryptanalysis of simplified data encryption standard algorithm 
– A challenging optimization problem in NP-Hard 
combinatorial problem. Our objective is to determine the 
performance of memetic algorithm in comparison with genetic 
algorithm and simulated annealing for the cryptanalysis of 
SDES. The first performance comparison was made on the 
average number of key elements (out of 10) correctly 
recovered versus the amount of ciphertext. Our experimental 
result shows that memetic algorithm is slightly superior for 
finding the number of keys accurately in comparison of 
genetic algorithm because search technique is incorporated in
the algorithm and the solution space is better searched. The 
second comparison was made upon the computation time for 
recovering the keys from the search space. From the extensive 
experiments, it was found that simulated annealing 
algorithm can be seen to be the most efficient algorithm as 
almost same keys is achieved in shorter time but in contrast 
for a large amount of cipher text the memetic algorithm can be 
seen outperform simulated algorithm. Result indicates that 
memetic algorithm is extremely powerful technique for the 
cryptanalysis of SDES. 
 
R
EFERENCES
[1] 
Davis, L. , “Handbook of Genetic Algorithms”, Van
Nostrand Reinhold, New York ,1991. 
[2] 
Garg Poonam, Sherry A.M., Genetic algorithm & 
tabu search attack on the monoalphabetic 
substitution cipher, Paradime Vol IX no.1, January-
June 2005,pg 106-109
[3] 
Garg Poonam, Shastri Aditya, Agarwal D.C, Genetic 
Algorithm, Tabu Search & Simulated annealing 
Attack on Transposition Cipher ,proceeding of 
Third AIMS International conference on management 
at IIMA – 2006, pg 983-989 
[4]
Garg Poonam, Shastri Aditya,
An improved 
cryptanalytic attack on knapsack cipher using genetic 
algorithm approach, International journal of 
information technology, volume 3 number 3 2006, 
ISSN 1305-2403, 145-152 
[5] 
Garg Poonam, Genetic Algorithm Attack 
on Simplified Data Encryption Standard Algorithm,
International journal Research in Computing Science, 
ISSN 1870-4069, 2006.
[6] 
Garg Poonam, Memetic Algorithm Attack 
on Simplified Data Encryption Standard Algorithm,
proceeding of International Conference on Data 
Management, February 2008, pg 1097-1108 .
[7] 
Goldberg, D.E., “Genetic Algorithms in Search, 
Optimization and Machine Learning”, Addison-
Wesley, Reading, 1989. 
[8]
Giddy J. P and Safavi-Naini R., Automated 
cryptanalysis of transposition ciphers, The Computer 
Journal, Vol 37, No. 5, 1994. 
[9]
Gr¨undlingh, W. & van Vuuren, J. H., Using Genetic 
Algorithms to Break a Simple Cryptographic Cipher, 
Retrieved March 31, 2003 from 


(IJCSIS) International Journal of Computer Science and Information Security,
Vol. 1, No. 1, May 2009 
http://dip.sun.ac.za/˜vuuren/abstracts/abstr 
genetic.htm, submitted 2002. 
[10] Holland, J., “Adaptation in Natural and Artificial
Systems”, University of Michigan Press, Ann Arbor, 
1975. 
[11] Kolodziejczyk, J., Miller, J., & Phillips, P. ,The 
application of genetic algorithm in cryptoanalysis of 
knapsack cipher, In Krasnoproshin, V., Soldek, J., 
1997 
[12] 
Kirkpatrick S., Gelatt C. D., Jr., and Vecchi M. P., 
“Optimization by simulated annealing”, 
Science, 
220(4598):671–680, 1983. 
[13] 
Nalini, Cryptanalysis of Simplified data encryption 
standard via Optimization heuristics, International 
Journal of Computer Sciences and network security, 
vol 6, No 1B, Jan 2006
[14] 
P. Men and B. Freisleben, “Memetic Algorithms for 
the Traveling Salesman Problem,” Complex Systems, 
13(4):297-345. 2001. 
[15] P, Moscato, “on evolution, scorch, optimization. 
genetic algorithms and martial arts: toward memetic 
olgorithms“, Technical report, California, 1989.
 
[16] 
Spillman et. al., Use of a genetic algorithm in the 
cryptanalysis of simple substitution ciphers, 
Cryptologia, 17(1):187-201, April 1993.
[17]
Spillman R.,Cryptanalysis of knapsack ciphers using 
genetic algorithms. Cryptologia, 17(4):367–377, 
October 1993.
[18]
Schaefer E, A simplified data encryption standard 
algorithm, Cryptologia, Vol 20, No 1, 77-84, 1996. 
[19] 
Yaseen, I.F.T., & Sahasrabuddhe, H.V. (1999), A 
genetic algorithm for the Cryptanalysis of Chor-
Rivest knapsack public key cryptosystem (PKC), In 
Proceedings of Third International Conference on 
Computational Intelligence and Multimedia 
Applications, pp. 81-85, 1999 
A
UTHOR 
P
ROFILE

Download 184,03 Kb.

Do'stlaringiz bilan baham:
1   2   3   4   5   6   7   8   9




Ma'lumotlar bazasi mualliflik huquqi bilan himoyalangan ©www.hozir.org 2024
ma'muriyatiga murojaat qiling

kiriting | ro'yxatdan o'tish
    Bosh sahifa
юртда тантана
Боғда битган
Бугун юртда
Эшитганлар жилманглар
Эшитмадим деманглар
битган бодомлар
Yangiariq tumani
qitish marakazi
Raqamli texnologiyalar
ilishida muhokamadan
tasdiqqa tavsiya
tavsiya etilgan
iqtisodiyot kafedrasi
steiermarkischen landesregierung
asarlaringizni yuboring
o'zingizning asarlaringizni
Iltimos faqat
faqat o'zingizning
steierm rkischen
landesregierung fachabteilung
rkischen landesregierung
hamshira loyihasi
loyihasi mavsum
faolyatining oqibatlari
asosiy adabiyotlar
fakulteti ahborot
ahborot havfsizligi
havfsizligi kafedrasi
fanidan bo’yicha
fakulteti iqtisodiyot
boshqaruv fakulteti
chiqarishda boshqaruv
ishlab chiqarishda
iqtisodiyot fakultet
multiservis tarmoqlari
fanidan asosiy
Uzbek fanidan
mavzulari potok
asosidagi multiservis
'aliyyil a'ziym
billahil 'aliyyil
illaa billahil
quvvata illaa
falah' deganida
Kompyuter savodxonligi
bo’yicha mustaqil
'alal falah'
Hayya 'alal
'alas soloh
Hayya 'alas
mavsum boyicha


yuklab olish