CFP last date
20 May 2024
Reseach Article

Genetic Algorithm solution for Cryptanalysis of Knapsack Cipher with Knapsack Sequence of Size 16

by Dr. R. Geetha Ramani, Lakshmi Balasubramanian
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 35 - Number 11
Year of Publication: 2011
Authors: Dr. R. Geetha Ramani, Lakshmi Balasubramanian
10.5120/4446-6207

Dr. R. Geetha Ramani, Lakshmi Balasubramanian . Genetic Algorithm solution for Cryptanalysis of Knapsack Cipher with Knapsack Sequence of Size 16. International Journal of Computer Applications. 35, 11 ( December 2011), 17-23. DOI=10.5120/4446-6207

@article{ 10.5120/4446-6207,
author = { Dr. R. Geetha Ramani, Lakshmi Balasubramanian },
title = { Genetic Algorithm solution for Cryptanalysis of Knapsack Cipher with Knapsack Sequence of Size 16 },
journal = { International Journal of Computer Applications },
issue_date = { December 2011 },
volume = { 35 },
number = { 11 },
month = { December },
year = { 2011 },
issn = { 0975-8887 },
pages = { 17-23 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume35/number11/4446-6207/ },
doi = { 10.5120/4446-6207 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:21:42.535862+05:30
%A Dr. R. Geetha Ramani
%A Lakshmi Balasubramanian
%T Genetic Algorithm solution for Cryptanalysis of Knapsack Cipher with Knapsack Sequence of Size 16
%J International Journal of Computer Applications
%@ 0975-8887
%V 35
%N 11
%P 17-23
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

With growth of networked systems and applications such as e-commerce, the demand for internet security is increasing. Information can be secured using cryptography, anti-virus, malwares, spywares, firewall etc. In cryptology, cryptanalysis is a discipline where the ciphers are attacked and broke thus enabling the developers to strengthen the cipher. Nowadays cryptanalysis of ciphers is gaining popularity among the research world. One among the ciphers is the knapsack cipher. There are many methods to attack this cipher. One among them is the Genetic Algorithm (GA) approach. Using GA, researchers have attacked the knapsack cipher with a knapsack sequence of size 8. This supports the ASCII representation of the characters. The ASCII representation supports the regional languages like English, numerals and symbols. In this paper we propose the attack on knapsack cipher with knapsack sequence of size 16 using Genetic Algorithm. The increase in knapsack sequence size increases the strength of the knapsack cipher. The increase in knapsack sequence size also supports for Unicode representation. Unicode representation gives hold for many regional languages. Since any language information can be transmitted over the network, this approach supports attack on text of any language. Also there is no constraint on the length of text to be attacked. An analysis on the impact of various GA control parameters viz. initial population size, operators’ type and probability, etc are also carried out in this research work.

References
  1. B. Delman, Genetic Algorithms in Cryptography, Master of Science Thesis, Rochester Institute of Technology, 2004.
  2. Clark.A, Dawson.Ed, and Bergen.H, Combinatorial Optimisation and the Knapsack Cipher, Cryptologia, Taylor & Francis, 1996;20(1), p. 85-93.
  3. Cormen, T. H., Leiserson, C. E., Rivest, R. L., & Stein, C., Introduction to Algorithms, Second Edition. Cambridge, Boston: MIT Press, McGraw-Hill, 2001
  4. Darwin, Charles Robert, The Origin of Species Vol. XI, The Harvard Classics. NewYork: P.F. Collier &Son, 1909-14
  5. David Kahn, The Codebreakers— The Story of Secret Writing, 1967, ISBN 0-684-83130-9.
  6. Goldberg, D. E, Genetic Algorithms in Search, Optimization, and Machine Learning, Boston: Addison-Wesley, 1989.
  7. Ingo Rechenberg, Evolutionsstrategie, Stuttgart, Frommann-Holzboog, 1994.
  8. John Holland, Adaption in Natural and Artificial Systems, Ann Arbor, MI: The University of Michigan Press, 1975.
  9. Kolodziejczyk.J, Miller.J and Phillips. P, The application of genetic algorithm in cryptoanalysis of knapsack cipher, In Krasnoproshin.V, Soldek.J, Ablameyko.S and Shmerko.V (Eds.), Proceedings of Fourth International Conference PRIP ’97 Pattern Recognition and Information Processing, 1997, p. 394-401.
  10. Liddell and Scott's Greek-English Lexicon, Oxford University Press, 1984.
  11. Menezes, A., van Oorschot, P., & Vanstone. S., Handbook of Applied Crytography, Boca Raton: CRC Press, 1997.
  12. Poonam Garg and Aditya Shastri, An Improved Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm”, International Journal of Information Technology, 2006;3.
  13. Raghavan Muthuregunathan, Divya Venkataraman, and Parthiban Rajasekaran, Cryptanalysis of Knapsack Cipher using Parallel Evolutionary Computing, International Journal of Recent Trends in Engineering, Academy Publishers, 2009;1(1), p. 260-263.
  14. Spillman Richard, Cryptanalysis of knapsack ciphers using genetic Algorithms, Cryptologia, Taylor & Francis, 1993;17(4), p. 367-377.
  15. Tomassini, M, Parallel and Distributed Evolutionary Algorithms: A Review, In K. Miettinen, M. M ¨ akel¨ a, P. Neittaanm¨aki and J. Periaux (Eds.), Evolutionary Algorithms in Engineering and Computer Science, Chichester: J. Wiley and Sons, 1999, p. 113 – 133,.
  16. Tom Davis, Cryptography, 2000. Available: http://www.geometer.org/mathcircles.
  17. Yaseen, I.F.T., & Sahasrabuddhe, H.V. (1999), A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC), In Proceedings of Third International Conference on Computational Intelligence and Multimedia Applications, 1999, p. 81-85,.
  18. Tech-FAQ Available: http://www.tech-faq.com.
  19. Genetic Algorithm Available: http://en.wikipedia.org/wiki/Genetic_algorithm
  20. Genetic Algorithms Available: http://www.obitko.com/tutorials/
  21. Sinkov, A. “Elementary Cryptanalysis: A Mathematical Approach”, New York: Random House, 1968.
  22. Sean Luke, Liviu Pnait, Gabriel Balan, Sean Paus, Zbigniew Skolicki, elena Popovici, Keith Sullivan, Joseph Harrison, Jeff Baskett, Rober Hubley, Alexander Chircop, “Evolutionary Computation System in Java”. [Available at] http://cs.gmu.edu/~eclab/projects/ecj/
Index Terms

Computer Science
Information Sciences

Keywords

Cryptanalysis Genetic Algorithm (GA) Knapsack Cipher