CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Various Approaches towards Cryptanalysis

by Shaligram Prajapat, Ramjeevan Singh Thakur
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 127 - Number 14
Year of Publication: 2015
Authors: Shaligram Prajapat, Ramjeevan Singh Thakur
10.5120/ijca2015906518

Shaligram Prajapat, Ramjeevan Singh Thakur . Various Approaches towards Cryptanalysis. International Journal of Computer Applications. 127, 14 ( October 2015), 15-24. DOI=10.5120/ijca2015906518

@article{ 10.5120/ijca2015906518,
author = { Shaligram Prajapat, Ramjeevan Singh Thakur },
title = { Various Approaches towards Cryptanalysis },
journal = { International Journal of Computer Applications },
issue_date = { October 2015 },
volume = { 127 },
number = { 14 },
month = { October },
year = { 2015 },
issn = { 0975-8887 },
pages = { 15-24 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume127/number14/22797-2015906518/ },
doi = { 10.5120/ijca2015906518 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:18:00.510259+05:30
%A Shaligram Prajapat
%A Ramjeevan Singh Thakur
%T Various Approaches towards Cryptanalysis
%J International Journal of Computer Applications
%@ 0975-8887
%V 127
%N 14
%P 15-24
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Cryptanalysis is very important step for auditing and checking strength of any cryptosystem. Some of these cryptosystem ensures confidentiality and security of large information exchange from source to destination using symmetric key cryptography. The cryptanalyst investigates the strength and identifies the weakness of the key as well as enciphering algorithm. With the increase in key size, the time and effort required predicting the correct key increases. So, the Trend of increasing key size from 1 Byte to 8 Bytes to strengthen the cryptosystem and hence algorithm continues with compromise on the cost of time and computation. Automatic Variable Key (AVK) based symmetric key cryptosystem is an alternative to this style by fixing up key size and adding security level direction. Whenever any new cryptographic method is invented to replace existing vulnerable cryptographic method, it’s deep analysis from all perspectives (Hacker / Cryptanalyst as well as User) is desirable and proper study and evaluation of its performance is must. New cryptic techniques may exploit benefits of advances in computational methods like ANN, GA, SI etc. These techniques for cryptanalysis are changing drastically to reduce cryptographic complexity. In this paper a detailed survey and direction of development work has been conducted. The work compares these new methods with state of art approaches and presents future scope and directions from the cryptic mining perspectives.

References
  1. Khadivi P, Momtazpour M. “Cipher text classification using data mining”, International Symposium on Advanced Networks and Telecommunication Systems IEEE- ANTS, pp.64-66, 2010.
  2. Shivendra Mishra, Dr. Aniruddha Bhattacharya , “Pattern analysis of cipher text : a combined approach”, proceeding of Recent Trends in Information Technology (ICRTIT), 2013 International Conference on ,25-27 July 2013,393-398, DOI:10.1109/ICRTIT.2013.6844236.
  3. Sushila Omer Sharif, saad P. Mansoor , “Performance evaluation of classifiers of encryption algorithm”, ACEEE International Journal on Network Security , Vol. 02, No. 04, Oct 2011
  4. S. Swapna, A. D. Dileep, C. Chandra Sekhar, and Sri Kant, “Block cipher identification using support vector classification and regression”, Journal of Discrete Mathematical Sciences and Cryptography, vol. 13, no. 4, pp. 305-318, August 2010.
  5. Malte Nuhn, Kevin Knight , “Cipher type detection”, http://www-i6.informatik.rwth-aachen.de/~nuhn/2014-classification-poster.pdf, pp.1769–1773,2014
  6. Sambasiva Rao Baragad, P. Satyanarayana Redd “Studies on the advancements of Nerual Networks and Neural Network based cryptanalytic works”, International Journal of Emerging Trends & Technology in Computer Science (IJETTCS),Volume 2, Issue 5, September – October 2013 ISSN 2278-6856
  7. E.C. Laskari, G.C. Meletio, Y.C. Stamatiou, M.N. Vrahatis ,“Cryptography and Cryptanalysis through Computational Intelligence”, proceeding of Computational Intelligence in Information Assurance and Security, Studies in Computational Intelligence Volume 57, 2007, pp 1-49
  8. A.J. Bagnall, G.P. Mckeown, V.J. Rayward Smith , “Cryptanalysis of a three rotor machine using a genetic algorithm”, In proceedings of 7th International Conference on genetic algorithms,ICGA97,1997
  9. Whitefield Diffe, Martin E. Hellman , “New Directions in cryptography”, IEEE Transactions on Information theory, VOL. IT-22, NO. 6, NOVEMBER 1976, pp.644-654,1976
  10. Weiqing Jin , “Fuzzy Classification Based on Fuzzy Association Rule Mining”, http://repository.lib.ncsu.edu/ir/bitstream/1840.16/5924/1/etd.pdf, 2004
  11. W. Diffie, M.E. Hellman , “Multiuser cryptographic techniques”, IEEE transaction,1976
  12. T.C. Aysal, K.E. Barner , “Sensor Data Cryptography in Wireless Sensor Networks”, Vol. 3 Issue: 2, pp.273-289,2008
  13. P. Khadivi, M. Momtazpour , “Application of Data Mining in Cryptanalysis” , pp.358-363,2009
  14. Tai-Wen Yui, Suchen Chian , “The General Neural Network Paradigm for Visual Cryptography”, Vol. 2084 , pp.196-206,2001
  15. Arne Winterhof , “Polynomial Interpolation of the Discrete Logarithm”, Vol. 25 Iss: 1, pp.63-72,2001
  16. Ragheb Toemeh, Subanagounder Arumuga “Applying genetic algorithm for searching key-space for polyalphabetic substitution cipher”, Vol. 5 Iss: 1, pp.87,2008
  17. Sandip Chakraborty, Jiban Dalal, Bikramjit Sarkar, Debaprasad Mukherjee , “Neural Synchronization based secret key exchange over public channels: A Survey”, Journal of Engineering Science and Technology Review 8 (2) (2015) 152 – 156.
  18. Elad Barkan, Eli Biham, Nathan Keller , “Instant Ciphertext-only cryptanalysis of GSM Encrypted Communication”, Advances in Cryptology - CRYPTO 2003,Lecture Notes in Computer Science Volume 2729, 2003, pp 600-616, 2003.
  19. Dileep, A.D, Sekhar, C.C. , “Identification of Block Cipher using Support Vector Machines”, 2006 International Joint Conference on Neural Networks Sheraton Vancouver Wall Centre Hotel, Vancouver, BC, Canada July 16-21, 2696 - 2701,2006.
  20. M.S. Sharaf ,“Quantum Cryptography: A New Generation of Information Technology Security System”, In proceedings of Information Technology New Generations, 2009. Sixth International Conference,27-29 April 2009, 978-0-7695-3596-8, pp.1644 - 1648 ,2009.
  21. M. Matsui , “The First Experimental Cryptanalysis of the Data Encryption”, Advances in Cryptology - CRYPT0 ’94, LNCS 839, pp. 1-1 1, 1994Vol. 839 ,1994
  22. E. Biham, A. Shamir , “Differential Cryptanalysis of DES like Cryptosystems”, Vol. 537, pp.2-21,1991
  23. G. Jakimoski, K.P. Subbalakshmi , “Cryptanalysis of Some Multimedia Encryption Schemes”, Vol. 10 Iss: 3, pp.330-338,2008
  24. Richard Spillman, Mark Janssen, Bob Nelson, Martin Kepner , “Use of a Genetic Algorithm, The cryptanalysis of Simple Substitution Ciphers”, Vol. 17 Iss: 1, pp.31-44,1993
  25. Adel A. El-Zogghabi, Amr H. Yassin, Hany H. Hussien ,“Survey Report on Cryptography Based on Neural Network”, Vol. 3 Iss: 12, pp.456-462,2013
  26. Luis Francisco, Seone Iglesias , “Probabilistic attacks on Neural Cryptography”, master thesis, Berlin, Granada, Barcelona 2009/12, may 2012.
  27. Zahir Texan , “Public Key exchange by neural network”, LNCS, http://www.cs.bilkent.edu.tr/~guvenir/courses/CS550/Workshop/Zahir_Tezcan.pdf
  28. Wolfgang Kinzel, Ido Kenter , “Neural Cryptography”, http://arxiv.org/pdf/cond-mat/0208453.pdf ,Aug 2002.
  29. Einat Kein, Rachel Mislovaty, Ido Kanter, Andreas Ruttor, Wolfgag Kinzel , “Synchronization of Neural Networks by mutual learning and its application to cryptography”, pp.689-696,2014
  30. Khalid Alallayah, Moamed Amin, Wail AbdElwahed, Alaa Ahamami , “Applying Neural Networks for simplified data encryption standard (SDES) cipher system cryptanalysis”, Vol. 9, pp.163-169,2012.
  31. R.M. Jogdand, Sahana S. Bisalpur ,“Design of an efficient neural key generation”, Vol. 2 Iss: ?, pp.60-69,2011
  32. Michal Rosen-Zvi, Ido Kanter, Wolfgang Kinzel , “Cryptography based on Neural Networks-analytical results” , 10.1088/0305-4470/35/47/104, Feb2002
  33. R. Mislovaty, E. Kein, I. Kanter, W. Kinzel ,“Security of Neural Cryptography”, http://idokanter.ph.biu.ac.il/papers/2004/Security.pdf, 2004
  34. Steve Lawrence, C. Lee Giles, Ah Chung Tsoi ,“Lessons in Neural Network Training: Over fitting may be harder than expected”, In Proceedings of the Fourteenth National Conference on Artificial Intelligence, AAAI-97 pp.540-545,1997
  35. Andreas S. Weigend (NA) “Introduction to Theory of Neural Computation”, To appear in Artificial intelligence, Elsevier Science Publisher,1993.
  36. Alexander Klimoy, Anton Mityagin, Adi Shamir, “Analysis of Neural Cryptography”, Advances in Cryptology - ASIACRYPT 2002, 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings, pp.288-298,2002, 10.1007/3-540-36178-2-18
  37. Khaled Alallayah, Mohamed Amin, Waiel Abd El-Wahed, Alaa Allhamam ,“Attack and Construction of Simulator for some of Cipher System using Neuro-Identifier”, Vol. 7, pp.365-372,2010.
  38. John A. Hertz, Ander S. Krogh, Richard G. Palmer , “Introduction to the Theory of Neural Computation”, IAJIT 1992
  39. Andreas Ruttor, W. Kinzel, Lanir Shacham, I. Kater ,“Neural cryptography with feedback”, Vol. 69 Iss: 4, ,2004
  40. R. Mislovaty, E. Klein, I Kanter, W. Kinzel “Security of Neural Cryptography”, http://www.iasj.net/iasj?func=fulltext&aId=91984,2004
  41. Baigners Thomas ,“Quantum Security of block ciphers: Design and Cryptanalysis tools”, Doctoral Thesis,2008
  42. Diffe W. Hellman, M.E. , “privacy and Authentication: An Introduction to cryptography”, Vol. 67 Iss: 3, pp.397-427,1979.
  43. Shaligram Prajapat, A. jain, R.S.Thakur, “A Novel Approach For Information Security with Automatic Variable Key Using Fibonacci Q-Matrix”, International Journal of Computer & Communication Technology (IJCCT) ISSN (ONLINE): 2231 - 0371 ISSN (PRINT): 0975 – 7449 Vol-3, Iss-3, 2012, p.p. No. 54-57.
  44. Shaligram Prajapat, R.S. Thakur et al.“Sparse approach for realizing AVK for Symmetric Key Encryption”, presented in 2 days International Research Conference on Engineering, Science and Management 2014 (IRCESM 2014), Dubai, UAE –ISBN 978-93-83303-51-9.
  45. Shaligram Prajapat, D. Rajput, R. S. Thakur, "Time variant approach towards Symmetric Key " ,IEEE Science and Information Conference 2013,October 7-9, 2013, London, UK p.p.398-405.
  46. Shaligram Prajapat, R.S.Thakur," Association Rule Extraction in AVK based cryptosystem",ICICS-2014,GOA,India,OCt. 2014.
  47. Shaligram Prajapat, R.S. Thakur, "Towards Optimum size of key for AVK based cryptosystem", Communicated and CJICT, Nigeria in June-Dec. 2015.ISSN (Online): 2354 - 3507; ISSN (Print): 2354 – 3566
  48. Shaligram Prajapat, R.S.Thakur, "Markov Analysis of AVK Approach of Symmetric Key Based Cryptosystem ",Computational Science and Its Applications, ICCSA 2015,Springer LNCS: Volume 9159, 2015, pp 164-176,Jun 2015,doi:10.1007/978-3-319-21413-9_12,ISBN:9783319214139 and 9783319214122.
  49. Shaligram Prajapat, R. S.Thakur, "Cryptic-Mining: Association Rules Extractions Using Session Log ", Computational Science and Its Applications, ICCSA 2015,Springer LNCS: Volume 9158, 2015, pp 699-711,Jun 2015,doi:10.1007/978-3-319-21413-9_12.
  50. Shaligram Prajapat, A. Thakur, K. Maheshwari and Ramjeevan Singh Thakur, “Cryptic Mining in Light of Artificial Intelligence”,In second International Conference On Advances In Computing, Control And Networking - ACCN 2015 Digital Object Identifier: 10.15224/978-1-63248-073-6-77 Publication Year: 2015, Page(s):131 – 135.
  51. Shaligram Prajapat, A.Thakur, K.Maheshwari, R.S.Thakur, “ Cryptic Minining in the light of Artificial Intelligence”,(Extended version), Published in International Journal of Advanced Computer Science and Applications(IJACSA), 6(8), 2015. (DOI):10.14569/IJACSA.2015.060808
  52. Shaligram Prajapat, G. Parmar,R.S. Thakur,” Towards investigation of efficient Cryptosystem using SGcrypter”, ICCP-2015 and (extended paper) is in press IJAER.
  53. Shaligram Prajapat, R.S. Thakur, “Stochastic and Markov Analysis of AVK based cryptosystem”, IEEE-ICCCC-2015 at MITM Indore.
Index Terms

Computer Science
Information Sciences

Keywords

cryptanalysis Hacker AI Genetic Algorithm Swarm Intelligence cipher neural network cryptography Artificial Neural Networks