메뉴 건너뛰기




Volumn 78, Issue 2, 2012, Pages 198-221

Cryptanalysis of simple block ciphers using extensive heuristic attacks

Author keywords

Bacterial foraging optimization (BFO) algorithm; Bees algorithm (BA); Cuckoo search (CS); Direct encryption standard (DES); Simplified DES (S DES)

Indexed keywords


EID: 84863311646     PISSN: 1450216X     EISSN: 1450202X     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (33)
  • 2
    • 34047158699 scopus 로고    scopus 로고
    • Attacks of simple block ciphers via efficient heuristics
    • DOI 10.1016/j.ins.2007.01.007, PII S0020025507000369
    • Nalini N and Raghavendra Rao G, "Attacks of simple block ciphers via efficient heuristics", Journal of Information Sciences, Vol.177, No. 12, p.2553-2569, June 2007, doi:10.1016/j.ins.2007.01.007. (Pubitemid 46528940)
    • (2007) Information Sciences , vol.177 , Issue.12 , pp. 2553-2569
    • Nalini, N.1    Raghavendra Rao, G.2
  • 5
    • 0028428941 scopus 로고
    • The data encryption standard (DES) and its strength against attacks
    • May, doi.10.1147/rd.383.0243
    • Coppersmith D, "The Data Encryption Standard (DES) and its strength against attacks", IBM Journal of Research and Development, Vol. 38, No.3, p.243-250, May 1994,doi.10.1147/rd.383.0243.
    • (1994) IBM Journal of Research and Development , vol.38 , Issue.3 , pp. 243-250
    • Coppersmith, D.1
  • 6
    • 77952514019 scopus 로고    scopus 로고
    • Attack of against simplified data encryption standard cipher system using neural networks
    • Khaled M. Alallayah, Waiel F. Abd El-Wahed, Mohamed Amin and Alaa H. Alhamami, "Attack of Against Simplified Data Encryption Standard Cipher System Using Neural Networks", Journal of Computer Science, Vol.6, No.1, p. 29-35, 2010.
    • (2010) Journal of Computer Science , vol.6 , Issue.1 , pp. 29-35
    • Alallayah, K.M.1    Abd El-Wahed, W.F.2    Amin, M.3    Alhamami, A.H.4
  • 7
    • 77955763039 scopus 로고    scopus 로고
    • Genetic algorithm For finding the key's length and cryptanalysis of the permutation cipher
    • Aleksey Gorodilov and Vladimir Morozenko, "Genetic algorithm For Finding The Key's Length and Cryptanalysis of the Permutation Cipher", International Journal of Information Theories & Applications, Vol.15,No.1, p.94-99,2008.
    • (2008) International Journal of Information Theories & Applications , vol.15 , Issue.1 , pp. 94-99
    • Gorodilov, A.1    Morozenko, V.2
  • 9
    • 84863309665 scopus 로고    scopus 로고
    • Cryptanalysis of block ciphers via improvised particle swarm optimization and extended simulated annealing techniques
    • May
    • Nalini N and Raghavendra Rao G, "Cryptanalysis of Block Ciphers via Improvised Particle Swarm Optimization and Extended Simulated Annealing Techniques", International Journal of Network Security, Vol.6, No.3, p.342-353, May 2008.
    • (2008) International Journal of Network Security , vol.6 , Issue.3 , pp. 342-353
    • Nalini, N.1    Raghavendra Rao, G.2
  • 11
    • 79958280063 scopus 로고    scopus 로고
    • Cryptanalysis of SDES via evolutionary computation techniques (IJCSIS)
    • May
    • Poonam Garg, Cryptanalysis of SDES via Evolutionary Computation Techniques", (IJCSIS) International Journal of Computer Science and Information Security, Vol. 1, No. 1,7 pages, May 2009.
    • (2009) International Journal of Computer Science and Information Security , vol.1 , Issue.1 , pp. 7
    • Garg, P.1
  • 13
    • 79958260960 scopus 로고    scopus 로고
    • Cryptanalysis of DES using computational intelligence
    • Vimalathithan R and Valarmathi M.L, "Cryptanalysis of DES using Computational Intelligence", WSEAS Transactions On Computers ,Vol. 10,No.7, p.210-219, 2011
    • (2011) WSEAS Transactions On Computers , vol.10 , Issue.7 , pp. 210-219
    • Vimalathithan, R.1    Valarmathi, M.L.2
  • 14
    • 70350062233 scopus 로고    scopus 로고
    • Cryptanalysis of a feistal type block cipher by feed forward neural network using right sigmoidal signals
    • Srinivasa Rao K V, Rama Krishna M and Bujji Babu D, "Cryptanalysis of a Feistal Type Block Cipher by Feed Forward Neural Network Using Right Sigmoidal Signals", International Journal of Soft Computing, Vol.4, No.3, p.131-135, 2009.
    • (2009) International Journal of Soft Computing , vol.4 , Issue.3 , pp. 131-135
    • Srinivasa Rao, K.V.1    Rama Krishna, M.2    Bujji Babu, D.3
  • 18
    • 33846373388 scopus 로고    scopus 로고
    • Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers
    • DOI 10.1016/j.amc.2005.11.176, PII S0096300306004851
    • Laskari E C, Meletiou G C, Stamatiou Y C and Vrahatis M N, "Applying evolutionary computation methods for the cryptanalysis of Feistel ciphers", Journal of Applied Mathematics and Computation-AMC , Vol.184, No. 1, p. 63-72, 2007,doi: 10.1016/j.amc.2005.11.176. (Pubitemid 46135697)
    • (2007) Applied Mathematics and Computation , vol.184 , Issue.1 SPEC. ISS. , pp. 63-72
    • Laskari, E.C.1    Meletiou, G.C.2    Stamatiou, Y.C.3    Vrahatis, M.N.4
  • 19
    • 60349092746 scopus 로고    scopus 로고
    • Genetic algorithm and tabu search attack on the mono-alphabetic subsitution cipher in adhoc networks
    • Verma A K,Mayank Dave and Joshi R C, "Genetic Algorithm and Tabu Search Attack on the Mono-Alphabetic Subsitution Cipher in Adhoc Networks", Journal of Computer Science,Vol.3,No.3,p.134-137,2007.
    • (2007) Journal of Computer Science , vol.3 , Issue.3 , pp. 134-137
    • Verma, A.K.1    Dave, M.2    Joshi, R.C.3
  • 20
    • 84863309659 scopus 로고    scopus 로고
    • A comparison of memetic & tabu search for the cryptanalysis of simplified data encryption standard algorithm
    • Apr
    • Poonam Garg," A Comparison of Memetic & Tabu Search for the Cryptanalysis of Simplified Data Encryption Standard Algorithm", Journal of Theoretical and Applied Information Technology, Vol.4, No.4, p.360-366, Apr 2008.
    • (2008) Journal of Theoretical and Applied Information Technology , vol.4 , Issue.4 , pp. 360-366
    • Garg, P.1
  • 24
    • 0024012695 scopus 로고
    • The data encryption Standard: Past and Future
    • DOI 10.1109/5.4441
    • Smid, M.E. and Branstad, D.K., "The Data Encryption Standard: Past and Future", Proceedings of the IEEE, Vol.76, No. 5, p.550-559, May 1988, doi: 10.1109/5.4441. (Pubitemid 18665558)
    • (1988) Proceedings of the IEEE , vol.76 , Issue.5 , pp. 550-559
    • Smid, M.E.1    Branstad, D.K.2
  • 25
    • 84863324337 scopus 로고    scopus 로고
    • Spiking neurons with ASNN BASED-Methods for the neural block cipher
    • August, doi: 10.5121/ijcsit.2010.2412
    • Saleh Ali K. and Al-Omari Putra Sumari, "Spiking Neurons with ASNN BASED-Methods for the Neural Block Cipher", International journal of computer science & information Technology, Vol.2, No.4, p.138-148, August 2010, doi: 10.5121/ijcsit.2010.2412.
    • (2010) International Journal of Computer Science & Information Technology , vol.2 , Issue.4 , pp. 138-148
    • Saleh Ali, K.1    Putra Sumari, A.-O.2
  • 26
    • 77955789844 scopus 로고    scopus 로고
    • Design of a two-dimensional recursive filter using the bees algorithm
    • August, doi: 10.1007/s11633-010-0520-x
    • D. T. Pham and Ebubekir Koc, "Design of a Two-dimensional Recursive Filter Using the Bees Algorithm", International Journal of Automation and Computing, Vol.7, No.3, p.399-402, August 2010, doi: 10.1007/s11633-010-0520-x.
    • (2010) International Journal of Automation and Computing , vol.7 , Issue.3 , pp. 399-402
    • Pham, D.T.1    Koc, E.2
  • 28
    • 84858658032 scopus 로고    scopus 로고
    • Improved cuckoo search algorithm for feed forward neural network training
    • July, doi : 10.5121/ijaia.2011.2304
    • Ehsan Valian, Shahram Mohanna and Saeed Tavakoli, "Improved Cuckoo Search Algorithm For Feed forward Neural Network Training", International Journal of Artificial Intelligence & Applications (IJAIA), Vol.2, No.3,p.36-43,July 2011, doi : 10.5121/ijaia.2011.2304
    • (2011) International Journal of Artificial Intelligence & Applications (IJAIA) , vol.2 , Issue.3 , pp. 36-43
    • Valian, E.1    Mohanna, S.2    Tavakoli, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.