Skip navigation

Please use this identifier to cite or link to this item: http://hdl.handle.net/20.500.12128/22277
Title: Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis
Authors: Dworak, Kamil
Boryczka, Urszula
Keywords: differential cryptanalysis; metaheuristics; symmetric block ciphers; memetic algorithms; DES; simulated annealing
Issue Date: 2021
Citation: "Entropy", 2021, iss. 12, art. no. 1697, s. 1-21
Abstract: This article presents the author’s own metaheuristic cryptanalytic attack based on the use of differential cryptanalysis (DC) methods and memetic algorithms (MA) that improve the local search process through simulated annealing (SA). The suggested attack will be verified on a set of ciphertexts generated with the well-known DES (data encryption standard) reduced to six rounds. The aim of the attack is to guess the last encryption subkey, for each of the two characteristics Ω. Knowing the last subkey, it is possible to recreate the complete encryption key and thus decrypt the cryptogram. The suggested approach makes it possible to automatically reject solutions (keys) that represent the worst fitness function, owing to which we are able to significantly reduce the attack search space. The memetic algorithm (MASA) created in such a way will be compared with other metaheuristic techniques suggested in literature, in particular, with the genetic algorithm (NGA) and the classical differential cryptanalysis attack, in terms of consumption of memory and time needed to guess the key. The article also investigated the entropy of MASA and NGA attacks.
URI: http://hdl.handle.net/20.500.12128/22277
DOI: 10.3390/e23121697
ISSN: 1099-4300
Appears in Collections:Artykuły (WNŚiT)

Files in This Item:
File Description SizeFormat 
Dworak_Boryczka_Breaking_Data_Encryption.pdf1,18 MBAdobe PDFView/Open
Show full item record


Uznanie Autorstwa 3.0 Polska Creative Commons License Creative Commons