Skip navigation

Zastosuj identyfikator do podlinkowania lub zacytowania tej pozycji: http://hdl.handle.net/20.500.12128/22277
Tytuł: Breaking Data Encryption Standard with a Reduced Number of Rounds Using Metaheuristics Differential Cryptanalysis
Autor: Dworak, Kamil
Boryczka, Urszula
Słowa kluczowe: differential cryptanalysis; metaheuristics; symmetric block ciphers; memetic algorithms; DES; simulated annealing
Data wydania: 2021
Źródło: "Entropy", 2021, iss. 12, art. no. 1697, s. 1-21
Abstrakt: This article presents the author’s own metaheuristic cryptanalytic attack based on the use of differential cryptanalysis (DC) methods and memetic algorithms (MA) that improve the local search process through simulated annealing (SA). The suggested attack will be verified on a set of ciphertexts generated with the well-known DES (data encryption standard) reduced to six rounds. The aim of the attack is to guess the last encryption subkey, for each of the two characteristics Ω. Knowing the last subkey, it is possible to recreate the complete encryption key and thus decrypt the cryptogram. The suggested approach makes it possible to automatically reject solutions (keys) that represent the worst fitness function, owing to which we are able to significantly reduce the attack search space. The memetic algorithm (MASA) created in such a way will be compared with other metaheuristic techniques suggested in literature, in particular, with the genetic algorithm (NGA) and the classical differential cryptanalysis attack, in terms of consumption of memory and time needed to guess the key. The article also investigated the entropy of MASA and NGA attacks.
URI: http://hdl.handle.net/20.500.12128/22277
DOI: 10.3390/e23121697
ISSN: 1099-4300
Pojawia się w kolekcji:Artykuły (WNŚiT)

Pliki tej pozycji:
Plik Opis RozmiarFormat 
Dworak_Boryczka_Breaking_Data_Encryption.pdf1,18 MBAdobe PDFPrzejrzyj / Otwórz
Pokaż pełny rekord


Uznanie Autorstwa 3.0 Polska Creative Commons Creative Commons