Cryptanalysis using Artificial Bee Colony Algorithm Guided by Frequency based Fitness Value
Arkan Kh Shakr Sabonchi1*, Bahriye Akay2
1Erciyes University , Kayseri, Turkey
2Erciyes University, Kayseri, Turkey
* Corresponding author: arkankhaleel@gmail.com
Presented at the International Symposium on Multidisciplinary Studies and Innovative Technologies (ISMSIT2017), Tokat, Turkey, Dec 02, 2017
SETSCI Conference Proceedings, 2017, 1, Page (s): 330-334
Published Date: 08 December 2017
Researchers attention on the optimization methods to solve several applications increases recently by the advances in the technological field. The Artificial Bee Colony algorithm that has been quite popular during the recent years is firstly used in this study to cryptanalyse the substitution cipher that is the fundamental structure of the modern cryptology methods. Artificial Bee Colony algorithm searches for the key used for encryption phase and it is aimed to obtain the decrypted text by the key discovered. Various number of texts and population sizes are examined to obtain the original key by using the character frequency analysis. Consequently, from the results, the Artificial Bee Colony Algorithm displays good performance for cryptanalysis application in substitution cipher.
Keywords - cryptanalysis; substitution cipher; Artificial bee colony algorithm (ABC)
[1] B. Scheneier, Applied Cryptography Second Edition: protocols, algorithms, and source code in C: John Wiley and Sons, 1996.
[2] W. Stallings and M. P. Tahiliani, Cryptography and network security: principles and practice vol. 6: Pearson London, 2014.
[3] Z. Obaid, A. Sabonchi, and B. Akay, "KLASİK KRİPTOLOJİ YÖNTEMLERİNİN KARŞILAŞTIRILMASI," Engineering Sciences, vol. 11, pp. 100-108, 2016.
[4] M. Dorigo, "Optimization, learning and natural algorithms," Ph. D. Thesis, Politecnico di Milano, Italy, 1992.
[5] R. Eberhart and J. Kennedy, "A new optimizer using particle swarm theory," in Micro Machine and Human Science, 1995. MHS'95., Proceedings of the Sixth International Symposium on, 1995, pp. 39-43.
[6] D. Pham, "Karaboga. D, Ghanbarzadeh A, Koc E, Otri S, Rahim S and Zaidi M.,“The Bees Algorithm”, Technical Note," Manufacturing Engineering Centre, Cardiff University, UK, 2005.
[7] X.-S. Yang, "Engineering optimizations via nature-inspired virtual bee algorithms," Artificial Intelligence and Knowledge Engineering Applications: A Bioinspired Approach, pp. 317-323, 2005.
[8] D. Karaboga and B. Basturk, "On the performance of artificial bee colony (ABC) algorithm," Applied soft computing, vol. 8, pp. 687-697, 2008.
[9] R. A. Matthews, "The use of genetic algorithms in cryptanalysis," Cryptologia, vol. 17, pp. 187-201, 1993.
[10] G. S. Wulandari, W. Rismawan, and S. Saadah, "Differential evolution for the cryptanalysis of transposition cipher," in Information and Communication Technology (ICoICT), 2015 3rd International Conference on, 2015, pp. 45-48.
[11] M. F. Uddin and A. M. Youssef, "An artificial life technique for the cryptanalysis of simple substitution ciphers," in Electrical and Computer Engineering, 2006. CCECE'06. Canadian Conference on, 2006, pp. 1582-1585.
[12] S. M. Hameed and D. N. Hmood, "Particles swarm optimization for the cryptanalysis of transposition cipher," Journal of Al-Nahrain University, vol. 13, pp. 211-215, 2010.
[13] P. Garg, "GENETIC ALGORITHMS, TABU SEARCH AND SIMULATED ANNEALING: A COMPARISON BETWEEN THREE APPROACHES FOR THE CRYPTANALYSIS OF TRANSPOSITION CIPHER," Journal of Theoretical & Applied Information Technology, vol. 5, 2009.
[14] D. Karaboga, B. Gorkemli, C. Ozturk, and N. Karaboga, "A comprehensive survey: artificial bee colony (ABC) algorithm and applications," Artificial Intelligence Review, vol. 42, pp. 21-57, 2014.
[15] S. Omran, A. Al-Khalid, and D. Al-Saady, "Using Genetic Algorithm to break a mono-alphabetic substitution cipher," in Open Systems (ICOS), 2010 IEEE Conference on, 2010, pp. 63-67.
[16] D. R. Stinson, Cryptography: theory and practice: CRC press, 2005.
[17] D. Karaboga and B. Basturk, "On the performance of artificial bee colony (ABC) algorithm," Applied soft computing, vol. 8, pp. 687-697, 2008.
[18] D. Karaboga and B. Akay, "Artificial bee colony (ABC) algorithm on training artificial neural networks," in Signal Processing and Communications Applications, 2007. SIU 2007. IEEE 15th, 2007, pp. 1-4.
[19] B. Akay and D. Karaboga, "Wavelet packets optimization using artificial bee colony algorithm," in Evolutionary Computation (CEC), 2011 IEEE Congress on, 2011, pp. 89-94.
[20] B. Akay and I. Kirmizi, "Structural optimization of wavelet packets using swarm algorithms," in Evolutionary Computation (CEC), 2012 IEEE Congress on, 2012, pp. 1-5.
[21] E. Hancer, B. Xue, M. Zhang, D. Karaboga, and B. Akay, "A multiobjective artificial bee colony approach to feature selection using fuzzy mutual information," in Evolutionary Computation (CEC), 2015 IEEE Congress on, 2015, pp. 2420-2427.
[22] F. Piper, Cryptography: Wiley Online Library, 2002.
[23] A. Clark, "Modern optimisation algorithms for cryptanalysis," inIntelligent Information Systems, 1994. Proceedings of the 1994 Second Australian and New Zealand Conference on, 1994, pp. 258-262.
[24] F.-T. Lin and C.-Y. Kao, "A genetic algorithm for ciphertext-only attack in cryptanalysis," in Systems, Man and Cybernetics, 1995. Intelligent Systems for the 21st Century., IEEE International Conference on, 1995, pp. 650-654.
[25] M. F. Uddin and A. M. Youssef, "Cryptanalysis of simple substitution ciphers using particle swarm optimization," in Evolutionary Computation, 2006. CEC 2006. IEEE Congress on, 2006, pp. 677-680.
[26] B. Akay, E. Aydogan, and L. Karacan, "2-opt based artificial bee colony algorithm for solving traveling salesman problem," in 2nd World Conference on Information Technology (WCIT-2011), 2012, pp. 666-672.
[27] B. Akay and X. Yao, "Recent advances in evolutionary algorithms for job shop scheduling," in Automated Scheduling and Planning, ed: Springer, 2013, pp. 191-224
![]() |
This is an Open Access article distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. |