Cryptography and cryptanalysis through computational intelligence

EC Laskari, GC Meletiou, YC Stamatiou… - … in Information Assurance …, 2007 - Springer
A basic task of cryptography is the transformation, or encryption, of a given message into
another message which appears meaningful only to the intended recipient through the …

Utilizing evolutionary computation methods for the design of S-boxes

EC Laskari, GC Meletiou… - … intelligence and security, 2006 - ieeexplore.ieee.org
Among the most important components of many contemporary ciphers are the substitution
boxes (S-boxes) and a great amount of research is devoted to their study. In this paper, a …

Two improved metaheuristic techniques and their applications in automated cryptanalysis of knapsack cryptosystems

A Jain, MK Bohra - International Journal of Bio-Inspired …, 2022 - inderscienceonline.com
During the past decade, considerable improved versions of real particle swarm optimisation
(PSO) have been proposed in the literature. However, only a few significant improved …

[PDF][PDF] Cryptanalysis of knapsack cipher using parallel evolutionary computing

R Muthuregunathan, D Venkataraman… - International Journal of …, 2009 - Citeseer
Algorithms (GA) are used for the cryptanalysis of many well known ciphers. However most of
the Cryptanalytic attacks using GA are sequential. We have taken Knapsack Cipher for our …

Swarm intelligence algorithms in cryptanalysis of simple Feistel ciphers

T Mekhaznia, A Zidani - International Journal of Information …, 2018 - inderscienceonline.com
Recent cryptosystems constitute a hard task for cryptanalysis algorithms due to the
nonlinearity of their structure. This problem can be formulated as NP-hard. It has long been …

Genetic algorithm in stream cipher cryptanalysis

I Polak, M Boryczka - … : 7th International Conference, ICCCI 2015, Madrid …, 2015 - Springer
Cryptography nowadays is a very important field of protecting information from falling into
wrong hands. One of modern cryptography branch is stream cipher cryptography. This paper …

[PDF][PDF] Tabu cryptanalysis of VMPC stream cipher

I Polak, M Boryczka - Tatra Mountains Mathematical Publications, 2019 - intapi.sciendo.com
In the era of global informatization, transmitting and storing information in digital form it is
very important to ensure an adequate level of security of ciphers used. Cryptanalysis deals …

Nature inspired heuristics for attack of simplified DES algorithm

T Mekhaznia - Proceedings of the 6th International Conference on …, 2013 - dl.acm.org
Modern ciphers constitute a challenge task for cryptanalysis algorithms due to their diversity
and nonlinearity. This problem can be formulated as NP-Hard. It has long been subject to …

Computational Approaches to Artificial Intelligence: Theory, Methods and Applications

MN Vrahatis, GD Magoulas, GC Meletiou… - … Methods in Sciences …, 2019 - taylorfrancis.com
This chapter contains papers presented in a session on “Computational Approaches to
Artificial Intelligence" at the International Conference of Computational Methods in Sciences …

[PDF][PDF] Nature inspired heuristics for cryptanalysis of Feistel ciphers

T Mekhaznia, MB Menai, A Zidani - ICIST13, 2013 - researchgate.net
Modern ciphers constitute a challenge for cryptanalysis algorithms given their diversity and
nonlinearity. This problem has long been subject to various attacks by classical techniques …