Journal of Engineering and Applied Sciences

Year: 2020
Volume: 15
Issue: 1
Page No. 267 - 272

Cryptoanalytic Method of Searching for the Secret Key and ITS Length on the Basis of Evolution Metaheuristics

Authors : HusseinAl-Ofeishat

References

Afonin, P.V., 2011. Construction of hybrid systems of simulation based on evolutionary metaevristics and neural networks. Survey of applied and industrial mathematics. Construction of hybrid systems of simulation based on evolutionary metaevristics and neural networks. Survey of applied and industrial mathematics. (FSSCIT’11), Moscow, pp: 38-39.

Afonin, P.V., 2009. Evolution control method for evolutionary strategies based on neural network metamodels. Proceedings of the 5th International Scientific and Practical Conference on Integrated Models and Soft Computing in Artificial Intelligence, May 28-30, 2009, Kolomna, pp: 563-574.

Al Ofeishat, H.A. and A.A. Al-Rababah, 2009. Real-time programming platforms in the mainstream environments. Int. J. Comput. Sci. Network Secur., 9: 197-204.
Direct Link  |  

Al-Ofeishat, H., E. Trad and T. Al Smadi, 2018. Proactive algorithm dynamic mobile structure of Routing protocols of ad hoc networks. Int. J. Comput. Sci. Network Secur., 18: 86-90.
Direct Link  |  

Al-Ofeishat, H.A., 2012. Scheduling in heterogeneous grid-systems. Aust. J. Basic Applied Sci., 6: 1-10.
Direct Link  |  

Ariffin, M.R.K., S.I. Abubakar, F. Yunos and M.A. Asbullah, 2019. New cryptanalytic attack on RSA modulus N = pq using small prime difference method. Cryptography, Vol. 3, No. 1. 10.3390/cryptography3010002

Branke, J. and C. Schmidt, 2004. Sequential Sampling in Noisy Environments. In: Parallel Problem Solving from Nature-PPSN VIII. PPSN 2004, Yao, X., E.K. Burke, J.A. Lozano, J. Smith and J.J. Merelo-Guervós et al., (Eds.)., Lecture Notes in Computer Science, Vol. 3242. Springer, Berlin, Heidelberg, ISBN: 978-3-540-30217-9, pp: 202-211.

Chernyshev, Y.O., A.S. Sergeev and E.O. Dubrov, 2014. Application of bioinspired optimization algorithms for cryptanalysis of classical and asymmetric cryptosystems. Proceedings of the 14th International Scientific and Methodical Conference Informatics: Problems, Methodology, Technologies, (IPMT’14), VSU.-Voronezh, pp: 206-210.

Dubrov, E.O., A.N. Ryazanov, A.S. Sergeev and Y.O. Chernyshev, 2013. Development of methods for cryptanalysis of the ciphers of permutations and replacements in information security systems based on evolutionary optimization methods. Proceedings of a Scientific Conference Dedicated to the Day of Radio on Radio Electronic Devices and Systems for Infocommunication Technologies, (DDR'13), Moscow, pp: 220-224.

Glover, F. and G.A. Kochenberger, 2003. Handbook of Metaheuristics. 1st Edn., Kluer Academic Publishers, USA., ISBN-13: 978-1402072635, Pages: 570.

Gräning, L., Y. Jin and B. Sendhoff, 2007. Individual-based Management of Meta-models for Evolutionary Optimization with Application to Three-Dimensional Blade Optimization. In: Evolu-tionary Computation in Dynamic and Uncertain Environments, Yang, S.X., Y.S. Ong and Y.C. Jin (Eds.). Springer-Verlag, Berlin, Heidelberg, ISBN: 978-3-540-49772-1, pp: 225-250.

Haykin, S., 1999. Neural Networks: A Comprehensive Foundation. 2nd Edn., Prentice-Hall International Inc., New Jersey, USA., ISBN-13: 9780139083853, Pages: 842.

Jain, A. and N.S. Chaudhari, 2018. A novel cuckoo search strategy for automated cryptanalysis: A case study on the reduced complex knapsack cryptosystem. Int. J. Syst. Assurance Eng. Manage., 9: 942-961.
CrossRef  |  Direct Link  |  

Jain, A. and N.S. Chaudhari, 2019. An improved genetic algorithm and a new discrete cuckoo algorithm for solving the classical substitution cipher. Int. J. Applied Metaheuristic Comput., 10: 109-110.
CrossRef  |  Direct Link  |  

Jaskowski, W. and W. Kotlowski, 2008. On selecting the best individual in noisy environments. Proceedings of the 10th Annual Conference on Genetic and Evolutionary Computation, GECCO 2008, July 12-16, 2008, Atlanta, Georgia, USA., pp: 961-968.

Jin, Y., M. Huesken and B. Sendhoff, 2003. Quality measures for approximate models in evolutionary computation. Proceedings of the Genetic and Evolutionary Computation Conference (GECCO 2003), July 12-16, 2003, Chicago, pp: 170-173.

Lasry, G., 2018. A Methodology for the Cryptanalysis of Classical Ciphers with Search Metaheuristics. Kassel University Press GmbH, Kassel, Germany, ISBN: 978-3-7376-0458-1, Pages: 247.

Law, A.M. and W.D. Kelton, 2004. Simulation Modeling and Analysis. 3rd Edn., Publishing Group BHV, St. Petersburg, Russia, Pages: 847.

Surakhi, O.M., M. Qatawneh and H. Ofeishat, 2017. A parallel genetic algorithm for maximum flow problem. Int. J. Adv. Comput. Sci. Aplic., 8: 159-164.
Direct Link  |  

Takialddin, A.S., K.A. Smadi and O.O. AL-Smadi, 2017. High-speed for data transmission in gsm networks based on cognitive radio. Am. J. Eng. Applied Sci., 10: 69-77.
CrossRef  |  Direct Link  |  

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved