171 research outputs found

    Using Evolving Algorithms to Cryptanalysis Nonlinear Cryptosystems

    Get PDF
                في هذا البحث، نتحرى عن استخدام الخوارزميات التطورية (EA's) لتحليل أحد أنظمة التشفير غير الخطية التي تعتمد على وحدة السجلات الزاحفة لتبادل البيانات الخطية (LFSR) باستخدام طريقة هجوم النص المشفر فقط. الخوارزمية الجينية (GA) و خوارزمية خلية النمل ((Ant Colony Optimization (ACO) التي استخدمت في مهاجمة أحد أنظمة التشفير غير الخطية المسماة "Shrinking Generator" باستخدام أطوال مختلفة من النص المشفر وأطوال مختلفة من LFSRs المدمجة أثبتت أدائها الجيد في إيجاد القيم الأولية لل LFSRs المدمجة.            In this paper, new method have been investigated using evolving algorithms (EA's) to cryptanalysis one of the nonlinear stream cipher cryptosystems which depends on the Linear Feedback Shift Register (LFSR) unit by using cipher text-only attack. Genetic Algorithm (GA) and Ant Colony Optimization (ACO) which are used for attacking one of the nonlinear cryptosystems called "shrinking generator" using different lengths of cipher text and different lengths of combined LFSRs. GA and ACO proved their good performance in finding the initial values of the combined LFSRs. This work can be considered as a warning for a stream cipher designer to avoid the weak points, which may be found in the stream cipher, and may be explored by the cryptanalysts. This work can find the optimal solution for text with minimum lengths of 20 characters and 100 iteration were very enough to find the real initial values of key stream

    Modern and Lightweight Component-based Symmetric Cipher Algorithms: A Review

    Get PDF
    Information security, being one of the corner stones of network and communication technology, has been evolving tremendously to cope with the parallel evolution of network security threats. Hence, cipher algorithms in the core of the information security process have more crucial role to play here, with continuous need for new and unorthodox designs to meet the increasing complexity of the applications environment that keep offering challenges to the current existing cipher algorithms. The aim of this review is to present symmetric cipher main components, the modern and lightweight symmetric cipher algorithms design based on the components that utilized in cipher design, highlighting the effect of each component and the essential component among them, how the modern cipher has modified to lightweight cipher by reducing the number and size of these components, clarify how these components give the strength for symmetric cipher versus asymmetric of cipher. Moreover, a new classification of cryptography algorithms to four categories based on four factors is presented. Finally, some modern and lightweight symmetric cipher algorithms are selected, presented with a comparison between them according to their components by taking into considerations the components impact on security, performance, and resource requirements
    corecore