2011 2nd International Conference on Computer and Communication Technology (ICCCT-2011) 2011
DOI: 10.1109/iccct.2011.6075143
|View full text |Cite
|
Sign up to set email alerts
|

A cryptanalytic attack on the knapsack cryptosystem using binary Firefly algorithm

Abstract: This paper presents a binary Firefly Algorithm (FA), for cryptanalysis of knapsack cipher algorithm so as to deduce the meaning of an encrypted message (i.e. to determine a plaintext from the cipher text). The implemented algorithm has been characterized, in this paper, by a number of properties and operations that build up and evolve the fireflies' positions. These include light intensity, distances, attractiveness, and position updating, fitness evaluation. The results of the Firefly algorithm are compared w… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
29
0
1

Year Published

2013
2013
2024
2024

Publication Types

Select...
5
4
1

Relationship

0
10

Authors

Journals

citations
Cited by 72 publications
(30 citation statements)
references
References 4 publications
0
29
0
1
Order By: Relevance
“…A Binary Firefly Algorithm (BFA) is used to solve discrete problems [34]. In this model, the position of each firefly is characterized by two values of 0 and 1 in each dimension.…”
Section: Binary Fierfly Algorithm (Bfa)mentioning
confidence: 99%
“…A Binary Firefly Algorithm (BFA) is used to solve discrete problems [34]. In this model, the position of each firefly is characterized by two values of 0 and 1 in each dimension.…”
Section: Binary Fierfly Algorithm (Bfa)mentioning
confidence: 99%
“…B 0 bir ateşböceğinin diğer komşu ateşböceğine aradaki mesafe r=0 olduğundaki çekicilik miktarıdır. B(r) ise B0 çekiciliğe sahip ateşböceğinin r mesafedeki çekicilik miktarıdır [32]. …”
Section: Ateşböceği̇ Opti̇mi̇zasyon Algori̇tmasi (Firefly Optimization Alunclassified
“…An improved firefly and particle swarm optimization hybrid algorithm was applied to the unit commitment problem [38]. A cryptanalytic attack on the knapsack cryptosystem was approached using the binary firefly algorithm [42]. The network and reliability constrained unit commitment problem was solved using a binary real coded firefly algorithm [43].…”
Section: Binarization Methodsmentioning
confidence: 99%