Proceedings Third International Conference on Computational Intelligence and Multimedia Applications. ICCIMA'99 (Cat. No.PR0030
DOI: 10.1109/iccima.1999.798506
|View full text |Cite
|
Sign up to set email alerts
|

A genetic algorithm for the cryptanalysis of Chor-Rivest knapsack public key cryptosystem (PKC)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
6
0

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(6 citation statements)
references
References 6 publications
0
6
0
Order By: Relevance
“…Genetic Algorithms (GA) by John Holland and students at the University of Michigan, was introduced in early 1970 (Holland, 1975;Spears et al, 1993;Kolodziejczyk, 1997;Yaseen & Sahasrabuddhe, 1999;Grundlingh & Van Vuuren, 2003). This is a kind of method to solve complicated problems using the laws in nature.…”
Section: Genetic Algorithmmentioning
confidence: 99%
“…Genetic Algorithms (GA) by John Holland and students at the University of Michigan, was introduced in early 1970 (Holland, 1975;Spears et al, 1993;Kolodziejczyk, 1997;Yaseen & Sahasrabuddhe, 1999;Grundlingh & Van Vuuren, 2003). This is a kind of method to solve complicated problems using the laws in nature.…”
Section: Genetic Algorithmmentioning
confidence: 99%
“…An algorithmic presentation of genetic algorithm used for our study is shown in Fig.4. Keys in cryptanalysis studies are represented as a string of bits in the chromosome and genetic operators process this bit string [1], [6], [9], [10], [12]. The mutation operation in the algorithm of Fig.4 is identical to the solution perturbation method used in simulated annealing attack discussed earlier.…”
Section: B Simulated Annealingmentioning
confidence: 99%
“…Genetic algorithm attack on the Chor -Rivest public key cryptosystem is studied by Yaseen et al. [12]. The paper by Spillman applies a genetic algorithm approach to a knapsack system [9].…”
Section: Introductionmentioning
confidence: 99%
“…The work by Clark and Dawson in 1998 [28] compares three optimization algorithms applied to the cryptanalysis of a simple substitution cipher. Yaseen and Sahasrabuddhe in 1999 published an important work which proposed a GAs based on the Chor-Rivest public key cryptosystem [29]. In 2003, Grundlingh and Van Vuuren [30], attacks two classical ciphers with a GAs approach [30].…”
Section: Introductionmentioning
confidence: 99%