2020
DOI: 10.14429/dsj.70.15749
|View full text |Cite
|
Sign up to set email alerts
|

A Hybrid Computational Intelligence based Technique for Automatic Cryptanalysis of Playfair Ciphers

Abstract: The Playfair cipher is a symmetric key cryptosystem-based on encryption of digrams of letters. The cipher shows higher cryptanalytic complexity compared to mono-alphabetic cipher due to the use of 625 different letter-digrams in encryption instead of 26 letters from Roman alphabets. Population-based techniques like Genetic algorithm (GA) and Swarm intelligence (SI) are more suitable compared to the Brute force approach for cryptanalysis of cipher because of specific and unique structure of its Key Table. This … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
4
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(6 citation statements)
references
References 10 publications
0
4
0
Order By: Relevance
“…While in the proposed method, the created matrix has size 6*6 and block size is 3. The applied rules on standard Playfair algorithm are different from applied rules on the proposed modified Playfair cipher algorithm [16] [17].…”
Section: Standard Playfairmentioning
confidence: 99%
“…While in the proposed method, the created matrix has size 6*6 and block size is 3. The applied rules on standard Playfair algorithm are different from applied rules on the proposed modified Playfair cipher algorithm [16] [17].…”
Section: Standard Playfairmentioning
confidence: 99%
“…In this work, the advancement of modern technologies and methods of data analysis, the cryptanalysis operation can be programmed. Computational swarm algorithms and evolutionary algorithms may be some techniques of programming process [15]. The designed system contains many components as shown in Figure 1, the figure illustrates the use of the techniques, PSO and MPSO to attack stream cipher using ciphertext only for different lengths of LFSRi.…”
Section: Employing Pso and Mpso In Attacking Stream Ciphersmentioning
confidence: 99%
“…The key to cryptography is the 25 letters of the alphabet arranged in a 5 x 5 table by removing the letter J from the alphabet. The letter J is considered the same as the letter I, because in English, the letter J has the smallest frequency of occurrence [10], [11]. Each elementabel contains letters that are different from each other.…”
Section: Playfair Chiper Algorithmmentioning
confidence: 99%