2021
DOI: 10.11591/ijai.v10.i2.pp490-500
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Merkle-Hellman cipher using ant colony optimization

Abstract: <p class="Abstract"><span id="docs-internal-guid-d3fe8e21-7fff-17fc-df0e-00893428243c"><span>The Merkle-Hellman (MH) cryptosystem is one of the earliest public key cryptosystems, which is introduced by Ralph Merkle and Martin Hellman in 1978 based on an NP-hard problem, known as the subset-sum problem. Furthermore, ant colony optimization (ACO) is one of the most nature-inspired meta-heuristic optimization, which simulates the social behaviour of ant colonies. ACO has demonstrated excellent p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 14 publications
0
5
0
Order By: Relevance
“…In contrast, the dolphin swarm algorithm (DSA), binary firefly (BF), and binary cat swarm optimization (BCSO) have been proposed in [34][35][36] to deal with the DES cryptosystem. Tabu Search (TS) has been introduced to handle the stream ciphers (RC4, VMPC, and RC4+) in [37,38], while the Grari [39] presented an ACO algorithm-specific Merkle-Hellman cipher. In [40], the effectiveness of eight popular, newly released metaheuristic algorithms for the MHKC were examined.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…In contrast, the dolphin swarm algorithm (DSA), binary firefly (BF), and binary cat swarm optimization (BCSO) have been proposed in [34][35][36] to deal with the DES cryptosystem. Tabu Search (TS) has been introduced to handle the stream ciphers (RC4, VMPC, and RC4+) in [37,38], while the Grari [39] presented an ACO algorithm-specific Merkle-Hellman cipher. In [40], the effectiveness of eight popular, newly released metaheuristic algorithms for the MHKC were examined.…”
Section: Related Workmentioning
confidence: 99%
“…The BGWO was developed with the binary format for feature selection problems in [39], where the grey wolf position vector is updated according to Equation ( 16) to firm the conversion from the continuous domain to the binary domain.…”
Section: Binary Gwo (Bgwo)mentioning
confidence: 99%
“…For low-density cases, attacks are given by [3,4]. Intelligent algorithms such as genetic algorithm [5,6] and ant colony algorithm [7] are also used to crack the Merkle-Hellman cryptosystem. In 2019, Liu and Bi proposed an attack based on an orthogonal lattice, whose time complexity is lower than Shamir's [8].…”
Section: Introductionmentioning
confidence: 99%
“…Encryption is a form of transforming information where the generated data cannot be detected by unauthorized persons. Decryption is a way to restore encrypted data into its original structure [1], [2]. The proper decryption key is required to reconstruct the contents of the encrypted information.…”
Section: Introductionmentioning
confidence: 99%