“…There are many researches has been written on using soft computing techniques to cryptanalysis different types of encryption systems some of these: A.J.Clark, in his Thesis uses various optimization heuristics in the fields of automated cryptanalysis and automated cryptographic function generation [13], M.F. Uddin in his paper focused on using of PSO in cryptanalysis of simple substitution ciphers using ciphertext only attack [14],R.R.Yako In her research, an optimization approach such as GAs is considered to improve the cryptanalysis problem [15], S. M. Hameedin her work used PSO to cryptanalysis transposition cipher, PSO used ciphertext only attack to recover the secret [16],H.A.MAl_Sharifi,in his research focused on using of PSO algorithm to cryptanalysis stream cipher using plaintext attack choosing one Linear Feedback Shift Register (LFSR) [17], B.N.Ferriman, in his Thesis focused on the RC4 algorithm and present a new approach for cryptanalysis of the cipher by attacking RC4s state register [18], Ali A.Abd in his research is considered a new approach to cryptanalysis stream cipher systems based on genetic algorithm(GA) [19].The present work explores the related work done and applicability of GAs and PSOs in a field of cryptanalysis.The rest of this paper has been organized as follows: Section 2 presents a brief overview of GAs. Section 3 presents a brief overview of PSOs.…”