2012
DOI: 10.14429/dsj.62.778
|View full text |Cite
|
Sign up to set email alerts
|

Cryptanalysis of Simplified-AES using Particle Swarm Optimisation

Abstract: Particle swarm optimisation (PSO) based cryptanalysis has gained much attention due to its fast convergence rate. This paper proposes a PSO-based cryptanalysis scheme for breaking the key employed in simplified-advance encryption standard (S-AES). The cost function is derived using letter frequency analysis. The novelty in our approach is to apply ciphertext-only attack for an S-AES encryption system, where we obtained the key in a minimum search space compared to the Brute-Force attack. Experimental results p… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 11 publications
0
2
0
Order By: Relevance
“…Noor 13 , et al presented an automatic cryptanalysis of Playfair cipher using compression. Vimalathithan 14 , et al proposed cryptanalysis of simplified-AES using PSO method by applying cipher-text only attack. Ahmed 15 , et al applied MPSO to break transposition cipher system by using multiple swarms instead of single swarm to determine the best key in less number of trials.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Noor 13 , et al presented an automatic cryptanalysis of Playfair cipher using compression. Vimalathithan 14 , et al proposed cryptanalysis of simplified-AES using PSO method by applying cipher-text only attack. Ahmed 15 , et al applied MPSO to break transposition cipher system by using multiple swarms instead of single swarm to determine the best key in less number of trials.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Attackers practice and perform cryptanalysis, which is a study of mathematical and algebraic techniques that make use of vulnerabilities in cryptographic algorithms. Some of the attacks such as collision attack, meet-in-the-middle, differential fault attack (DFA) on ZUC and SNOW 3G and particle swarm optimisation attack on AES [6][7][8][9][10] can successfully retrieve the key and crack into the network. Here, diagonal fault attack, a type of DFA, performed on AES is focussed in this paper.…”
mentioning
confidence: 99%