1993
DOI: 10.1080/0161-119391867746
|View full text |Cite
|
Sign up to set email alerts
|

Use of a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
39
0
2

Year Published

2000
2000
2015
2015

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 104 publications
(41 citation statements)
references
References 0 publications
0
39
0
2
Order By: Relevance
“…Spillman et al [4] , in their attack on the simple substitution cipher uses equation 1. This equation is based on unigram and bigram statistics.…”
Section: Methodsmentioning
confidence: 99%
See 1 more Smart Citation
“…Spillman et al [4] , in their attack on the simple substitution cipher uses equation 1. This equation is based on unigram and bigram statistics.…”
Section: Methodsmentioning
confidence: 99%
“…Examples of other substitution ciphers include the well-known Ceasar cipher, Affine substitutions, Vigenere cipher and Beaufort cipher. Forsyth and Safavi-Naini [3] have published an attack on the simple substitution cipher using simulated annealing and Spillman et al [4] presented an attack using genetic algorithm. Dimovski and Gligoroski [5] presented an attack on poly-alphabetic substitution cipher that utilized the parallel genetic algorithm.…”
Section: Introductionmentioning
confidence: 99%
“…It depends on letter frequency occurrence of the cipher with corresponding to the letter frequency in English language as shown in the following equation [6]. …”
Section: Fitness Functionmentioning
confidence: 99%
“…An important step in the evolution cryptanalysis algorithm design is the encoding of the object as cryptanalysis; coding scheme design has always been the evolution of one of the difficulties of the algorithm [19]. Niche Genetic Algorithm is a technique that dynamically adjusts selected control parameters, such as population size and genetic operation rates, during the course of evolving a problem solution.…”
Section: Chromosome Coding Representation and Initialization Populationmentioning
confidence: 99%
“…Clark in 1998 [8], 2002 Grundlingh [9], and 2006 Uddin and Youssef [10] to this kind of technology respectively on the development, and the tabu search algorithm and particle swarm optimization algorithm respectively, such as introducing sheet substitution cipher analysis. In 2004, Servos, the use of genetic algorithm (GA) multi-Chart substitution Vigenere cipher of analysis [11], its basic characteristic is using genetic algorithm to identify and determine the parameters of the multi-chart substitution ciphers.…”
Section: Cryptology Evolution Analysis Of the Development Trend Of Thmentioning
confidence: 99%