An Enhanced Cryptanalytic Attack on Knapsack Cipher using Genetic Algorithm

With the exponential growth of networked system and application such as eCommerce, the demand for effective internet security is increasing. Cryptology is the science and study of systems for secret communication. It consists of two complementary fields of study: cryptography and cryptanalysis. The application of genetic algorithms in the cryptanalysis of knapsack ciphers is suggested by Spillman [7]. In order to improve the efficiency of genetic algorithm attack on knapsack cipher, the previously published attack was enhanced and re-implemented with variation of initial assumptions and results are compared with Spillman results. The experimental result of research indicates that the efficiency of genetic algorithm attack on knapsack cipher can be improved with variation of initial assumption.




References:
[1] Goldberg, D.E., "Genetic Algorithms in Search, Optimization and
Machine Learning", Addison-Wesley, Reading, 1989.
[2] Davis, L. , "Handbook of Genetic Algorithms", Van Nostrand
Reinhold, New York ,1991.
[3] Holland, J., "Adaptation in Natural and Artificial Systems", University
of Michigan Press, Ann Arbor, 1975.
[4] Methew, R.A.J. (1993, April), "The use of genetic algorithms in
cryptanalysis", Cryptologia, 7(4), 187-201.
[5] Poonam Garg , "Genetic Algorithm & Tabu Search attack on
monoalphabetic cipher", BIMC proceeding of Business Information
Management Conference -2005, 322-328.
[6] Poonam Garg, "Genetic Algorithm, Tabu Search & Simulated
Annealing Attack on Transposition Cipher", proceeding of third AIMS
International conference on management at IIMA - 2006, 983-989
[7] Spillman R.,"Cryptanalysis of knapsack ciphers using genetic
algorithms". Cryptologia, 17(4):367-377, October 1993.
[8] Schneier B. ," Applied Cryptography", 2nd edition , John Willy & Sons,
Newyork, 1996.
[9] Yaseen, I.F.T., & Sahasrabuddhe, H.V. (1999). A genetic algorithm for
the Cryptanalysis of Chor-Rivest knapsack public key cryptosystem
(PKC). In Proceedings of Third International Conference on
Computational Intelligence and Multimedia Applications, pp. 81-85,
1999.