Cryptanalytic Results on Knapsack Cryptosystem Using Binary Particle Swarm Optimization

被引:10
作者
Jain, Ashish [1 ]
Chaudhari, Narendra S. [1 ]
机构
[1] Indian Inst Technol Indore, Discipline Comp Sci & Engn, Indore, Madhya Pradesh, India
来源
INTERNATIONAL JOINT CONFERENCE SOCO'14-CISIS'14-ICEUTE'14 | 2014年 / 299卷
关键词
Cryptanalysis of Knapsack Cryptosystem; Binary Particle Swarm Optimization (BPSO); Modified Binary Particle Swarm Optimization (MBPSO); CI; Merkle-Hellman (MH);
D O I
10.1007/978-3-319-07995-0_37
中图分类号
TP18 [人工智能理论];
学科分类号
140502 [人工智能];
摘要
The security of most Public Key Cryptosystem (PKC) proposed in literature relies on the difficulty of the integer factorization problem or discrete logarithm problem. However, using shor's [19] algorithm the problems can be solved in acceptable amount of time via 'quantum computers'. Therefore in this context knapsack (more accurately subset sum problem(SSP)) based PKC is reconsidered as a viable option by the cryptography community. However, before considering the practicability of this cryptosystem, there is a growing need to cryptanalyze it using all possible present techniques, in order to guarantee their security. We believe that modern Computation Intelligence (CI) techniques can provide efficient cryptanalytic results (because of the new aspects have been incorporated in CI techniques). In this paper, we use two different binary particle swarm optimization techniques to cryptanalyze knapsack PKC. The results obtained via extensive testing are promising and proficient. We present, discuss and compare the effectiveness of the proposed work in the result section.
引用
收藏
页码:375 / 384
页数:10
相关论文
共 22 条
[1]
[Anonymous], 2002, Computational Intelligence an Introduction
[2]
A Modified Binary Particle Swarm Optimization for Knapsack Problems [J].
Bansal, Jagdish Chand ;
Deep, Kusum .
APPLIED MATHEMATICS AND COMPUTATION, 2012, 218 (22) :11042-11061
[3]
Coster M. J., 1992, Comput. Complex, V2, P111
[4]
Computational Intelligence Applied on Cryptology: a Brief Review [J].
Danziger, M. ;
Henriques, M. A. A. .
IEEE LATIN AMERICA TRANSACTIONS, 2012, 10 (03) :1798-1810
[5]
Garg P., 2006, INT J INFORM TECHNOL, V3
[6]
GARG P, 2006, T ENG COMPUTING TECH, V12
[7]
A NEURAL-VISUALIZATION IDS FOR HONEYNET DATA [J].
Herrero, Alvaro ;
Zurutuza, Urko ;
Corchado, Emilio .
INTERNATIONAL JOURNAL OF NEURAL SYSTEMS, 2012, 22 (02)
[8]
RT-MOVICAB-IDS: Addressing real-time intrusion detection [J].
Herrero, Alvaro ;
Navarro, Marti ;
Corchado, Emilio ;
Julian, Vicente .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2013, 29 (01) :250-261
[9]
Knapsack Cryptosystems and Unreliable Reliance on Density [J].
Jen, Shang-Ming ;
Lai, Tse-Lin ;
Lu, Chia-Yu ;
Yang, Jar-Ferr .
2012 IEEE 26TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2012, :748-754
[10]
Generalizing cryptosystems based on the subset sum problem [J].
Kate, Aniket ;
Goldberg, Ian .
INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2011, 10 (03) :189-199