FEASIBILITY STUDY OF GENETIC ALGORITHMS APPLICATION FOR IMPLEMENTATION OF BLOCK CRYPTOSYSTEM CRYPTANALYSIS
Abstract and keywords
Abstract (English):
F easibility of genetic search algorithms application for implementation of the cryptanalysis of block cipher methods is considered. A distinctive feature of the bioinspired cryptanalysis methods application (in particular, genetic methods) is the possibility of using the encryption (or decryption) algorithm as an objective function for the suitability evaluation of the key defined by genetic operations. Consequently, when using the bioinspired cryptanalysis methods, the S key definition (for example, when using type 2 cryptanalysis) depends not so much on the complexity of the ciphering transformations, as on the bioinspired method which is to provide a sufficient variety of key generation that shows the significance of the research task of the bioinspired algorithms feasibility (in particular, genetic search methods) for the block cryptosystem cryptanalysis. It is noted also that as the distinctive feature of both block cipher methods, and the genetic algorithms is their internal parallelism, then the task of developing a cryptanalysis algorithm based on the parallel implementation of the constituent stages is relevant. An algorithm of the block methods cryptanalysis on the example of the DES standard on the basis of its parallel version is offered; the experiment results of the quasioptimal key determination obtained at the parallel algorithm implementation on the 8- letter text blocks are given. It is noted that time costs of the algorithm realization do not exceed the time of the known cryptanalysis implementation.

Keywords:
cryptanalysis, genetic algorithm, block cipher algorithm, population of keys, crossover, quasioptimal key.
Text

Введение. В настоящее время при разработке компьютерных технологий, обеспечивающих информационную

безопасность и защиту информации, широкое применение находят криптографические методы защиты. Для решения

задач криптоанализа, относящихся к классу NP-полных, в последние годы применяются алгоритмы, основанные на

природных системах. К ним относятся методы моделирования отжига, генетические алгоритмы (ГА), эволюционные

методы, алгоритмы роевого интеллекта и т.д. В моделях и алгоритмах эволюционных вычислений ключевым

элементом является построение начальной модели и правил, по которым она может изменяться (эволюционировать).

В течение последних лет были предложены разнообразные схемы эволюционных вычислений, в т.ч. генетический

алгоритм, генетическое программирование, эволюционные стратегии, эволюционное программирование.

References

1. Chernyshev, Y.О., Sergeyev, A.S., Dubrov, E.O., Tretyakov, O.P. Kriptograficheskie metody i geneticheskie algoritmy resheniya zadach kriptoanaliza. [Cryptographic methods and genetic algorithms for solving cryptanalysis problems.] Krasnodar: FVAS, 201, 138 p. (in Russian).

2. Avdoshin, S.М., Savelieva, A.A. Kriptoanaliz: sovremennoe sostoyanie i perspektivy razvitiya. [Cryptanalysis: Current State and Future Trends.] Information Technologies, 2007, no. 3, pp. 1–32 (in Russian).

3. Babenko, L.K., Ishchukova, E.A. Sovremennye algoritmy blochnogo shifrovaniya i metody ikh analiza. [Modern block encryption algorithms and methods of their analysis.] Moscow: Gelios ARV, 2006, 376 p. (in Russian).

4. Chernyshev, Y.О., Sergeev, A.S., Dubrov, E.O. Obzor algoritmov resheniya zadach kriptoanaliza na osnove bioinspirirovannykh tekhnologiy iskusstvennogo intellekta. [Review of the algorithms cryptanalysis on the basis bioinspired methods of artificial intelligence.] Proceedings of Voronezh State University, 2014, no. 2, pp. 83–89 (in Russian).

5. Sergeyev, A.S. O vozmozhnosti primeneniya metodov geneticheskogo poiska dlya realizatsii kriptoanaliza asimmetrichnogo algoritma shifrovaniya dannykh RSA. [On applicability of genetic search methods for the implementation of asymmetric data RSA encryption algorithm cryptanalysis.] Izvestiya vuzov. Severo- Kavkazskiy region. Technical Sciences. 2008, no. 3, pp. 48–52 (in Russian).

6. Chernyshev, Y.О., Sergeyev, A.S., Dubrov, E.O. Primenenie bioinspirirovannykh algoritmov optimizatsii dlya realizatsii kriptoanaliza klassicheskikh i asimmetrichnykh kriptosistem. [Application of bioinspired optimization algorithms for the implementation of classic and asymmetric cryptosystem cryptanalysis.] Informatika: problemy, metodologiya, tekhnologii: materialy XIV mezhdunar. nauch.-metod. konf. [Computer science: problems, methodology, technologies: Proc. XIV Int. Sci.- Method. Conf.] Voronezh, 201, pp. 206–210 (in Russian).

7. Sergeyev, A.S., Chernyshev, Y.О. Bioinspirirovannye metody kriptoanaliza asimmetrichnykh algoritmov shifrovaniya na osnove faktorizatsii sostavnykh chisel. [Cryptanalysis bioinspired meth ods of asymmetric key on the basis of composite number factorization.] Vestnik of DSTU, 2011, vol. 11, no. 9(60), pp. 1544–1554 (in Russian).

8. Chernyshev, Y.О., Sergeyev, A.S., Dubrov, E.O., Ryazanov, A.N. Issledovanie vozmozhnosti primeneniya bionicheskikh metodov pchelinykh koloniy dlya realizatsii kriptoanaliza klassicheskikh shifrov perestanovok. [Research on applicability of bionic techniques of artificial bee colonies for implementation of classical transposition cipher cryptanalysis.]Vestnik of DSTU, 2014, vol. 14, no. 1(76), pp. 62–75 (in Russian).

9. Sergeyev, A.S. Issledovanie i razrabotka metodov geneticheskogo poiska dlya organizatsii kriptoanaliza blochnykh kriptosistem v sistemakh upravleniya bezopasnost´yu i zashchity informatsii na primere standarta shifrovaniya DES. [Research and development of genetic search methods for the organization of block cryptosystem cryptanalysis in the safety management systems and data protection using an example of the standard DES encryption.] Tret´ya mezhdunar. konf. po problemam upravleniya : plenarnye doklady i izbrannye trudy. [III Int. Conf. on control problems: plenary paperss and selecta.] Moscow, 2006, pp. 328–335 (in Russian).

10. Barskiy, А.B. Planirovanie parallel´nykh vychislitel´nykh protsessov. [Planning of parallel computing processes.] Moscow: Mashinostroenie, 198, 191 p. (in Russian).

11. Sergeyev, A.S. Parallel´noe programmirovanie. [Parallel programming.] Rostov-on-Don: DSTU Publ. Centre, 2002, 77 p. (in Russian).

12. Voyevodin, V.V. Matematicheskie modeli i metody v parallel´nykh protsessakh. [Mathematical models and methods in parallel processes.] Moscow: Nauka, 1986, 296 p. (in Russian).

13. Sergeyev, A.S. Razrabotka geneticheskogo metoda kriptoanaliza blochnykh kriptosistem i issledovanie vozmozhnosti ikh parallel´noy realizatsii v sistemakh zashchity informatsii na primere standarta DES. [Development of the genetic method of block cryptosystem cryptanalysis and feasibility study of their parallel implementation in information security systems on the example of DES standard.] Sistemnyy analiz v proektirovanii i upravlenii: tr. 10 mezhdunar. nauch.- prakt. konf. [System analysis in the design and management: Proc. X Int.-Pract. Conf.] St. Petersburg, 2006, pp. 258–265 (in Russian).

14. Babenko, L.K. Ishchukova, E.A., Sidorov, I.D. Primenenie parallel´nykh vychisleniy pri reshenii zadach zashchity informatsii. [Application of parallel calculations at the solution of information protection problems.] Program Systems: Theory and Applications, 2013, no. 3(17), pp. 25–42 (in Russian).

15. Morozenko, V.V., Eliseev, G.O. Geneticheskiy algoritm dlya kriptoanaliza shifra Vizhinera. [A genetic algorithm for cryptoanalysis of Vigener’s cipher.]Bulletin of Perm University. Mathematics. Mechanics. Computer Science. 2010, no. 1, pp. 75–80 (in Russian).

Login or Create
* Forgot password?