257
Views
2
CrossRef citations to date
0
Altmetric

References

  • Bagnall , A. J. 1996 . The Applications of Genetic Algorithms in Cryptanalysis. Master's Thesis, School of Information Systems, University of East Anglia.
  • Bin Ahmad , B. and M. A. Bin Maarof . 2006 . Cryptanalysis Using Biological Inspired Computing Approaches. In Proceedings of the Postgraduate Annual Research Seminar, 24–25 May, Skudai, Malaysia, pp. 92–96.
  • Blum , C. , A. Roli , and E. Alba . 2005 . An Introduction to Metaheuristic Techniques, in Parallet Metaheuristics: A New Class of Algorithms, E. Alba, (ed), John Wiley & Sons, Inc.: Hoboken, NJ. DOI: 10.1002/0471739383.ch1 , p. 1 – 42 .
  • Carmona , J. 1894 . Tratado de criptografía con aplicación especial al ejército . Madrid , Spain : Sucesores de Rivadeneyra .
  • Clark , A. J. 1998 . Optimisation Heuristics for Cryptology . Australia : Queensland University of Technology .
  • Cplex. 1997 . Using the Cplex Callable Library . Incline Village , NV , USA : ILOG, Inc.
  • Dalkilic , M. E. and C. Gungor . 2000 . “An Iteractive Cryptanalysis Algorithm for the Vigenere Cipher,” Lecture Notes in Computer Science , 1909 : 341 – 351 .
  • Dimovski , A. and D. Gligoroski . 2003 . Attacks on the Transposition Ciphers Optimization Heuristics. In S. Bulgaria ed., Proceedings of the XXXVIII International Scientific Conference on Information, Communication & Energy Systems & Technologies (ICEST'03), Sofia, Bulgaria, October 2003.
  • Faisal , M. , and A. M. Youssef . 2006a. An Artificial Life Technique for the Cryptanalysis of Simple Substitution Ciphers, Canadian Conference on Electrical and Computer Engineering (CCECE'06), Ottawa, Canada, May, p. 1582–1585.
  • Faisal , M. , and A. M. Youssef . 2006b . Cryptanalysis of Simple Substitution Ciphers Using Particle Swarm Optimization. IEEE Congress on Evolutionary Computation, Concordia University, Montreal, Canada, 16–21 July 2006, p. 677–680. Vancouver, BC, Canada, 16–21 July.
  • Forsyth , W. S. and R. Safavi-Naini . 1993 . “Automated cryptanalysis of substitution ciphers,” Cryptologia , 17 ( 4 ):407–418.
  • Fouche , H. 1939 . Cryptanalysis: A Study of Ciphers and Their Solution . Dover Publications : Mineola , NY .
  • Friedman , W. F. 1922 . The Index of Coincidence and Its Applications in Cryptology. Department of Ciphers Publ. 22. Geneva, IL, USA: Riverbank Laboratories.
  • Gao , Y. 2003 . Population Size and Sampling Complexity in Genetic Algorithms. Genetic and Evolutionary Computation Conference (GECCO), Chicago, IL, 12–13 July 2003.
  • Garg , P. 2009 . Genetic Algorithms, Tabu Search and Simulated Annealing: A Comparison Between Three Approaches for the Cryptanalysis of Transposition Cipher , Theoretical and Applied Information Technology , 15 ( 4 ):387–392.
  • Gass , S. I. 1969 . Linear Programming . New York , USA : McGraw-Hill .
  • Gester , J. 2003 . Solving Substitution Ciphers with Genetics Algorithm . http://www.cs.rechester.edu/u/brown/Crypto/studprojs/SubstGen.pdf. (accessed 20 December 2003).
  • Giddy , J. P. and R. Safavi-Naini . 1994 . “Automated Cryptanalysis of Transposition Cipher” . The Computer Journal , 37 ( 5 ):429–436.
  • Goldberg , D. E. and J. Richardson . 1987 . Genetic Algorithms with Sharing for Multimodal Functions Optimization. In Genetic Algorithms and their Applications: Second International Conference on Genetic Algorithms, New Jersey, USA, 28–31 July, pp. 41–49.
  • Gorodilov , A. and M. Vladimir . 2008 . “Genetic Algorithm for Finding the Key's Length and Cryptanalysis of the Permutation Cipher,“ Information Theories & Applications , 15 ( 1 ): 94 – 99 .
  • Jakobsen , T. 1995 . “A Fast Method for Cryptanalysis of Substitution Ciphers,” Cryptologia , 19 ( 3 ): 265 – 274 .
  • Jarmo , T. 1992 . On Optimal Population Size of Genetic Algorithms . In Computer Systems and Software Engineering , The Hague : Netherlands , 4–8 May , p. 65 – 70 .
  • Kasiski , F. W. 1863 . Die Geheimschriften und die Dechiffrir-Kunst . Berlin , Germany : E. S. Mittler und Sohn .
  • Matthews , R. A. J. 1993 . “The Use of Genetic Algorithms in Cryptanalysis,” Cryptologia , 17 ( 2 ): 187 – 201 .
  • Menezes , A. J. , P. Van Oorschot , and S. Vanstone (Foreward by R. Rivest). 1997 . Handbook of Applied Cryptography . United Kingdom : CRC Press .
  • Nagy , G. , S. C. Seth , and K. Einspahr . 1987 . “Decoding Substitution Ciphers by Means of Word Matching with Application to OCR,” IEEE Transactions on Pattern Analysis and Machine Intelligence , 9 ( 5 ): 710 – 715 .
  • Nemhauser , G. L. and L. A. Wolsey . 1988 . Integer and Combinatorial Optimization . New York , USA : John Wiley & Sons .
  • Neuenschwander , D. 2004 . Probabilistic and Statistical Methods in Cryptology: Classical Polyalphabetic Substitution Ciphers . Bern , Switzerland : Springer, 3003 .
  • Rainer , B. , M. Dell'Amico , and S. Martello . 2009 . Assignment Problems . Philadelphia , PA , USA : SIAM .
  • Russell , M. D. , A. J. Clark , and S. Stepney . 2003 . Making the Most of Two Heuristics: Breaking Transposition Ciphers with Ants. IEEE Xplore, Canberra, Australia, 8–12 December, pp. 2653–2658.
  • Soler , J. R. 2004 . “Mechanical Cipher Systems in the Spanish Civil War,” Cryptologia , 28 ( 3 ): 265 – 276 .
  • Soler , J.R. , and F.J. López-Brea . 2007a. Soldados sin Rostro . Barcelona , Spain : Inedita Editores.
  • Soler , J.R. , and F.J. López-Brea . 2007b . “The Strip Cipher—The Spanish Official Method,” Cryptologia , 31 ( 1 ): 46 – 56 .
  • Spillman , R. , M. Janssen , B. Nelson , and M. Kepner . 1993 . “Use of a Genetic Algorithm in the Cryptanalysis of Simple Substitution Ciphers,” Cryptologia , 17 ( 1 ): 31 – 44 .
  • Stallings , W. 2003 . Cryptography and Network Security, . , 3rd ed Prentice Hall , NJ , USA .
  • Toemeh , R. and S. Arumugam . 2007 . “Breaking Transposition Cipher with Genetic Algorithm,” Electronic and Electrical Engineering , 7 ( 79 ): 75 – 78 .
  • Toemeh , R. and S. Arumugam . 2008 . “Applying Genetic Algorithms for Searching Key Space of Polyalphabetic Substitution Ciphers,” The International Arab Journal of Information Technology , 5 ( 1 ): 87 – 91 .
  • Verma , A. K. , M. Dave , and R. C. Joshi . 1998 . “Genetic Algorithm and Tabu Search Attack on the Mono-Alphabetic Substitution Cipher in Adhoc Networks,” Computer Science , 3 ( 3 ): 134 – 137 .
  • Yao , X. 1993 . “An Empirical Study of Genetic Operators in Genetic Algorithms,” Microprocessing and Microprogramming , 18 : 707 – 714 .

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.