Skip to main content

2015 | OriginalPaper | Buchkapitel

Cryptanalysis of Simplified-AES Using Intelligent Agent

verfasst von : Rania Saeed, Ashraf Bhery

Erschienen in: Hybrid Artificial Intelligent Systems

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Software agent technology is a rapidly developing area of research. In this paper, we introduce a new application of an agent system, called cryptanalytic-agent system whose behaviour will be intelligent enough to attack Simplified Advance Encryption Standard (S-AES) block cipher. Our results confirm the versatility of our proposed approach.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Fußnoten
1
The type of agent, that we focus on, is the autonomous, pro-active behaviour of a single agent, that is situated in a particular environment.
 
2
This form is used widely for describing SAT and MAXSAT problems.
 
3
These action rules give a new strategy for known plaintext attack of S-AES.
 
4
A mental state condition determines the states in which \(Act\) may be executed.
 
5
The bold components in column effect are the components that effected by the applied rule.
 
6
The symbol ? denotes that the key vector \(KV\) is undetermined.
 
7
The bold components in column fact base are the components that effected by the fired rule.
 
8
The function ‘Check-key’ used to check the key from an assign A with k in a model M2 to derive the model M2 is valid or not.
 
Literatur
1.
Zurück zum Zitat Musa, M.A., Schaefer, E.R., Wedig, S.: A simplified AES algorithm and its linear and differential cryptanalyses. Cryptologia 27(2), 148–177 (2003)CrossRef Musa, M.A., Schaefer, E.R., Wedig, S.: A simplified AES algorithm and its linear and differential cryptanalyses. Cryptologia 27(2), 148–177 (2003)CrossRef
2.
Zurück zum Zitat Daemen, J., Rijmen, V.: The Design of Rijndael: AES The Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRef Daemen, J., Rijmen, V.: The Design of Rijndael: AES The Advanced Encryption Standard. Springer, Heidelberg (2002)CrossRef
3.
Zurück zum Zitat Wooldridge, M.: An Introduction to MultiAgent Systems. 1 edn. John Wiley & Sons, Chichester (2002) Wooldridge, M.: An Introduction to MultiAgent Systems. 1 edn. John Wiley & Sons, Chichester (2002)
4.
Zurück zum Zitat Wooldridge, M., jennings, N.R.: Intelligent agents: theory and practice. Knowl. Eng. Rev. 10(2), 115–152 (1995)CrossRef Wooldridge, M., jennings, N.R.: Intelligent agents: theory and practice. Knowl. Eng. Rev. 10(2), 115–152 (1995)CrossRef
5.
Zurück zum Zitat Russel, S., Norving, P.: Artificial Intelligence-A Modern Approach, 2nd ED. Prentice Hall, Upper saddle river (2003) Russel, S., Norving, P.: Artificial Intelligence-A Modern Approach, 2nd ED. Prentice Hall, Upper saddle river (2003)
6.
Zurück zum Zitat Mansoori, S.D., Bizaki, H.K.: On the vulnerability of simplified aes algorithm against linear cryptanalysis. Int. J. Comp. Sci. Netw. Secur. 7(7), 257–263 (2007) Mansoori, S.D., Bizaki, H.K.: On the vulnerability of simplified aes algorithm against linear cryptanalysis. Int. J. Comp. Sci. Netw. Secur. 7(7), 257–263 (2007)
8.
Zurück zum Zitat Valarmathi, M.L., Vimalathithan, R.: Cryptanalysis of simplified-aes using particle swarm optimisation. Defence Sci. J. 62(2), 117–121 (2012)CrossRef Valarmathi, M.L., Vimalathithan, R.: Cryptanalysis of simplified-aes using particle swarm optimisation. Defence Sci. J. 62(2), 117–121 (2012)CrossRef
9.
Zurück zum Zitat Forouzan, B.A.: Cryptography and Network Security. McGraw-Hill Company, Boston (2007) Forouzan, B.A.: Cryptography and Network Security. McGraw-Hill Company, Boston (2007)
10.
Zurück zum Zitat Paar, C.: A new architecture for a parallel finite field multiplier with low complexity based on composite fields. IEEE Trans. Comput. 45(7), 856–861 (1996)CrossRefMATHMathSciNet Paar, C.: A new architecture for a parallel finite field multiplier with low complexity based on composite fields. IEEE Trans. Comput. 45(7), 856–861 (1996)CrossRefMATHMathSciNet
11.
Zurück zum Zitat Tseitin, G.S.: On the complexity of derivation in the propositional calculus. In Slisenko, A.O., (ed.) Studies in Constructive Mathematics and Mathematical Logic, Part II, pp. 115–125. Springer, New York (1970) Tseitin, G.S.: On the complexity of derivation in the propositional calculus. In Slisenko, A.O., (ed.) Studies in Constructive Mathematics and Mathematical Logic, Part II, pp. 115–125. Springer, New York (1970)
12.
Zurück zum Zitat Christof, P., Fleischmann, P., Roelse, P.: Efficient multiplier architectures for galois fields. IEEE Trans. Comput. 47, 70–162 (1998) Christof, P., Fleischmann, P., Roelse, P.: Efficient multiplier architectures for galois fields. IEEE Trans. Comput. 47, 70–162 (1998)
13.
Zurück zum Zitat Cook, S.A.: The complexity of theorem proving procedures. In: Proceedings of the Third Annual ACM Symposium on the Theory of Computing, pp. 151–158. ACM (1971) Cook, S.A.: The complexity of theorem proving procedures. In: Proceedings of the Third Annual ACM Symposium on the Theory of Computing, pp. 151–158. ACM (1971)
14.
Zurück zum Zitat Biere, A., Heule, M., Van Maaren, H., Walsh, T.: Handbook of Satisfiability. IOS Press, Amsterdam (2009)MATH Biere, A., Heule, M., Van Maaren, H., Walsh, T.: Handbook of Satisfiability. IOS Press, Amsterdam (2009)MATH
15.
Zurück zum Zitat Hill, E.F.: Jess in Action: Java Rule-Based Systems. Manning Publications Co., Greenwich (2003) Hill, E.F.: Jess in Action: Java Rule-Based Systems. Manning Publications Co., Greenwich (2003)
16.
Zurück zum Zitat Argelich, J., Li, C.-M., Manyà F., Planes, J.: The first and second Max-SAT evaluations. Journal on Satisfiability, Boolean Modeling and Computation 4, 251–278 (2008) Argelich, J., Li, C.-M., Manyà F., Planes, J.: The first and second Max-SAT evaluations. Journal on Satisfiability, Boolean Modeling and Computation 4, 251–278 (2008)
Metadaten
Titel
Cryptanalysis of Simplified-AES Using Intelligent Agent
verfasst von
Rania Saeed
Ashraf Bhery
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-19644-2_15