Skip to main content
Erschienen in: Mobile Networks and Applications 4/2018

18.01.2018

A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem

verfasst von: Mohamed Abdel-Basset, Doaa El-Shahat, Ibrahim El-henawy, Arun Kumar Sangaiah, Syed Hassan Ahmed

Erschienen in: Mobile Networks and Applications | Ausgabe 4/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

With the advance of the communication technology and the massive flow of information across the internet, it is becoming urgent to keep the confidentiality of the transmitted information. Using the internet has been extended to several fields such as e-mail, e-commerce, e-learning, health and medicine, shopping, and so on. Cryptography is the study of different techniques for securing the communication between the sender and the receiver. One of the most known cryptosystems is Merkle–Hellman Knapsack Cryptosystem (MHKC). It is one of the earliest Public Key Cryptosystem (PKC) that is used to secure the messages between the sender and the receiver. Developing a powerful cryptosystem comes after studying the fragility points of the current cryptosystems. The Whale Optimization Algorithm (WOA) is one of the most recent nature-inspired meta-heuristic optimization algorithms, which simulates the social behavior of humpback whales. WOA has validated excellent performance in solving the continuous problems and the engineering optimization problems. This paper introduces a novel Modified version of WOA (MWOA) for cryptanalysis of MHKC. The sigmoid function is used to map the continuous values into discrete one. A penalty function is added to the evaluation function to deal with the infeasible solutions. The mutation operation is employed for improving the solutions. The results show that MWOA is more effective and robust than other algorithms in the literature.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Weitere Produktempfehlungen anzeigen
Literatur
1.
Zurück zum Zitat Merkle R, Hellman M (1978) Hiding information and signatures in trapdoor knapsacks. IEEE Trans Inf Theory 24(5):525–530CrossRef Merkle R, Hellman M (1978) Hiding information and signatures in trapdoor knapsacks. IEEE Trans Inf Theory 24(5):525–530CrossRef
5.
Zurück zum Zitat Liu S, Fu W, He L, Zhou J, Ma M (2017) Distribution of primary additional errors in fractal encoding method. Multimedia Tools Appl 76(4):5787–5802CrossRef Liu S, Fu W, He L, Zhou J, Ma M (2017) Distribution of primary additional errors in fractal encoding method. Multimedia Tools Appl 76(4):5787–5802CrossRef
6.
Zurück zum Zitat Liu S, Cheng X, Lan C, Fu W, Zhou J, Li Q, Gao G (2013) Fractal property of generalized M-set with rational number exponent. Appl Math Comput 220:668–675MathSciNetMATH Liu S, Cheng X, Lan C, Fu W, Zhou J, Li Q, Gao G (2013) Fractal property of generalized M-set with rational number exponent. Appl Math Comput 220:668–675MathSciNetMATH
7.
Zurück zum Zitat Liu S, Cheng X, Fu W, Zhou Y, Li Q (2014) Numeric characteristics of generalized M-set with its asymptote. Appl Math Comput 243:767–774MathSciNetMATH Liu S, Cheng X, Fu W, Zhou Y, Li Q (2014) Numeric characteristics of generalized M-set with its asymptote. Appl Math Comput 243:767–774MathSciNetMATH
9.
Zurück zum Zitat Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371CrossRef Li X, Niu J, Khan MK, Liao J (2013) An enhanced smart card based remote user password authentication scheme. J Netw Comput Appl 36(5):1365–1371CrossRef
10.
Zurück zum Zitat Spillman R (1993) Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia 17(4):367–377CrossRefMATH Spillman R (1993) Cryptanalysis of knapsack ciphers using genetic algorithms. Cryptologia 17(4):367–377CrossRefMATH
11.
Zurück zum Zitat Garg P, Shastri A, Agarwal DC (2006) An enhanced cryptanalytic attackknetic algorithm. Trans Eng Comput Technol 12:829–832 Garg P, Shastri A, Agarwal DC (2006) An enhanced cryptanalytic attackknetic algorithm. Trans Eng Comput Technol 12:829–832
12.
Zurück zum Zitat Palit S, Sinha SN, Molla MA, Khanra A, Kule M (2011, September) A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm. In: 2011 2nd International conference on computer and communication technology (ICCCT), IEEE, pp 428–432 Palit S, Sinha SN, Molla MA, Khanra A, Kule M (2011, September) A cryptanalytic attack on the knapsack cryptosystem using binary firefly algorithm. In: 2011 2nd International conference on computer and communication technology (ICCCT), IEEE, pp 428–432
13.
Zurück zum Zitat Singh H (2016) Contravening esotery: cryptanalysis of knapsack cipher using genetic algorithms. arXiv preprint arXiv:1606.06047 Singh H (2016) Contravening esotery: cryptanalysis of knapsack cipher using genetic algorithms. arXiv preprint arXiv:1606.06047
14.
Zurück zum Zitat Kochladze Z, Beselia L (2016) Cracking of the Merkle–Hellman cryptosystem using genetic algorithm. Int J Sci Technol 3(1–2):291–296 Kochladze Z, Beselia L (2016) Cracking of the Merkle–Hellman cryptosystem using genetic algorithm. Int J Sci Technol 3(1–2):291–296
15.
Zurück zum Zitat Agarwal A (2011) Encrypting messages using the Merkle-Hellman knapsack cryptosystem. IJCSNS 11(5):12 Agarwal A (2011) Encrypting messages using the Merkle-Hellman knapsack cryptosystem. IJCSNS 11(5):12
16.
Zurück zum Zitat Padhmavathi B, Ray A, Anjum A, Bhat S (2013, January) Improvement of CBC encryption technique by using the Merkle-Hellman knapsack cryptosystem. In: 2013 7th international conference on intelligent systems and control (ISCO), IEEE, pp 340–344 Padhmavathi B, Ray A, Anjum A, Bhat S (2013, January) Improvement of CBC encryption technique by using the Merkle-Hellman knapsack cryptosystem. In: 2013 7th international conference on intelligent systems and control (ISCO), IEEE, pp 340–344
17.
Zurück zum Zitat Ray A, Bhat S (2013) Enhancement of Merkle-Hellman knapsack cryptosystem by use of discrete logarithmics. Int J Sci Res Publ 3(4):230 Ray A, Bhat S (2013) Enhancement of Merkle-Hellman knapsack cryptosystem by use of discrete logarithmics. Int J Sci Res Publ 3(4):230
18.
Zurück zum Zitat Jain A, Chaudhari NS (2014) Cryptanalytic results on knapsack cryptosystem using binary particle swarm optimization. In: International joint conference SOCO’14-CISIS’14-ICEUTE’14, Springer International Publishing, pp 375–384 Jain A, Chaudhari NS (2014) Cryptanalytic results on knapsack cryptosystem using binary particle swarm optimization. In: International joint conference SOCO’14-CISIS’14-ICEUTE’14, Springer International Publishing, pp 375–384
19.
Zurück zum Zitat Kennedy J, Eberhart RC (1997, October) A discrete binary version of the particle swarm algorithm. In: Computational cybernetics and simulation, 1997 I.E. international conference on systems, man, and cybernetics, vol. 5, IEEE, pp 4104–4108 Kennedy J, Eberhart RC (1997, October) A discrete binary version of the particle swarm algorithm. In: Computational cybernetics and simulation, 1997 I.E. international conference on systems, man, and cybernetics, vol. 5, IEEE, pp 4104–4108
20.
Zurück zum Zitat Bansal JC, Deep K (2012) A modified binary particle swarm optimization for knapsack problems. Appl Math Comput 218(22):11042–11061MathSciNetMATH Bansal JC, Deep K (2012) A modified binary particle swarm optimization for knapsack problems. Appl Math Comput 218(22):11042–11061MathSciNetMATH
21.
Zurück zum Zitat Sinha SN, Palit S, Molla MA, Khanra A, Kule M (2011, September) A cryptanalytic attack on Knapsack cipher using differential evolution algorithm. In: 2011 I.E. recent advances in intelligent computational systems (RAICS), IEEE, pp 317–320 Sinha SN, Palit S, Molla MA, Khanra A, Kule M (2011, September) A cryptanalytic attack on Knapsack cipher using differential evolution algorithm. In: 2011 I.E. recent advances in intelligent computational systems (RAICS), IEEE, pp 317–320
22.
Zurück zum Zitat Beselia L (2016) Using genetic algorithm for cryptanalysis cryptoalgorithm Merkle-Hellman. Comput Sci Telecommun 48(2):49–53 Beselia L (2016) Using genetic algorithm for cryptanalysis cryptoalgorithm Merkle-Hellman. Comput Sci Telecommun 48(2):49–53
23.
Zurück zum Zitat Lokeshwari G, Susarla S, Kumar SU (2015) A modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm. J Discret Math Sci Cryptogr 18(3):293–300MathSciNetCrossRef Lokeshwari G, Susarla S, Kumar SU (2015) A modified technique for reliable image encryption method using Merkle-Hellman cryptosystem and RSA algorithm. J Discret Math Sci Cryptogr 18(3):293–300MathSciNetCrossRef
24.
Zurück zum Zitat Lokeshwari G, Kumar SU, Susarla SV (2015) An efficient image encryption using Merkle-Hellman, elgamal and genetic algorithm for color images. Appl Mech Mater 719:1140CrossRef Lokeshwari G, Kumar SU, Susarla SV (2015) An efficient image encryption using Merkle-Hellman, elgamal and genetic algorithm for color images. Appl Mech Mater 719:1140CrossRef
25.
Zurück zum Zitat Thangavel M, Varalakshmi P (2017, January) A novel public key cryptosystem based on Merkle-Hellman knapsack cryptosystem. In: 2016 eighth international conference on advanced computing (ICoAC), IEEE, pp 117–122 Thangavel M, Varalakshmi P (2017, January) A novel public key cryptosystem based on Merkle-Hellman knapsack cryptosystem. In: 2016 eighth international conference on advanced computing (ICoAC), IEEE, pp 117–122
26.
Zurück zum Zitat Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67CrossRef Mirjalili S, Lewis A (2016) The whale optimization algorithm. Adv Eng Softw 95:51–67CrossRef
Metadaten
Titel
A Novel Whale Optimization Algorithm for Cryptanalysis in Merkle-Hellman Cryptosystem
verfasst von
Mohamed Abdel-Basset
Doaa El-Shahat
Ibrahim El-henawy
Arun Kumar Sangaiah
Syed Hassan Ahmed
Publikationsdatum
18.01.2018
Verlag
Springer US
Erschienen in
Mobile Networks and Applications / Ausgabe 4/2018
Print ISSN: 1383-469X
Elektronische ISSN: 1572-8153
DOI
https://doi.org/10.1007/s11036-018-1005-3

Weitere Artikel der Ausgabe 4/2018

Mobile Networks and Applications 4/2018 Zur Ausgabe

Neuer Inhalt