{"title":"Splicing DNA Model for Unknown Stream Cipher Cryptanalysis","authors":"B. S. Yaseen","doi":"10.1109/IT-ELA52201.2021.9773767","DOIUrl":null,"url":null,"abstract":"The stream cipher combines vary advantages, that make it widely used. Including its suitability for on line transmission devices, its strength, simplicity, as well as its suitability for hard ware. It's considered difficult to break, especially when it be strong and unknown details. As a result-oriented idea for unknown stream cipher cryptanalysis, it can be attacked if the generator is known through the generator's output that combined with the plain text sequence to produce the cipher text sequence. The summary of the idea is to convert the final cipher text sequence into a genetic bases sequence by adopting the transformation: cipher bit 0 is convert into A or T, and cipher bit 1 is convert into C or G, by regarding several possibilities for cipher text transformations, a population of double Deoxyribonucleic Acid (DNA) strands can be formed, this population is an introduction to the splicing model, which is based on the conduct of its processes on two types of statistics, linguistic statistics for resting the plain text generated each time from the model, and statistics for randomness to test the key sequence is accompanying this plain text. Time is a measure of the complexity of comparing the methods implemented to cryptanalyze such a cipher, the consumed time to reach (90–95) % from the solutions of a variety examples is fixed and according to the length of the processed block of the cipher text sequence, which is approximately (mO(n)) for M blocks. The aim of this work is the digital simulation of the biological capabilities, in the field of analyzing and attacking the OTP cipher.","PeriodicalId":330552,"journal":{"name":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 2nd Information Technology To Enhance e-learning and Other Application (IT-ELA)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/IT-ELA52201.2021.9773767","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 1
Abstract
The stream cipher combines vary advantages, that make it widely used. Including its suitability for on line transmission devices, its strength, simplicity, as well as its suitability for hard ware. It's considered difficult to break, especially when it be strong and unknown details. As a result-oriented idea for unknown stream cipher cryptanalysis, it can be attacked if the generator is known through the generator's output that combined with the plain text sequence to produce the cipher text sequence. The summary of the idea is to convert the final cipher text sequence into a genetic bases sequence by adopting the transformation: cipher bit 0 is convert into A or T, and cipher bit 1 is convert into C or G, by regarding several possibilities for cipher text transformations, a population of double Deoxyribonucleic Acid (DNA) strands can be formed, this population is an introduction to the splicing model, which is based on the conduct of its processes on two types of statistics, linguistic statistics for resting the plain text generated each time from the model, and statistics for randomness to test the key sequence is accompanying this plain text. Time is a measure of the complexity of comparing the methods implemented to cryptanalyze such a cipher, the consumed time to reach (90–95) % from the solutions of a variety examples is fixed and according to the length of the processed block of the cipher text sequence, which is approximately (mO(n)) for M blocks. The aim of this work is the digital simulation of the biological capabilities, in the field of analyzing and attacking the OTP cipher.