{"title":"网络安全攻击中的软计算和动态隧道范式","authors":"N. Nalini, R. Raghavendra","doi":"10.1109/ICISIP.2006.4286067","DOIUrl":null,"url":null,"abstract":"Most cryptanalysis problems are characterised by a feature having one global optimum solution and several local minima, when formulated as an optimisation problem. Among the several heuristic techniques adopted to solve such optimisation problems, it is noticed that a genetic algorithm gets trapped at a local minimum solution. Dynamic tunneling technique has been recently used for obtaining global optimum solution for several problems. Motivated by this fact, we adopt a hybrid version of genetic algorithm and dynamic tunneling technique for the cryptanalysis of a popular stream cipher SEAL (software encryption algorithm). The concepts developed in the paper are useful in the cryptanalysis of block and stream ciphers.","PeriodicalId":187104,"journal":{"name":"2006 Fourth International Conference on Intelligent Sensing and Information Processing","volume":"20 6","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2006-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Soft Computing and Dynamic Tunneling Paradigms in Network Security Attacks\",\"authors\":\"N. Nalini, R. Raghavendra\",\"doi\":\"10.1109/ICISIP.2006.4286067\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Most cryptanalysis problems are characterised by a feature having one global optimum solution and several local minima, when formulated as an optimisation problem. Among the several heuristic techniques adopted to solve such optimisation problems, it is noticed that a genetic algorithm gets trapped at a local minimum solution. Dynamic tunneling technique has been recently used for obtaining global optimum solution for several problems. Motivated by this fact, we adopt a hybrid version of genetic algorithm and dynamic tunneling technique for the cryptanalysis of a popular stream cipher SEAL (software encryption algorithm). The concepts developed in the paper are useful in the cryptanalysis of block and stream ciphers.\",\"PeriodicalId\":187104,\"journal\":{\"name\":\"2006 Fourth International Conference on Intelligent Sensing and Information Processing\",\"volume\":\"20 6\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2006-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2006 Fourth International Conference on Intelligent Sensing and Information Processing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICISIP.2006.4286067\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2006 Fourth International Conference on Intelligent Sensing and Information Processing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICISIP.2006.4286067","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Soft Computing and Dynamic Tunneling Paradigms in Network Security Attacks
Most cryptanalysis problems are characterised by a feature having one global optimum solution and several local minima, when formulated as an optimisation problem. Among the several heuristic techniques adopted to solve such optimisation problems, it is noticed that a genetic algorithm gets trapped at a local minimum solution. Dynamic tunneling technique has been recently used for obtaining global optimum solution for several problems. Motivated by this fact, we adopt a hybrid version of genetic algorithm and dynamic tunneling technique for the cryptanalysis of a popular stream cipher SEAL (software encryption algorithm). The concepts developed in the paper are useful in the cryptanalysis of block and stream ciphers.