Accesso libero

Cryptanalysis of the Columnar Transposition Using Meta-Heuristics

INFORMAZIONI SU QUESTO ARTICOLO

Cita

[1] ANTAL, E.: Modern Cryptanalysis of Classical Ciphers. PhD. Thesis, STU in Bratislave, 2017. (In Slovak)Search in Google Scholar

[2] ANTAL, E.—ELIÁŠ, M.: Evolutionary Computation in cryptanalysis of classical ciphers, Tatra Mt. Math. Publ. 70 (2017), 179–197.Search in Google Scholar

[3] ANTAL, E.—GROŠEK, O.—HORAK, P.: On a mnemonic construction of permutations, J. Math Cryptology. 11 (2017), no. 1, 45–53.Search in Google Scholar

[4] BANKS, M. J.: A Search-Based Tool for the Automated Cryptanalysis of Classical Ciphers. The University of York, Department of Computer Science, May, 2008.Search in Google Scholar

[5] CLARK, A. J.: Optimisation Heuristics for Cryptology. PhD. Thesis, Queensland University of Technology, 1998.Search in Google Scholar

[6] GIDDY, J. P.—SAFAVI-NAINI, R.: Automated cryptanalysis of transposition ciphers, The Comput. Journal 37 (1994) no. 5, 429–436.Search in Google Scholar

[7] FORSYTH, W. S.—SAFAVI-NAINI, R.: Automated cryptanalysis of substitution ciphers, Cryptologia, 17 (1993), n. 4, 407–418.10.1080/0161-119391868033Open DOISearch in Google Scholar

[8] JAKOBSEN, T.: A fast method for the cryptanalysis of substitution ciphers, Cryptologia, 19 (1995), n. 3, pp. 265–274.Search in Google Scholar

[9] KULLBACK, S.: (Statistical Methods in Cryptanalysis). Aegean Park Press, Laguna Hills, California, 1976.Search in Google Scholar

[10] KVASNIČKA, V.—POSPÍCHAL, J.—TIŇO, P.: Evolučné algoritmy.Vydavateľstvo STU, Bratislava, 2000.Search in Google Scholar

[11] LASRY, G.: A Methodology of Cryptanalysis of Classical Ciphers with Search meta-heuristics. PhD. Thesis, Kassel University, 2017.Search in Google Scholar

[12] MATTHEWS, R. A. J.: The Use of Genetic Algorithms in Cryptanalysis, Cryptologia, 17 (1993), n. 2, 187–201.10.1080/0161-119391867863Open DOISearch in Google Scholar

[13] ÓLAFSSON, S.: Metaheuristics. In: Handbooks in Operations Research and Management Science Vol. 13, 2006, pp. 633–654.10.1016/S0927-0507(06)13021-2Search in Google Scholar

[14] GANESAN, R.—SHERMAN, A.: Statistical Techniques for Language Recognition: An Introduction and Guide for Cryptanalysts. 1993, [cit: 2016-01-30]; http://web.cecs.pdx.edu/~bart/decrypter/gs93.pdf.Search in Google Scholar

[15] REEVES, C. R.: Search Methodologies: Introductory Tutorials in Optimization and Decision Support Techniques, Chapter: Fitness Landscapes. Boston, MA: Springer, New York, 2005, pp. 587–610.Search in Google Scholar

[16] RUSSELL, M. D.—CLARK, J. A.—STEPNEY, S.: Making the most of two heuristics: breaking transposition ciphers with ants, In: CEC 03, Vol. 4, 2003, pp. 2653–2658.Search in Google Scholar

[17] SPILLMAN, R.—JANSSEN, M.—NELSON, B.: Use of a genetic algorithm in the cryptanalysis of simple substitution ciphers. Cryptologia, 17 (1993), no. 1, 31–44.Search in Google Scholar

[18] VOBBILISETTY, R.—TROIA, F. D.—LOW, R. M.—VISAGGIO, A. C.—STAMP, M.: Classic cryptanalysis using hidden Markov models, Cryptologia 41 (2017), no. 1, 1–28; http://dx.doi.org/10.1080/01611194.2015.112666010.1080/01611194.2015.1126660Open DOISearch in Google Scholar

[19] American National Corpus Project, http://www.anc.org/data/oanc/download/Search in Google Scholar

[20] STU BA klaster - IBM iDataPlex, https://www.hpc.stuba.skSearch in Google Scholar

eISSN:
1210-3195
Lingua:
Inglese
Frequenza di pubblicazione:
3 volte all'anno
Argomenti della rivista:
Mathematics, General Mathematics