Cryptanalysis using biological inspired computing approaches

In security, cryptology is introduced to guarantee the safety of data, whereby it is divided into cryptography and cryptanalysis. Cryptography is a technique to conceal information by means of encryption and decryption while cryptanalysis is used to break the encrypted information using some methods...

Full description

Bibliographic Details
Main Authors: Ahmad, Badrisham, Maarof, Mohd. Aizaini
Format: Conference or Workshop Item
Language:English
Published: 2006
Subjects:
Online Access:http://eprints.utm.my/7801/
http://eprints.utm.my/7801/1/MohdAizainiMaarof2006_CryptanalysisusingBiologicalInspiredComputing.pdf
_version_ 1848891547656912896
author Ahmad, Badrisham
Maarof, Mohd. Aizaini
author_facet Ahmad, Badrisham
Maarof, Mohd. Aizaini
author_sort Ahmad, Badrisham
building UTeM Institutional Repository
collection Online Access
description In security, cryptology is introduced to guarantee the safety of data, whereby it is divided into cryptography and cryptanalysis. Cryptography is a technique to conceal information by means of encryption and decryption while cryptanalysis is used to break the encrypted information using some methods. Biological Inspired Computing (BIC) is a method that takes ideas from biology to be used in computing. BIC is a field that has been widely used in many computer applications such as pattern recognition, computer and network security and optimization. Some examples of BIC approaches are genetic algorithm (GA), ant colony and artificial immune system (AIS). GA and ant colony have been successfully applied in cryptanalysis of classical ciphers. Therefore, this paper will review these techniques and explore the potential of using AIS in cryptanalysis.
first_indexed 2025-11-15T20:59:42Z
format Conference or Workshop Item
id utm-7801
institution Universiti Teknologi Malaysia
institution_category Local University
language English
last_indexed 2025-11-15T20:59:42Z
publishDate 2006
recordtype eprints
repository_type Digital Repository
spelling utm-78012017-08-30T01:21:50Z http://eprints.utm.my/7801/ Cryptanalysis using biological inspired computing approaches Ahmad, Badrisham Maarof, Mohd. Aizaini QA75 Electronic computers. Computer science In security, cryptology is introduced to guarantee the safety of data, whereby it is divided into cryptography and cryptanalysis. Cryptography is a technique to conceal information by means of encryption and decryption while cryptanalysis is used to break the encrypted information using some methods. Biological Inspired Computing (BIC) is a method that takes ideas from biology to be used in computing. BIC is a field that has been widely used in many computer applications such as pattern recognition, computer and network security and optimization. Some examples of BIC approaches are genetic algorithm (GA), ant colony and artificial immune system (AIS). GA and ant colony have been successfully applied in cryptanalysis of classical ciphers. Therefore, this paper will review these techniques and explore the potential of using AIS in cryptanalysis. 2006 Conference or Workshop Item PeerReviewed application/pdf en http://eprints.utm.my/7801/1/MohdAizainiMaarof2006_CryptanalysisusingBiologicalInspiredComputing.pdf Ahmad, Badrisham and Maarof, Mohd. Aizaini (2006) Cryptanalysis using biological inspired computing approaches. In: Proceedings of the Postgraduate Annual Research Seminar 2006 (PARS 2006), 24 - 25 May 2006, Postgraduate Studies Department FSKSM, UTM Skudai.
spellingShingle QA75 Electronic computers. Computer science
Ahmad, Badrisham
Maarof, Mohd. Aizaini
Cryptanalysis using biological inspired computing approaches
title Cryptanalysis using biological inspired computing approaches
title_full Cryptanalysis using biological inspired computing approaches
title_fullStr Cryptanalysis using biological inspired computing approaches
title_full_unstemmed Cryptanalysis using biological inspired computing approaches
title_short Cryptanalysis using biological inspired computing approaches
title_sort cryptanalysis using biological inspired computing approaches
topic QA75 Electronic computers. Computer science
url http://eprints.utm.my/7801/
http://eprints.utm.my/7801/1/MohdAizainiMaarof2006_CryptanalysisusingBiologicalInspiredComputing.pdf