SlideShare une entreprise Scribd logo
1  sur  5
Télécharger pour lire hors ligne
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. I (May-Jun. 2016), PP 48-52
www.iosrjournals.org
DOI: 10.9790/0661-1803014852 www.iosrjournals.org 48 | Page
Uses of Genetic Algorithm in Cryptanalysis of RSA
Siham Zoubir1
, Abderrahim Tragha2
1
(Department of Modeling and information technology (TIM) / University Hassan II Mohammedia, Faculty of
sciences Ben M’sik, Casablanca)
Abstract : The information system security is nowadays paramount, it is for what we are focused in our
research to talk about a basic of security which is cryptography, and specially about RSA algorithm, a system of
coding with public key developed by Rivest, Shamir and Adleman (R.S.A in 1978).We will discuss tree points in
our project, the first step is to understand operation of RSA; (preparation of the key, encryption text and
decryption text), and we search how we can calculate a products of two binary numbers with a big size (p ×
q), and which will be the result? After that we will study the function of genetic algorithm and how we can use it
to generate a new number of population that we can use them in our cryptanalysis of RSA algorithm.
Keywords :Cryptography; Genetic algorithm (GA); Rivest Shamir and Adleman (RSA), algorithm of
KARATSUBA
I. Introduction
Genetic algorithms, initiated in 1970s by John Holland, based on derivatives of the genetic and
evolutionary mechanisms of nature techniques: cross, mutation, selection. Their fields of application are
extensive. Besides the economy, they are used for optimization functions (De Jong (1980)), finance (Pereira
(2000)), and in cryptography in 1993 by Spillman, Janssen, Nelson and Kepner and their job was to break a
simple substitution.
Several studies has been made in this topic; genetic algorithm approach was used only to break
classical crypto systems (Mono-alphabetical Substitution, Poly alphabetical Substitution, Permutation cipher,
transposition cipher, encryption of Merkle-Hellman, encryption of Chor-Rivest, encryption of Vernam).
Cryptography is a huge topic, this paper will focus primarily on the crypto system RSA, and how we can use
genetic algorithm in cryptanalysis of RSA.
II. Crypto System RSA
Initiated by Rivest, Shamir, Adleman in 1977, it’s the more uses algorithm in the word. And its security
based on the factoring problem [3].
All the operation of crypto system RSA occurs in a set of integer. Are p and q two prime numbers with big
size. We notes N = pq. The number N east calls RSA module.
Let us suppose that two people A and B want to communicate in a secure way by using crypto system RSA.
For that, they must, each one of them to prepare a RSA module, two keys e and d, to carry
out a procedure of encrypting and signature anda procedure of decrypting and verification of the signature.
 Example of factoring
77 = 7 x 11.
1562900109403 =??
If N = pq, how can we find p and q or calculating
• (p -1)(q - 1).
• Difficult problem if p and q are big
In the first part of this work, we study the operation of encryption and decryption RSA.
1. Operation of RSA
The different Operation of the RSA passes by the following stages [5]:
1.1. Preparation of the keys
If Bruno wants to send a message to Alice
So Alice carries out:
Choice of p and q two prime numbers
Calculation of n= p × q
Calculation of φ (n) = (p-1) (q-1)
Choice of an exhibitor and calculation of his reverse exhibitor e such as pgcd (e, φ (n))=1
Uses Of Genetic Algorithm In Cryptanalysis Of RSA
DOI: 10.9790/0661-1803014852 www.iosrjournals.org 49 | Page
Calculation the reverse d of e modulo φ (n) bye the algorithm of Euclid d×e ≡1 (mod φ (n))
=> So the public key of Alice is made up by the 2 numbers n and e and private key d who Alice keeps for it.
1.2. Encryption of the message
To send a secret message to Alice, it transformed this message to an integer m from the interval [2;
N].Bruno recovers the public key of Alice: n and e, calculate the coded message and
transmits this message to Alice.
1.3. Decryption of the message
Alice receives message X of Bruno, use the private key d to decrypt it, on
calculating .
Figure 1. Encryption and decryption RSA algorithm
III. Algorithm Of Karatsuba
The second phase of our research tasks is focused on the algorithm of Karatsuba which was discovered
in 1960, it makes it possible to multiply quickly two numbers of N figures with a complexity lower
than naive method.We use this algorithm to have a multiplication of big binary numbers, A and B two numbers
positive writings on base 2 of N= 2K figures, [1]
we can write: A = (a1 × 2 K + a0) and B = (b1× 2 K + b0), with a0, b0, a1, b1 of the binary numbers has k
figures.
It is noticed whereas the calculation of AB :( a1x2K+a0) (b1x2K+b0) =a1b1x2 2K+ (a1b0+a0b1)
x2K+a0b0 does not require the four products a1b1, a1b0, a0b1and a0b0.
But can in fact being only carried out with the three products a1b1, a0b0 and (|a1 − a0|) (|b1 − b0|)
AB = a1b1× 2 2k+ (a1b1+a0b0- (a1-a0) (b1-b0)) ×2k+a0b0
What we can write as follows:[2]
To divide: we breaks up A and B the numbers of 2k figures in A = (a1×2 k+a0) and B= (b1x2K+b0) or
a0,b0,a1,b1are numbers with K figures.
To reign: we solves by recursive call the problemfor a0b0, a1b1 and (|a1 − a0|) (|b1 − b0|)
We coded this algorithm with C++ language and for that we can find a product of p and q to use them in our
RSA algorithm.
Figure 2: result of KARATSUBA algorithm Figure 3: code of KARATSUBA algorithm
Uses Of Genetic Algorithm In Cryptanalysis Of RSA
DOI: 10.9790/0661-1803014852 www.iosrjournals.org 50 | Page
IV. GENETIC ALGORITHM
Genetic algorithm are in the family of meta-heuristic algorithms whose goal is to obtain a suitable
solution in an acceptable time. Their aim is to improve the understanding of natural processes of adaptation and
design artificial systems with similar properties to natural systems.
The GA does not allow obtaining an exact optimal solution, but rather a quality solution and that in
little effort, and they need important research spaces. They operate on a population of points rather than a single
point. Unlike other methods, they use coding parameters and not the parameters themselves [6] [7].
The operation of a basic genetic algorithm is as follows:
 Initialization: these randomly generate a given size of population of individuals;
 Evaluation: each chromosome is decoded and evaluated;
 Selection: use of an appropriate selection technique to create a new population of N chromosomes;
 Reproduction: it is, in fact, to recombine two matched individuals (in the previous phase) to create two
new individuals. There is thus a possibility of changing or dipped in the new population.
 Back: decoding and evaluation phase of chromosomes, to stop the process.
1. The operators of the algorithm
There are four classical genetic operators: Coding; Selection; Cross-over; Mutation; Replacement.
1.1. Coding:
There are three main types of encryption used:
* Binary encoding: it is the most used, each gene has the same binary alphabet {0, 1}
- A gene is represented by a long integer (32 bits)
- Chromosomes (gene sequences): represented by the genes of Tables
- Individuals: represented by chromosomes tables.
For example the problem of traveling salesman, may prefer to use the alphabet allelic {c1, c2, c3... ci} which C
represents the city of number i.
*The actual coding: this can be especially useful if you search for the maximum of a real function.
*The Gray coding: In the case of a binary coding, is often used "Hamming distance" as a measure of the
dissimilarity between two population members, this measurement counts bits of differences even between these
two sequences. Moreover, this is where the binary encoding begins to show its limits.
Indeed, two neighboring elements in terms of hamming distance do not necessarily encode two nearby elements
in the search space. So this disadvantage can be avoided by using a "coding Gray": Gray coding is a coding,
which has the property that between an element n and an element n + 1, neighbor in the search space, a single
bit differs.
1.2. Selection:
The selection aims is to identify individuals who should reproduce. This operator does not create new
individuals but identifies individuals based on their adaptive function, the most suitable individuals are selected
while the less well-adapted are discarded.
The selection should favor the best elements according to the criterion to be optimized (minimized or
maximized). This allows to give individuals whose value is greater more likely to contribute to the next
generation. There are several methods of selection, the best known being the "Wheel of Fortune" and "selection
tournament"
Uses Of Genetic Algorithm In Cryptanalysis Of RSA
DOI: 10.9790/0661-1803014852 www.iosrjournals.org 51 | Page
1.3. Crossover:
Applied after the selection operator on population P; we are left with a population P ' of n / 2
individuals and should double that number so that our next generation is complete.
Each segment of the parent 1 is exchanged with its "counterpart" of the parent 2 with probability crossover pc.
=> 2 resulted from that process son for each couple and our population P 'so well now contains n individuals.
1.4. Mutation:
This operator is to change the value of an allelic gene with a very low probability Pm
Between 0.01 and 0.001.
We can also take Pm = 1 / lg where Lg is the length of the bit string encoding our chromosome.
We summarize the change as follows:
An expected return function is used true with probability Pm.
For each locus do
Call to the function
IF this function return true THEN
We reverse the bit located at this locus
END IF
END FOR
1.5. Replacement:
This operator is the simplest; his job is to reintroduce the offspring obtained by successive application of
selection operators, crossover and mutation (population P ') in the population of their parents (P population).
In general, it can be assumed that a new individual (child) takes place within the population only if it
meets the criteria to be more efficient than the least efficient of individuals from the previous population.
So the children of a generation do not necessarily replace their parents as in the steady replacement and the same
size of the population is not static over time.
A form of a genetic algorithm:
1) Initialize the initial population P.
2) Assess P.
3) WHILE (Not Convergence) DO:
a) P = Selection of Parents in P
b) P '= Apply Crossover operator P'
c) P '= Apply Mutation operator P'
d) P = P Replace Alumni their Descendants of P’
e) Evaluate P
END WHILE
2. Operating diagram:
Uses Of Genetic Algorithm In Cryptanalysis Of RSA
DOI: 10.9790/0661-1803014852 www.iosrjournals.org 52 | Page
V. Our approach applied to the new RSA algorithm
The first step in our research is to understand a different operations of RSA algorithm, study a factory
problem, and how can we find p and q to cryptanalysis of RSA.
For that we study how we can find p and q with using KARATSUBA algorithm. This algorithm will help us to
have a product of N= pxq two big number with k figures.
Now and for the first time we work of how to apply genetic algorithm in cryptanalysis of RSA.
For that we decide to use different operations of GA (coding, selection, crossover, mutation and replacement) to
generate a new population with two individual p and q to use them in cryptanalysis of RSA.
VI. Conclusion
In this paper, we have discuss used of genetic algorithm and other operators for the cryptanalysis of
RSA. We have to discuss two phases, the first one is how we can find a product of two numbers with big size (p
and q) with this product we can find N=p xq to cryptanalysis of RSA, the second phase is to applies genetic
algorithm with his different operations (evaluation, selection, cross-over, mutation..) to generate a new
individual p and q, and uses in our cryptanalysis RSA.
.
References
[1] Alin Bostan, Algorithmes rapides pour les polynomes, series formelles et matrices, Vol. 1, n° 2 (2010), p. 75-262.
[2] Abderrahmane Nitaj, Laboratoire de Math_ematiques Nicolas Oresme, Universit_e de Caen, France, Version du 28 juin 2009.
[3] RSA et les grands nombres, IN 261 ENSTA, http://www.di.ens.fr/~pointche/enseignement/ensta2/.
[4] Algorithmus der Woche, publiée à l'occasion de l'Année de l'informatique (Informatikjahr) 2006.
[5] Techniques de cryptanalyse de RSA, Christophe Grenier, 28 janvier 2009.
[6] Robert Mathews, the Use of Genetic Algorithms in Cryptanalysis, 04 Jun 2010.
[7] Overview of Information Security Using Genetic Algorithm and Chaos,Anil Kumar a & M. K. 07 Dec 2009.
[8] Cryptanalysis of RSA: A Survey Carlos Frederico Cid GSEC – GIAC Security Essentials Certification Practical Version 1.4b
[9] Cryptanalysis of RSA with Small Prime Difference Benne de Weger Sportsingel 30, 2924 XN Krimpen aan den IJssel, The
Netherlands (e-mail: deweger@xs4all.nl) Received: October 23, 2000; revised version: June 13, 2001.
[10] L’algorithme RSA, Jean-Baptiste Campesato, 10 avril 2010

Contenu connexe

Tendances

Algorithem complexity in data sructure
Algorithem complexity in data sructureAlgorithem complexity in data sructure
Algorithem complexity in data sructureKumar
 
Basic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusBasic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusNANDINI SHARMA
 
Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Deepak John
 
Analysis Of Algorithms I
Analysis Of Algorithms IAnalysis Of Algorithms I
Analysis Of Algorithms ISri Prasanna
 
Recursion and Sorting Algorithms
Recursion and Sorting AlgorithmsRecursion and Sorting Algorithms
Recursion and Sorting AlgorithmsAfaq Mansoor Khan
 
Introduction to the AKS Primality Test
Introduction to the AKS Primality TestIntroduction to the AKS Primality Test
Introduction to the AKS Primality TestPranshu Bhatnagar
 
Algorithm Complexity and Main Concepts
Algorithm Complexity and Main ConceptsAlgorithm Complexity and Main Concepts
Algorithm Complexity and Main ConceptsAdelina Ahadova
 
Data Structure and Algorithms
Data Structure and Algorithms Data Structure and Algorithms
Data Structure and Algorithms ManishPrajapati78
 
Lecture 2 data structures and algorithms
Lecture 2 data structures and algorithmsLecture 2 data structures and algorithms
Lecture 2 data structures and algorithmsAakash deep Singhal
 
Big oh Representation Used in Time complexities
Big oh Representation Used in Time complexitiesBig oh Representation Used in Time complexities
Big oh Representation Used in Time complexitiesLAKSHMITHARUN PONNAM
 
Data Structure: Algorithm and analysis
Data Structure: Algorithm and analysisData Structure: Algorithm and analysis
Data Structure: Algorithm and analysisDr. Rajdeep Chatterjee
 
Backtracking based integer factorisation, primality testing and square root c...
Backtracking based integer factorisation, primality testing and square root c...Backtracking based integer factorisation, primality testing and square root c...
Backtracking based integer factorisation, primality testing and square root c...csandit
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithmsHoang Nguyen
 
Complexity analysis - The Big O Notation
Complexity analysis - The Big O NotationComplexity analysis - The Big O Notation
Complexity analysis - The Big O NotationJawad Khan
 
Algorithm analysis in fundamentals of data structure
Algorithm analysis in fundamentals of data structureAlgorithm analysis in fundamentals of data structure
Algorithm analysis in fundamentals of data structureVrushali Dhanokar
 

Tendances (20)

Algorithem complexity in data sructure
Algorithem complexity in data sructureAlgorithem complexity in data sructure
Algorithem complexity in data sructure
 
Basic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV SyllabusBasic Computer Engineering Unit II as per RGPV Syllabus
Basic Computer Engineering Unit II as per RGPV Syllabus
 
Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1Anlysis and design of algorithms part 1
Anlysis and design of algorithms part 1
 
Analysis Of Algorithms I
Analysis Of Algorithms IAnalysis Of Algorithms I
Analysis Of Algorithms I
 
Recursion and Sorting Algorithms
Recursion and Sorting AlgorithmsRecursion and Sorting Algorithms
Recursion and Sorting Algorithms
 
Introduction to the AKS Primality Test
Introduction to the AKS Primality TestIntroduction to the AKS Primality Test
Introduction to the AKS Primality Test
 
Big o notation
Big o notationBig o notation
Big o notation
 
Algorithm Complexity and Main Concepts
Algorithm Complexity and Main ConceptsAlgorithm Complexity and Main Concepts
Algorithm Complexity and Main Concepts
 
Data Structure and Algorithms
Data Structure and AlgorithmsData Structure and Algorithms
Data Structure and Algorithms
 
Data Structure and Algorithms
Data Structure and Algorithms Data Structure and Algorithms
Data Structure and Algorithms
 
Lecture 2 data structures and algorithms
Lecture 2 data structures and algorithmsLecture 2 data structures and algorithms
Lecture 2 data structures and algorithms
 
Big oh Representation Used in Time complexities
Big oh Representation Used in Time complexitiesBig oh Representation Used in Time complexities
Big oh Representation Used in Time complexities
 
Unit ii algorithm
Unit   ii algorithmUnit   ii algorithm
Unit ii algorithm
 
Time andspacecomplexity
Time andspacecomplexityTime andspacecomplexity
Time andspacecomplexity
 
Data Structure: Algorithm and analysis
Data Structure: Algorithm and analysisData Structure: Algorithm and analysis
Data Structure: Algorithm and analysis
 
Backtracking based integer factorisation, primality testing and square root c...
Backtracking based integer factorisation, primality testing and square root c...Backtracking based integer factorisation, primality testing and square root c...
Backtracking based integer factorisation, primality testing and square root c...
 
Data structures and algorithms
Data structures and algorithmsData structures and algorithms
Data structures and algorithms
 
Complexity analysis - The Big O Notation
Complexity analysis - The Big O NotationComplexity analysis - The Big O Notation
Complexity analysis - The Big O Notation
 
Algorithm analysis in fundamentals of data structure
Algorithm analysis in fundamentals of data structureAlgorithm analysis in fundamentals of data structure
Algorithm analysis in fundamentals of data structure
 
Recursion
RecursionRecursion
Recursion
 

En vedette

Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...IOSR Journals
 
Brain Bridge: A Comparative Study between Database Querying and Human Memory ...
Brain Bridge: A Comparative Study between Database Querying and Human Memory ...Brain Bridge: A Comparative Study between Database Querying and Human Memory ...
Brain Bridge: A Comparative Study between Database Querying and Human Memory ...IOSR Journals
 
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...IOSR Journals
 
Tailoring of composite cantilever beam for maximum stiffness and minimum weight
Tailoring of composite cantilever beam for maximum stiffness and minimum weightTailoring of composite cantilever beam for maximum stiffness and minimum weight
Tailoring of composite cantilever beam for maximum stiffness and minimum weightIOSR Journals
 

En vedette (20)

J013118591
J013118591J013118591
J013118591
 
E017131924
E017131924E017131924
E017131924
 
J012626269
J012626269J012626269
J012626269
 
D011112432
D011112432D011112432
D011112432
 
E1303012733
E1303012733E1303012733
E1303012733
 
I1302035763
I1302035763I1302035763
I1302035763
 
A012660105
A012660105A012660105
A012660105
 
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
Enhanced Mobile Node Tracking With Received Signal Strength in Wireless Senso...
 
B1103010918
B1103010918B1103010918
B1103010918
 
F03124246
F03124246F03124246
F03124246
 
O11030494100
O11030494100O11030494100
O11030494100
 
I017225966
I017225966I017225966
I017225966
 
E012623035
E012623035E012623035
E012623035
 
N010417991
N010417991N010417991
N010417991
 
H010414651
H010414651H010414651
H010414651
 
K012627075
K012627075K012627075
K012627075
 
Brain Bridge: A Comparative Study between Database Querying and Human Memory ...
Brain Bridge: A Comparative Study between Database Querying and Human Memory ...Brain Bridge: A Comparative Study between Database Querying and Human Memory ...
Brain Bridge: A Comparative Study between Database Querying and Human Memory ...
 
G010433745
G010433745G010433745
G010433745
 
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
Evaluations of the Effect of Workshop/Laboratory Accidents and Precautionary ...
 
Tailoring of composite cantilever beam for maximum stiffness and minimum weight
Tailoring of composite cantilever beam for maximum stiffness and minimum weightTailoring of composite cantilever beam for maximum stiffness and minimum weight
Tailoring of composite cantilever beam for maximum stiffness and minimum weight
 

Similaire à Genetic algorithms in cryptanalysis of the RSA cryptosystem

Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014ijcsbi
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilogijcncs
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling cscpconf
 
A general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measuresA general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measuresMehran Mesbahzadeh
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...IJEACS
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...CSCJournals
 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementationramya c b
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?AlexWang212277
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPijccmsjournal
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Mapijccmsjournal
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...ijcsity
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxskilljiolms
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESIJCSEIT Journal
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESijcseit
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES ijcseit
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat maptayseer Karam alshekly
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Mumbai Academisc
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionIRJET Journal
 

Similaire à Genetic algorithms in cryptanalysis of the RSA cryptosystem (20)

Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014Vol 14 No 1 - July 2014
Vol 14 No 1 - July 2014
 
Cryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using VerilogCryptosystem An Implementation of RSA Using Verilog
Cryptosystem An Implementation of RSA Using Verilog
 
Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling Chaos Image Encryption using Pixel shuffling
Chaos Image Encryption using Pixel shuffling
 
A general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measuresA general multiobjective clustering approach based on multiple distance measures
A general multiobjective clustering approach based on multiple distance measures
 
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
An Advance Approach of Image Encryption using AES, Genetic Algorithm and RSA ...
 
Ijcatr04021016
Ijcatr04021016Ijcatr04021016
Ijcatr04021016
 
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
Implementation of RSA Algorithm with Chinese Remainder Theorem for Modulus N ...
 
Reed_Solomon_Implementation
Reed_Solomon_ImplementationReed_Solomon_Implementation
Reed_Solomon_Implementation
 
F010243136
F010243136F010243136
F010243136
 
Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?Alex WANG - What is the most effective cryptosystem for public-key encryption?
Alex WANG - What is the most effective cryptosystem for public-key encryption?
 
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAPMESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
MESSAGE EMBEDDED CIPHER USING 2-D CHAOTIC MAP
 
Message Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic MapMessage Embedded Cipher Using 2-D Chaotic Map
Message Embedded Cipher Using 2-D Chaotic Map
 
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...Neuro genetic key based recursive modulo 2 substitution using mutated charact...
Neuro genetic key based recursive modulo 2 substitution using mutated charact...
 
VCE Unit 01 (2).pptx
VCE Unit 01 (2).pptxVCE Unit 01 (2).pptx
VCE Unit 01 (2).pptx
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGESRANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
RANDOMIZED STEGANOGRAPHY IN SKIN TONE IMAGES
 
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat mapA New Key Stream Generator Based on 3D Henon map and 3D Cat map
A New Key Stream Generator Based on 3D Henon map and 3D Cat map
 
Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)Implementation of bpsc stegnography ( synopsis)
Implementation of bpsc stegnography ( synopsis)
 
A New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash FunctionA New Chaos Based Image Encryption and Decryption using a Hash Function
A New Chaos Based Image Encryption and Decryption using a Hash Function
 

Plus de IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Dernier

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 

Dernier (20)

[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 

Genetic algorithms in cryptanalysis of the RSA cryptosystem

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661,p-ISSN: 2278-8727, Volume 18, Issue 3, Ver. I (May-Jun. 2016), PP 48-52 www.iosrjournals.org DOI: 10.9790/0661-1803014852 www.iosrjournals.org 48 | Page Uses of Genetic Algorithm in Cryptanalysis of RSA Siham Zoubir1 , Abderrahim Tragha2 1 (Department of Modeling and information technology (TIM) / University Hassan II Mohammedia, Faculty of sciences Ben M’sik, Casablanca) Abstract : The information system security is nowadays paramount, it is for what we are focused in our research to talk about a basic of security which is cryptography, and specially about RSA algorithm, a system of coding with public key developed by Rivest, Shamir and Adleman (R.S.A in 1978).We will discuss tree points in our project, the first step is to understand operation of RSA; (preparation of the key, encryption text and decryption text), and we search how we can calculate a products of two binary numbers with a big size (p × q), and which will be the result? After that we will study the function of genetic algorithm and how we can use it to generate a new number of population that we can use them in our cryptanalysis of RSA algorithm. Keywords :Cryptography; Genetic algorithm (GA); Rivest Shamir and Adleman (RSA), algorithm of KARATSUBA I. Introduction Genetic algorithms, initiated in 1970s by John Holland, based on derivatives of the genetic and evolutionary mechanisms of nature techniques: cross, mutation, selection. Their fields of application are extensive. Besides the economy, they are used for optimization functions (De Jong (1980)), finance (Pereira (2000)), and in cryptography in 1993 by Spillman, Janssen, Nelson and Kepner and their job was to break a simple substitution. Several studies has been made in this topic; genetic algorithm approach was used only to break classical crypto systems (Mono-alphabetical Substitution, Poly alphabetical Substitution, Permutation cipher, transposition cipher, encryption of Merkle-Hellman, encryption of Chor-Rivest, encryption of Vernam). Cryptography is a huge topic, this paper will focus primarily on the crypto system RSA, and how we can use genetic algorithm in cryptanalysis of RSA. II. Crypto System RSA Initiated by Rivest, Shamir, Adleman in 1977, it’s the more uses algorithm in the word. And its security based on the factoring problem [3]. All the operation of crypto system RSA occurs in a set of integer. Are p and q two prime numbers with big size. We notes N = pq. The number N east calls RSA module. Let us suppose that two people A and B want to communicate in a secure way by using crypto system RSA. For that, they must, each one of them to prepare a RSA module, two keys e and d, to carry out a procedure of encrypting and signature anda procedure of decrypting and verification of the signature.  Example of factoring 77 = 7 x 11. 1562900109403 =?? If N = pq, how can we find p and q or calculating • (p -1)(q - 1). • Difficult problem if p and q are big In the first part of this work, we study the operation of encryption and decryption RSA. 1. Operation of RSA The different Operation of the RSA passes by the following stages [5]: 1.1. Preparation of the keys If Bruno wants to send a message to Alice So Alice carries out: Choice of p and q two prime numbers Calculation of n= p × q Calculation of φ (n) = (p-1) (q-1) Choice of an exhibitor and calculation of his reverse exhibitor e such as pgcd (e, φ (n))=1
  • 2. Uses Of Genetic Algorithm In Cryptanalysis Of RSA DOI: 10.9790/0661-1803014852 www.iosrjournals.org 49 | Page Calculation the reverse d of e modulo φ (n) bye the algorithm of Euclid d×e ≡1 (mod φ (n)) => So the public key of Alice is made up by the 2 numbers n and e and private key d who Alice keeps for it. 1.2. Encryption of the message To send a secret message to Alice, it transformed this message to an integer m from the interval [2; N].Bruno recovers the public key of Alice: n and e, calculate the coded message and transmits this message to Alice. 1.3. Decryption of the message Alice receives message X of Bruno, use the private key d to decrypt it, on calculating . Figure 1. Encryption and decryption RSA algorithm III. Algorithm Of Karatsuba The second phase of our research tasks is focused on the algorithm of Karatsuba which was discovered in 1960, it makes it possible to multiply quickly two numbers of N figures with a complexity lower than naive method.We use this algorithm to have a multiplication of big binary numbers, A and B two numbers positive writings on base 2 of N= 2K figures, [1] we can write: A = (a1 × 2 K + a0) and B = (b1× 2 K + b0), with a0, b0, a1, b1 of the binary numbers has k figures. It is noticed whereas the calculation of AB :( a1x2K+a0) (b1x2K+b0) =a1b1x2 2K+ (a1b0+a0b1) x2K+a0b0 does not require the four products a1b1, a1b0, a0b1and a0b0. But can in fact being only carried out with the three products a1b1, a0b0 and (|a1 − a0|) (|b1 − b0|) AB = a1b1× 2 2k+ (a1b1+a0b0- (a1-a0) (b1-b0)) ×2k+a0b0 What we can write as follows:[2] To divide: we breaks up A and B the numbers of 2k figures in A = (a1×2 k+a0) and B= (b1x2K+b0) or a0,b0,a1,b1are numbers with K figures. To reign: we solves by recursive call the problemfor a0b0, a1b1 and (|a1 − a0|) (|b1 − b0|) We coded this algorithm with C++ language and for that we can find a product of p and q to use them in our RSA algorithm. Figure 2: result of KARATSUBA algorithm Figure 3: code of KARATSUBA algorithm
  • 3. Uses Of Genetic Algorithm In Cryptanalysis Of RSA DOI: 10.9790/0661-1803014852 www.iosrjournals.org 50 | Page IV. GENETIC ALGORITHM Genetic algorithm are in the family of meta-heuristic algorithms whose goal is to obtain a suitable solution in an acceptable time. Their aim is to improve the understanding of natural processes of adaptation and design artificial systems with similar properties to natural systems. The GA does not allow obtaining an exact optimal solution, but rather a quality solution and that in little effort, and they need important research spaces. They operate on a population of points rather than a single point. Unlike other methods, they use coding parameters and not the parameters themselves [6] [7]. The operation of a basic genetic algorithm is as follows:  Initialization: these randomly generate a given size of population of individuals;  Evaluation: each chromosome is decoded and evaluated;  Selection: use of an appropriate selection technique to create a new population of N chromosomes;  Reproduction: it is, in fact, to recombine two matched individuals (in the previous phase) to create two new individuals. There is thus a possibility of changing or dipped in the new population.  Back: decoding and evaluation phase of chromosomes, to stop the process. 1. The operators of the algorithm There are four classical genetic operators: Coding; Selection; Cross-over; Mutation; Replacement. 1.1. Coding: There are three main types of encryption used: * Binary encoding: it is the most used, each gene has the same binary alphabet {0, 1} - A gene is represented by a long integer (32 bits) - Chromosomes (gene sequences): represented by the genes of Tables - Individuals: represented by chromosomes tables. For example the problem of traveling salesman, may prefer to use the alphabet allelic {c1, c2, c3... ci} which C represents the city of number i. *The actual coding: this can be especially useful if you search for the maximum of a real function. *The Gray coding: In the case of a binary coding, is often used "Hamming distance" as a measure of the dissimilarity between two population members, this measurement counts bits of differences even between these two sequences. Moreover, this is where the binary encoding begins to show its limits. Indeed, two neighboring elements in terms of hamming distance do not necessarily encode two nearby elements in the search space. So this disadvantage can be avoided by using a "coding Gray": Gray coding is a coding, which has the property that between an element n and an element n + 1, neighbor in the search space, a single bit differs. 1.2. Selection: The selection aims is to identify individuals who should reproduce. This operator does not create new individuals but identifies individuals based on their adaptive function, the most suitable individuals are selected while the less well-adapted are discarded. The selection should favor the best elements according to the criterion to be optimized (minimized or maximized). This allows to give individuals whose value is greater more likely to contribute to the next generation. There are several methods of selection, the best known being the "Wheel of Fortune" and "selection tournament"
  • 4. Uses Of Genetic Algorithm In Cryptanalysis Of RSA DOI: 10.9790/0661-1803014852 www.iosrjournals.org 51 | Page 1.3. Crossover: Applied after the selection operator on population P; we are left with a population P ' of n / 2 individuals and should double that number so that our next generation is complete. Each segment of the parent 1 is exchanged with its "counterpart" of the parent 2 with probability crossover pc. => 2 resulted from that process son for each couple and our population P 'so well now contains n individuals. 1.4. Mutation: This operator is to change the value of an allelic gene with a very low probability Pm Between 0.01 and 0.001. We can also take Pm = 1 / lg where Lg is the length of the bit string encoding our chromosome. We summarize the change as follows: An expected return function is used true with probability Pm. For each locus do Call to the function IF this function return true THEN We reverse the bit located at this locus END IF END FOR 1.5. Replacement: This operator is the simplest; his job is to reintroduce the offspring obtained by successive application of selection operators, crossover and mutation (population P ') in the population of their parents (P population). In general, it can be assumed that a new individual (child) takes place within the population only if it meets the criteria to be more efficient than the least efficient of individuals from the previous population. So the children of a generation do not necessarily replace their parents as in the steady replacement and the same size of the population is not static over time. A form of a genetic algorithm: 1) Initialize the initial population P. 2) Assess P. 3) WHILE (Not Convergence) DO: a) P = Selection of Parents in P b) P '= Apply Crossover operator P' c) P '= Apply Mutation operator P' d) P = P Replace Alumni their Descendants of P’ e) Evaluate P END WHILE 2. Operating diagram:
  • 5. Uses Of Genetic Algorithm In Cryptanalysis Of RSA DOI: 10.9790/0661-1803014852 www.iosrjournals.org 52 | Page V. Our approach applied to the new RSA algorithm The first step in our research is to understand a different operations of RSA algorithm, study a factory problem, and how can we find p and q to cryptanalysis of RSA. For that we study how we can find p and q with using KARATSUBA algorithm. This algorithm will help us to have a product of N= pxq two big number with k figures. Now and for the first time we work of how to apply genetic algorithm in cryptanalysis of RSA. For that we decide to use different operations of GA (coding, selection, crossover, mutation and replacement) to generate a new population with two individual p and q to use them in cryptanalysis of RSA. VI. Conclusion In this paper, we have discuss used of genetic algorithm and other operators for the cryptanalysis of RSA. We have to discuss two phases, the first one is how we can find a product of two numbers with big size (p and q) with this product we can find N=p xq to cryptanalysis of RSA, the second phase is to applies genetic algorithm with his different operations (evaluation, selection, cross-over, mutation..) to generate a new individual p and q, and uses in our cryptanalysis RSA. . References [1] Alin Bostan, Algorithmes rapides pour les polynomes, series formelles et matrices, Vol. 1, n° 2 (2010), p. 75-262. [2] Abderrahmane Nitaj, Laboratoire de Math_ematiques Nicolas Oresme, Universit_e de Caen, France, Version du 28 juin 2009. [3] RSA et les grands nombres, IN 261 ENSTA, http://www.di.ens.fr/~pointche/enseignement/ensta2/. [4] Algorithmus der Woche, publiée à l'occasion de l'Année de l'informatique (Informatikjahr) 2006. [5] Techniques de cryptanalyse de RSA, Christophe Grenier, 28 janvier 2009. [6] Robert Mathews, the Use of Genetic Algorithms in Cryptanalysis, 04 Jun 2010. [7] Overview of Information Security Using Genetic Algorithm and Chaos,Anil Kumar a & M. K. 07 Dec 2009. [8] Cryptanalysis of RSA: A Survey Carlos Frederico Cid GSEC – GIAC Security Essentials Certification Practical Version 1.4b [9] Cryptanalysis of RSA with Small Prime Difference Benne de Weger Sportsingel 30, 2924 XN Krimpen aan den IJssel, The Netherlands (e-mail: deweger@xs4all.nl) Received: October 23, 2000; revised version: June 13, 2001. [10] L’algorithme RSA, Jean-Baptiste Campesato, 10 avril 2010