Cover
Vol. 12 No. 2 (2017)

Published: January 31, 2017

Pages: 161-166

Original Article

Arabic Text Cryptanalysis Using Genetic Algorithm

Abstract

In this paper a Genetic Algorithm (GA) is proposed to attack an Arabic encrypted text by Vigenere cipher. The frequency of occurrence of Arabic letters has been calculated by using the text of the holy book of Quran, since it has rich language features compared to many other books. The algorithm is tested to find the key letters for different ciphertext sizes and key lengths. The results shows 100% correct letters retrieved from medium size ciphertext and short key length, while 90% of the ciphertext is retrieved from long ciphertext and medium key length, and 82% of the ciphertext is retrieved from long ciphertext and long key.

References

  1. J. Song, H. Zhang, Q. Meng, and Z. Wang, "Cryptanalysis of Four-Round DES Based on Genetic Algorithm," in 2007 International Conference on Wireless Communications, Networking and Mobile Computing , 2007, pp. 2326-2329.
  2. C. F. Jones and M. Christman, "Genetic algorithm solution of Vigenere alphabetic codes," in Soft Computing Applications, 2001. SMCia/01. Proceedings of the 2001 IEEE Mountain Workshop on , 2001, pp. 59-63.
  3. R. Toemeh and S. Arumugam, "Applying Genetic Algorithms for Searching Key-Space of Polyalphabetic Substitution Ciphers," International Arab Journal of Information Technology, vol. 5, pp. 87-91, 2008.
  4. D. R. Stinson, Cryptography: Theory and Practice, Third Edition : Taylor & Francis, 2005.
  5. S. S. Omran, A. S. Al-Khalid, and D. M. Al-Saady, "A cryptanalytic attack on Vigenere cipher using
  6. A. Bhateja and S. Kumar, "Genetic Algorithm with elitism for cryptanalysis of Vigenere cipher," in Issues and Challenges in Intelligent Computing Techniques (ICICT), 2014 International Conference on , 2014, pp. 373-377.
  7. Y. Alqahtani, P. Kuppuswamy, and S. Shah, "New Approach of Arabic Encryption-Decryption Technique Using Vigenere Cipher on Mod 39," Engineering, vol. 2, 2013.
  8. S. D. Rihan and S. E. F.Osma, "ARABIC Cryptography Technique Using Neural Network and of Computer Science, vol. 3, pp. 35-42, 2016.
  9. P. Kuppuswamy and Y. Alqahtani, "New Innovation of Arabic Language Encryption Technique Using New Symmetric Key Algorithm," International Journal of Advances in Engineering and Technology, vol. 7, pp. 30-37, 2014.
  10. M. A. M. Aysan and P. Kuppuswamy, "Hybrid Combination Of Message Encryption Techniques On Arabic Text Using New Symmetric Key And Simple Logarithm Function," Journal of Scientific Knowledge (Computing and Information Technology), vol. 5, pp. 37-41, 2014.
  11. H. A.-Z. Atee, "Development of A New Way To Encrypt The Arabic Language Letters Using The Symmetric Encryption System," AL-TAQANI, vol. 24, pp. 101-111, 2011.
  12. W. Stallings, Cryptography and Network Security: Principles and Practice : Pearson/Prentice Hall, 2006.
  13. D. E. Goldberg, Genetic Algorithms in Search, Optimization, and Machine Learning : AddisonWesley Publishing Company, 1989.
  14. S. N. Sivanandam and S. N. Deepa, Introduction to 2007.
  15. M. Mrayati, Y. M. Alam, and M. H. At-Tayyan, Series on Arabic Origins of Cryptology: al-Kindi's treatise on cryptanalysis : KFCRIS & KACST, 2003.
  16. T. Baqir, The Epic of Gilgamesh ملحمة كلكامش , 1962 . Cipher text size Key length Proposed Algorithm Algorithm presented in [6] Average correct letters Average correct Letters (%) Average correct letters Average correct Letters (%) 4.6 4.7 9.2 14.1 70.5 16.8 Vol.12 No.2 , 2016